{"id":9653,"date":"2021-05-24T10:51:31","date_gmt":"2021-05-24T07:51:31","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=9653"},"modified":"2021-05-24T10:51:31","modified_gmt":"2021-05-24T07:51:31","slug":"pipeline-ransomware-mitigation","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/pipeline-ransomware-mitigation\/9653\/","title":{"rendered":"Colonial Pipeline, d\u00fczenlenen fidye yaz\u0131l\u0131m\u0131 sald\u0131r\u0131s\u0131n\u0131 nas\u0131l y\u00f6netti?"},"content":{"rendered":"<p>ABD\u2019de do\u011fu yakas\u0131n\u0131n b\u00fcy\u00fck bir b\u00f6l\u00fcm\u00fcne yak\u0131t sa\u011flayan petrol boru hatt\u0131n\u0131 kontrol eden \u015firket, Colonial Pipeline\u2019a d\u00fczenlenen son fidye yaz\u0131l\u0131m\u0131 sald\u0131r\u0131s\u0131, haf\u0131zalarda tazeli\u011fini koruyan en sansasyonel sald\u0131r\u0131lardan biridir. Anla\u015f\u0131l\u0131r bir \u015fekilde, sald\u0131r\u0131n\u0131n ayr\u0131nt\u0131lar\u0131 kamuoyu ile payla\u015f\u0131lmad\u0131 ancak baz\u0131 bilgiler medyada kendine yer buldu ve bu bilgilerden yola \u00e7\u0131karak konuya ili\u015fkin en az\u0131ndan \u015fu dersi \u00e7\u0131karabiliriz: Kolluk kuvvetlerini derhal bilgilendirmek hasar\u0131 azaltabilir. Elbette bu bildirimi yapmak herkesin inisiyatifinde olan bir konu de\u011fildir \u2014 baz\u0131 eyaletlerde kurbanlar, d\u00fczenleyici otoriteleri bilgilendirmekle y\u00fck\u00fcml\u00fcd\u00fcr. Buna ra\u011fmen, bildirimin zorunlu olmad\u0131\u011f\u0131 durumlarda bile b\u00f6yle bir \u015fey yapman\u0131n faydas\u0131 olabilir.<\/p>\n<h2>Sald\u0131r\u0131<\/h2>\n<p>7 May\u0131s\u2019ta, ABD\u2019nin do\u011fu yakas\u0131n\u0131n en b\u00fcy\u00fck petrol boru hatt\u0131n\u0131 i\u015fleten Colonial Pipeline\u2019a fidye yaz\u0131l\u0131m\u0131 sald\u0131r\u0131s\u0131 ger\u00e7ekle\u015ftirildi. \u00c7al\u0131\u015fanlar, k\u0131smen baz\u0131 bilgisayarlar\u0131n \u015fifrelenmi\u015f olmas\u0131, k\u0131smen de bula\u015fman\u0131n yay\u0131lmas\u0131n\u0131 \u00f6nlemek i\u00e7in baz\u0131 bilgi sistemlerini \u00e7evrimd\u0131\u015f\u0131 hale getirmek zorunda kald\u0131. Bu durum do\u011fu yakas\u0131 boyunca akaryak\u0131t tedarikinde gecikmelere neden olarak petrol vadeli i\u015flemlerinde% 4\u2019l\u00fck bir art\u0131\u015fa yol a\u00e7t\u0131. Hasar\u0131n azalt\u0131lmas\u0131 ad\u0131na \u015firket, <a href=\"https:\/\/www.forbes.com\/sites\/christopherhelman\/2021\/05\/10\/fbi-colonial-pipeline-hacked-by-apolitical-group-darkside\/?sh=20ffb0134418\" target=\"_blank\" rel=\"noopener nofollow\">akaryak\u0131t da\u011f\u0131t\u0131mlar\u0131n\u0131 art\u0131rmay\u0131 planl\u0131yor<\/a>.<\/p>\n<p>Her ne kadar \u015firket sistemlerini yeniden \u00e7al\u0131\u015f\u0131r hale getiriyor olsa da <a href=\"https:\/\/zetter.substack.com\/p\/biden-declares-state-of-emergency\" target=\"_blank\" rel=\"noopener nofollow\">Zero Day blog\u2019daki kaynaklara g\u00f6re<\/a> ya\u015fanan sorun, \u015firketin hizmet a\u011flar\u0131ndan \u00e7ok fatura sisteminden kaynaklan\u0131yor.