{"id":9695,"date":"2021-06-07T11:57:44","date_gmt":"2021-06-07T08:57:44","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=9695"},"modified":"2021-06-07T11:57:44","modified_gmt":"2021-06-07T08:57:44","slug":"rsa2021-hijacked-router","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/rsa2021-hijacked-router\/9695\/","title":{"rendered":"Y\u00f6nlendiriciler, uzaktan \u00e7al\u0131\u015fma stratejisindeki zay\u0131f noktay\u0131 g\u00f6steriyor"},"content":{"rendered":"<p>Siber g\u00fcvenlik a\u00e7\u0131s\u0131ndan bak\u0131ld\u0131\u011f\u0131nda, b\u00fcy\u00fck \u00e7apta uzaktan \u00e7al\u0131\u015fmaya ge\u00e7i\u015fin beraberinde getirdi\u011fi en b\u00fcy\u00fck olumsuzluk, i\u015f istasyonlar\u0131n\u0131n ba\u011fl\u0131 oldu\u011fu yerel a\u011f ortamlar\u0131 \u00fczerindeki kontrol\u00fcn kaybedilmesi olmu\u015ftur. Bu ba\u011flamda \u00f6zellikle tehlike yaratan \u015fey, normalde BT uzmanlar\u0131n\u0131n kontrol\u00fcnde olan a\u011f altyap\u0131s\u0131n\u0131n yerini alan \u00e7al\u0131\u015fanlar\u0131n evlerinde kulland\u0131\u011f\u0131 y\u00f6nlendiricilerdir. <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/tag\/rsac\/\" target=\"_blank\" rel=\"noopener\">2021 RSA Konferans\u0131<\/a>\u2018nda ara\u015ft\u0131rmac\u0131lar Charl van der Walt ve Wicus Ross, <a href=\"https:\/\/www.rsaconference.com\/usa\/agenda\/session\/insecure-remote-access\" target=\"_blank\" rel=\"noopener nofollow\">\u201cB\u00fct\u00fcn yerel a\u011f\u0131n\u0131z elimizde. Uzaktan \u00e7al\u0131\u015fanlara y\u00f6nelik tehditlerin y\u00f6netilmesi.\u201d<\/a> isimli sunumda, siber su\u00e7lular\u0131n y\u00f6nlendiriciler arac\u0131l\u0131\u011f\u0131yla i\u015f bilgisayarlar\u0131na sald\u0131rabilecekleri yollardan bahsettiler.<\/p>\n<h2>\u00c7al\u0131\u015fanlar\u0131n evde kulland\u0131\u011f\u0131 y\u00f6nlendiricilerin neden oldu\u011fu b\u00fcy\u00fck sorun<\/h2>\n<p>Kurumsal g\u00fcvenlik politikalar\u0131nda t\u00fcm i\u015f bilgisayarlar\u0131ndaki i\u015fletim sistemlerinin ve ilgili di\u011fer t\u00fcm ayarlar\u0131n g\u00fcncellenmesine yer verilmi\u015f olsa bile, evde kullan\u0131lan y\u00f6nlendiriciler hala kurumsal sistem y\u00f6neticilerinin kontrol\u00fcn\u00fcn d\u0131\u015f\u0131ndad\u0131r. Uzaktan \u00e7al\u0131\u015fma ortamlar\u0131 a\u00e7\u0131s\u0131ndan bak\u0131ld\u0131\u011f\u0131nda, bir a\u011fa ba\u011fl\u0131 olan di\u011fer cihazlar, y\u00f6nlendiricinin \u00fcr\u00fcn yaz\u0131l\u0131m\u0131n\u0131n g\u00fcncel olup olmad\u0131\u011f\u0131 ve y\u00f6nlendiricide g\u00fc\u00e7l\u00fc bir parola kullan\u0131l\u0131p kullan\u0131lmad\u0131\u011f\u0131 (veya fabrika ayarlar\u0131nda belirlenmi\u015f olan parolan\u0131n kullan\u0131c\u0131 taraf\u0131ndan de\u011fi\u015ftirilip de\u011fi\u015ftirilmedi\u011fi) BT taraf\u0131ndan bilinemiyor.