<\/p>\n<h2>Federal tecrit<\/h2>\n<p>Modern fidye yaz\u0131l\u0131m\u0131 operat\u00f6rleri, yaln\u0131zca verileri \u015fifreleyip, bu verilerin \u015fifresini kald\u0131rmak i\u00e7in fidye talep etmekle yetinmiyor, ayn\u0131 zamanda para s\u0131zd\u0131rmak amac\u0131yla bilgileri de \u00e7al\u0131yorlar. Colonial Pipeline olay\u0131nda da sald\u0131rganlar, kurumsal a\u011fdan <a href=\"https:\/\/securityboulevard.com\/2021\/05\/colonial-pipeline-fail-ransomware-gang-threatens-gas-supplies\/\" target=\"_blank\" rel=\"noopener nofollow\">yakla\u015f\u0131k 100 GB boyundaki veriyi \u00e7ektiler.<\/a><\/p>\n<p>Ancak <a href=\"https:\/\/www.washingtonpost.com\/business\/2021\/05\/10\/colonial-pipeline-gas-oil-markets\/\" target=\"_blank\" rel=\"noopener nofollow\"><em>Washington Post\u2019un<\/em> aktard\u0131\u011f\u0131na g\u00f6re<\/a> harici olay m\u00fcfetti\u015fleri, ya\u015fananlar\u0131, \u00e7al\u0131nan verilerin yerini hemen \u00f6\u011frendi ve daha sonra FBI temasa ge\u00e7tiler. Bu sayede federaller, y\u00fcklenen bilgilerin tutuldu\u011fu sunucunun sahibi olan internet servis sa\u011flay\u0131c\u0131ya (ISS) ula\u015ft\u0131 ve sunucuyu izole ettirdi. Sonu\u00e7 olarak siber su\u00e7lular Colonial Pipeline\u2019dan \u00e7ald\u0131klar\u0131 bilgilere eri\u015fimlerini kaybetmi\u015f olabilirler. Bu \u015fekilde h\u0131zl\u0131 aksiyon al\u0131nmas\u0131 hasar\u0131 en az\u0131ndan k\u0131smen de olsa hafifletti.<\/p>\n<p>Bunun oldu\u011funu bilmek, \u015firketin ana boru hatlar\u0131n\u0131 tekrar \u00e7al\u0131\u015f\u0131r duruma getirmez, ancak ya\u015fanan hasar \u00f6nemli olsa da, \u00e7ok daha k\u00f6t\u00fcs\u00fc olabilirdi.<\/p>\n<h2>\u0130li\u015fkilendirme<\/h2>\n<p>G\u00f6r\u00fcn\u00fc\u015fe g\u00f6re \u015firket, hem Windows hem de Linux i\u015fletim sistemleri \u00fczerinde \u00e7al\u0131\u015fabilen DarkSide fidye yaz\u0131l\u0131m\u0131 taraf\u0131ndan sald\u0131r\u0131ya u\u011frad\u0131. Kaspersky \u00fcr\u00fcnleri, bu k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m\u0131 Trojan-Ransom.Win32.Darkside ve Trojan-Ransom.Linux.Darkside olarak alg\u0131lar. DarkSide, g\u00fc\u00e7l\u00fc \u015fifreleme algoritmalar\u0131 kullan\u0131yor ve do\u011fru anahtar olmadan verilerin geri y\u00fcklenmesini imkans\u0131z hale getiriyor.<\/p>\n<p>Bak\u0131ld\u0131\u011f\u0131nda <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/darkside-ransomware-industry\/9535\/\" target=\"_blank\" rel=\"noopener\">DarkSide grubu<\/a>, yard\u0131m masas\u0131, Halkla \u0130li\u015fkiler departman\u0131 ve bas\u0131n merkeziyle tam bir online servis sa\u011flay\u0131c\u0131 gibi g\u00f6r\u00fcn\u00fcyor. Su\u00e7lular\u0131n internet sitesinde yer alan bir notta, sald\u0131r\u0131n\u0131n siyasi nedenlerle de\u011fil ekonomik nedenlerle ger\u00e7ekle\u015ftirildi\u011fi belirtiliyor.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-9654\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2021\/05\/24103932\/pipeline-ransomware-mitigation-darkside.jpg\" alt=\"\" width=\"933\" height=\"139\"><\/p>\n<p>DarkSide grubu, sald\u0131r\u0131lar\u0131 ger\u00e7ekle\u015ftiren ortaklar\u0131na yaz\u0131l\u0131m ve ilgili altyap\u0131 sa\u011flayan, <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/ransomware-as-a-service-raas\/\" target=\"_blank\" rel=\"noopener\">hizmet olarak fidye yaz\u0131l\u0131m\u0131<\/a> modelini kullan\u0131yor. Bu ortaklardan biri, Colonial Pipeline\u2019\u0131 hedef alan sald\u0131r\u0131n\u0131n sorumlusuydu. DarkSide\u2019a g\u00f6re, grup bu kadar ciddi sosyal sonu\u00e7lara neden olma niyetinde de\u011fildi ve bundan sonra \u201carac\u0131lar\u0131n\u0131n\u201d se\u00e7ti\u011fi kurbanlar\u0131 daha yak\u0131ndan takip edecek. Ancak PR numaralar\u0131yla dolu bir bildiride yer alan bir ifadeyi ciddiye almak olduk\u00e7a zor.<\/p>\n<h2>G\u00fcvenli\u011finizi nas\u0131l sa\u011flayabilirsiniz?<\/h2>\n<p>Uzmanlar\u0131m\u0131z, \u015firketinizi fidye yaz\u0131l\u0131mlar\u0131ndan koruma konusunda \u015funlar\u0131 \u00f6neriyorlar:<\/p>\n<ul>\n<li>Halka a\u00e7\u0131k a\u011flardan, uzak masa\u00fcst\u00fc hizmetlerine (RDP gibi) yap\u0131lan gereksiz ba\u011flant\u0131lar\u0131 yasaklay\u0131n ve bu t\u00fcr hizmetler i\u00e7in her zaman g\u00fc\u00e7l\u00fc parolalar kullan\u0131n;<\/li>\n<li>Uzaktan \u00e7al\u0131\u015fanlar\u0131 \u015firket a\u011f\u0131na ba\u011flamak i\u00e7in kulland\u0131\u011f\u0131n\u0131z VPN \u00e7\u00f6z\u00fcmleri i\u00e7in t\u00fcm mevcut yamalar\u0131 y\u00fckleyin;<\/li>\n<li>G\u00fcvenlik a\u00e7\u0131klar\u0131ndan faydan\u0131lmas\u0131n\u0131 \u00f6nlemek i\u00e7in t\u00fcm ba\u011fl\u0131 cihazlardaki yaz\u0131l\u0131mlar\u0131 g\u00fcncelleyin;<\/li>\n<li>T\u00fcm giden trafi\u011fe \u00f6zellikle dikkat ederek, yanal hareketi ve veri h\u0131rs\u0131zl\u0131\u011f\u0131n\u0131 tespit eden savunma stratejisine odaklan\u0131n;<\/li>\n<li>Verileri d\u00fczenli olarak yedekleyin ve acil durumlarda yedeklerinize kolayca eri\u015febildi\u011finizden emin olun;<\/li>\n<li>Sald\u0131r\u0131 taktikleri, teknikleri ve prosed\u00fcrleri konusunda kendinizi g\u00fcncel tutmak i\u00e7in <a href=\"https:\/\/www.kaspersky.com.tr\/enterprise-security\/threat-intelligence?icid=tr_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener\">tehdit istihbarat\u0131<\/a> verilerinden yararlan\u0131n;<\/li>\n<li><a href=\"https:\/\/www.kaspersky.com.tr\/enterprise-security\/threat-management-defense-solution?icid=tr_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder____tmd___\" target=\"_blank\" rel=\"noopener\">Kaspersky Endpoint Detection and Response<\/a> ve <a href=\"https:\/\/www.kaspersky.com\/enterprise-security\/managed-detection-and-response?icid=tr_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Managed Detection and Response<\/a> gibi sald\u0131r\u0131lar\u0131 ba\u015flang\u0131\u00e7 a\u015famas\u0131nda durdurmaya yard\u0131mc\u0131 olan g\u00fcvenlik \u00e7\u00f6z\u00fcmleri kullan\u0131n;<\/li>\n<li><a href=\"https:\/\/k-asap.com\/tr\/?icid=tr_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______&amp;utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=tr_wpplaceholder_nv0092&amp;utm_content=link&amp;utm_term=tr_kdaily_organic_avmwswubv8qh92b\" target=\"_blank\" rel=\"noopener\">\u00c7al\u0131\u015fanlar\u0131n\u0131za kurumsal ortam\u0131n g\u00fcvenli\u011fine dikkat etmeleri konusunda e\u011fitim verin<\/a>;<\/li>\n<li>G\u00fcvenlik a\u00e7\u0131klar\u0131ndan yararlanan yaz\u0131l\u0131mlara kar\u015f\u0131 koyan, anormal davran\u0131\u015flar\u0131 tespit eden ve k\u00f6t\u00fc ama\u00e7l\u0131 de\u011fi\u015fiklikleri geri al\u0131p sistemi geri y\u00fckleyebilen <a href=\"https:\/\/www.kaspersky.com.tr\/small-to-medium-business-security?icid=tr_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener\">u\u00e7 nokta korumas\u0131 i\u00e7in g\u00fcvenilir bir \u00e7\u00f6z\u00fcm<\/a> kullan\u0131n.