<\/p>\n<p>Bu kontrol eksikli\u011fi sorunun sadece bir par\u00e7as\u0131. Evlerde ve k\u00fc\u00e7\u00fck ofislerde\/ev ofislerde kullan\u0131lan \u00e7ok say\u0131da y\u00f6nlendiricide, siber su\u00e7lular\u0131n cihaz \u00fczerinde tam kontrol elde etmek i\u00e7in kullanabilecekleri bilindik g\u00fcvenlik a\u00e7\u0131klar\u0131 bulunuyor ve bu durum, onlarca ve hatta bazen y\u00fcz binlerce ele ge\u00e7irilmi\u015f y\u00f6nlendiricinin, farkl\u0131 ama\u00e7larla bir araya getirildi\u011fi <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/attack-on-dyn-explained\/2629\/\" target=\"_blank\" rel=\"noopener\">Mirai<\/a> gibi devasa IoT botnetlerini ortaya \u00e7\u0131kar\u0131yor.<\/p>\n<p>Bu ba\u011flamda, her bir y\u00f6nlendiricinin asl\u0131nda baz\u0131 Linux da\u011f\u0131t\u0131mlar\u0131 ile \u00e7al\u0131\u015fan k\u00fc\u00e7\u00fck birer bilgisayar oldu\u011funu hat\u0131rlamakta fayda var. Siber su\u00e7lular, ele ge\u00e7irilen bir y\u00f6nlendirici ile bir\u00e7ok \u015feyi ba\u015farabilir. \u0130\u015fte konuya ili\u015fkin olarak ara\u015ft\u0131rmac\u0131lar\u0131n raporunda yer alan birka\u00e7 \u00f6rnek.<\/p>\n<h2>Bir VPN ba\u011flant\u0131s\u0131n\u0131 ele ge\u00e7irilmesi<\/h2>\n<p>\u015eirketlerin, uzak \u00e7al\u0131\u015fanlar\u0131n g\u00fcvenli olmayan a\u011f ortamlar\u0131n\u0131n g\u00fcvenli\u011fini sa\u011flamak i\u00e7in kulland\u0131\u011f\u0131 temel ara\u00e7 VPN\u2019dir (sanal \u00f6zel a\u011f). VPN\u2019ler, bilgisayar ve kurumsal altyap\u0131 aras\u0131nda verilerin \u015fifrelenmi\u015f bir ba\u011flant\u0131 \u00fczerinden iletilmesini sa\u011flar.<\/p>\n<p>Bir\u00e7ok \u015firket VPN\u2019leri, RDP (Uzak Masa\u00fcst\u00fc Protokol\u00fc) ba\u011flant\u0131s\u0131 gibi \u015firket sunucular\u0131na gelen trafi\u011fin VPN\u2019den, di\u011fer t\u00fcm trafi\u011fin ise \u015fifrelenmemi\u015f genel a\u011fdan ge\u00e7ti\u011fi <em>b\u00f6l\u00fcnm\u00fc\u015f t\u00fcnel<\/em> (split tunneling) modunda kullan\u0131r, ki bu \u015fekilde kullan\u0131lmas\u0131 iyi bir \u015feydir. Ancak y\u00f6nlendiricinin kontrol\u00fcn\u00fc elinde bulunduran bir siber su\u00e7lu, bir DHCP (Dinamik Ana Bilgisayar Yap\u0131land\u0131rma Protokol\u00fc) rotas\u0131 olu\u015fturabilir ve RDP trafi\u011fini kendi sunucusuna y\u00f6nlendirebilir. Bunu yapmak VPN\u2019nin \u015fifresini \u00e7\u00f6zmelerini sa\u011flamasa da, RDP ba\u011flant\u0131s\u0131 i\u00e7in kullan\u0131lan kimlik bilgilerini ele ge\u00e7irmek i\u00e7in sahte bir giri\u015f ekran\u0131 olu\u015fturabilirler. Fidye yaz\u0131l\u0131m\u0131 doland\u0131r\u0131c\u0131lar\u0131 <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/top5-ransomware-groups\/9564\/\" target=\"_blank\" rel=\"noopener\">RDP kullanmay\u0131 severler<\/a>.