<\/li>\n<\/ul>\n<p>Colonial Pipeline olay\u0131, h\u0131zl\u0131 bir \u015fekilde yasal makamlarla ileti\u015fime ge\u00e7menin sa\u011flad\u0131\u011f\u0131 avantaj\u0131 g\u00f6steriyor. Yard\u0131m edebileceklerinin garantisi yoktur elbette ancak bu, olas\u0131 hasar\u0131 en aza indirebilir.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kesb-trial-leadgen\">\n<p>\u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Fidye yaz\u0131l\u0131m\u0131 konusunda yetkililere ba\u015fvurman\u0131z gerekiyor mu?<\/p>\n","protected":false},"author":700,"featured_media":9655,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1726,1194],"tags":[2418,591,2362],"class_list":{"0":"post-9653","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-enterprise","8":"category-business","9":"tag-darkside","10":"tag-fidye-yazilimi","11":"tag-para-sizdirma"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/pipeline-ransomware-mitigation\/9653\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/pipeline-ransomware-mitigation\/22848\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/pipeline-ransomware-mitigation\/18331\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/pipeline-ransomware-mitigation\/24767\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/pipeline-ransomware-mitigation\/22760\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/pipeline-ransomware-mitigation\/21893\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/pipeline-ransomware-mitigation\/25302\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/pipeline-ransomware-mitigation\/24646\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/pipeline-ransomware-mitigation\/30700\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/pipeline-ransomware-mitigation\/39907\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/pipeline-ransomware-mitigation\/16925\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/pipeline-ransomware-mitigation\/17490\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/pipeline-ransomware-mitigation\/14836\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/pipeline-ransomware-mitigation\/26738\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/pipeline-ransomware-mitigation\/30681\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/pipeline-ransomware-mitigation\/27045\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/pipeline-ransomware-mitigation\/23885\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/pipeline-ransomware-mitigation\/29225\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/pipeline-ransomware-mitigation\/29022\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/fidye-yazilimi\/","name":"Fidye Yaz\u0131l\u0131m\u0131"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/9653","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/700"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=9653"}],"version-history":[{"count":1,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/9653\/revisions"}],"predecessor-version":[{"id":9656,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/9653\/revisions\/9656"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/9655"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=9653"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=9653"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=9653"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}