<\/p>\n<h2>Harici bir i\u015fletim sistemi y\u00fckleme<\/h2>\n<p>Ele ge\u00e7irilen y\u00f6nlendirici ile ger\u00e7ekle\u015ftirilebilecek di\u011fer bir zekice d\u00fc\u015f\u00fcn\u00fclm\u00fc\u015f sald\u0131r\u0131 senaryosunda, \u00d6ny\u00fckleme \u00d6ncesi Y\u00fcr\u00fctme Ortam\u0131 \u2014 PXE (Preboot Execution Environment) \u00f6zelli\u011finden yararlan\u0131l\u0131r. Modern a\u011f ba\u011fda\u015ft\u0131r\u0131c\u0131lar\u0131, a\u011f \u00fczerinden bilgisayarlara i\u015fletim sistemi y\u00fcklemek i\u00e7in PXE kullan\u0131r. Genel olarak bu \u00f6zellik devre d\u0131\u015f\u0131 b\u0131rak\u0131l\u0131r ancak baz\u0131 \u015firketler, \u00f6rne\u011fin ar\u0131za durumunda bir \u00e7al\u0131\u015fan\u0131n i\u015fletim sistemini uzaktan geri y\u00fcklemek amac\u0131yla bu \u00f6zelli\u011fi kullan\u0131r.<\/p>\n<p>Bir y\u00f6nlendiricideki DHCP sunucusu \u00fczerinde kontrol sahibi olan siber su\u00e7lu, bir i\u015f istasyonunun a\u011f ba\u011fda\u015ft\u0131r\u0131c\u0131s\u0131na, uzaktan kontrol i\u00e7in de\u011fi\u015ftirilmi\u015f bir sistemin adresini girebilir. \u00c7al\u0131\u015fanlar\u0131n, ger\u00e7ekte neler olup bitti\u011fini (hele ki g\u00fcncelleme y\u00fckleme bildirimleri ile dikkatleri da\u011f\u0131ld\u0131ysa) anlamalar\u0131 bir yana, bunu fark etmeleri bile pek olas\u0131 de\u011fildir. Bu esnada siber su\u00e7lular dosya sistemine tam eri\u015fim hakk\u0131na sahip olurlar.<\/p>\n<h2>G\u00fcvenli\u011finizi nas\u0131l sa\u011flayabilirsiniz?<\/h2>\n<p>\u00c7al\u0131\u015fanlar\u0131n\u0131z\u0131n bilgisayarlar\u0131n\u0131 yukar\u0131da verdi\u011fimiz \u00f6rnekler ve benzer t\u00fcrdeki sald\u0131r\u0131lardan korumak i\u00e7in a\u015fa\u011f\u0131daki ad\u0131mlar\u0131 izleyin:<\/p>\n<ul>\n<li>B\u00f6l\u00fcnm\u00fc\u015f yerine zorunlu t\u00fcnel kullanmay\u0131 tercih edin. Bir\u00e7ok kurumsal VPN \u00e7\u00f6z\u00fcm\u00fc, istisnalar d\u0131\u015f\u0131nda zorunlu t\u00fcnel kullan\u0131m\u0131na (belirli kaynaklar\u0131n VPN\u2019i atlamas\u0131na izin verilerek, varsay\u0131lan olarak t\u00fcm trafi\u011fin \u015fifreli bir ba\u011flant\u0131 \u00fczerinden iletildi\u011fi) izin verir;<\/li>\n<li>BIOS ayarlar\u0131ndan \u00d6ny\u00fckleme \u00d6ncesi Y\u00fcr\u00fctme Ortam\u0131n\u0131 devre d\u0131\u015f\u0131 b\u0131rak\u0131n;<\/li>\n<li>Tam disk \u015fifrelemesi kullanarak (\u00f6rne\u011fin, Windows\u2019ta BitLocker ile) bilgisayar\u0131n sabit s\u00fcr\u00fcc\u00fcs\u00fcn\u00fc tamamen \u015fifreleyin.<\/li>\n<\/ul>\n<p>\u00c7al\u0131\u015fanlar\u0131n kulland\u0131\u011f\u0131 y\u00f6nlendiricilerin g\u00fcvenli\u011fine odaklanmak, uzaktan veya hibrit \u00e7al\u0131\u015fma modelindeki herhangi bir kurumsal altyap\u0131n\u0131n g\u00fcvenlik seviyesinin art\u0131r\u0131lmas\u0131 konusunda hayati \u00f6nem ta\u015f\u0131r. Baz\u0131 \u015firketlerde teknik destek personeli, evde kullan\u0131lan y\u00f6nlendiricilerin en do\u011fru \u015fekilde ayarlanmas\u0131 konusunda \u00e7al\u0131\u015fanlara dan\u0131\u015fmanl\u0131k verir. Di\u011fer \u015firketler, uzaktan \u00e7al\u0131\u015fanlar\u0131n kurumsal kaynaklara, \u015firket taraf\u0131ndan kendilerine verilen \u00f6nceden yap\u0131land\u0131r\u0131lm\u0131\u015f y\u00f6nlendiriciler arac\u0131l\u0131\u011f\u0131yla ba\u011flanmas\u0131na izin verir. Bunlara ek olarak, <strong><a href=\"https:\/\/k-asap.com\/tr\/?icid=tr_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______&amp;utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=tr_wpplaceholder_nv0092&amp;utm_content=link&amp;utm_term=tr_kdaily_organic_avmwswubv8qh92b\" target=\"_blank\" rel=\"noopener\">\u00e7al\u0131\u015fanlar\u0131n modern tehditlere kar\u015f\u0131 koymalar\u0131 i\u00e7in e\u011fitilmesi<\/a><\/strong>, a\u011f g\u00fcvenli\u011fi a\u00e7\u0131s\u0131ndan temel \u00f6neme sahiptir.<\/p>\n<p><strong><input type=\"hidden\" class=\"category_for_banner\" value=\"kasap\"><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Evlerde ve k\u00fc\u00e7\u00fck ofislerde\/ev ofislerde kullan\u0131lan y\u00f6nlendiriciler \u00e7o\u011funlukla g\u00fcvenli olmasa da \u015firketler kendilerini, uzaktan \u00e7al\u0131\u015fanlar\u0131n evde kulland\u0131\u011f\u0131 y\u00f6nlendiriciler \u00fczerinden ger\u00e7ekle\u015ftirilen sald\u0131r\u0131lardan koruyabiliyor.<\/p>\n","protected":false},"author":700,"featured_media":9696,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1726,1194],"tags":[1612,1876,2420,815,762,1929],"class_list":{"0":"post-9695","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-enterprise","8":"category-business","9":"tag-rdp","10":"tag-rsa-konferansi","11":"tag-rsa2021","12":"tag-rsac","13":"tag-vpn","14":"tag-yonlendiriciler"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/rsa2021-hijacked-router\/9695\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/rsa2021-hijacked-router\/22921\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/rsa2021-hijacked-router\/18407\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/rsa2021-hijacked-router\/24857\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/rsa2021-hijacked-router\/22844\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/rsa2021-hijacked-router\/22041\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/rsa2021-hijacked-router\/25413\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/rsa2021-hijacked-router\/24838\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/rsa2021-hijacked-router\/30849\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/rsa2021-hijacked-router\/40117\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/rsa2021-hijacked-router\/17057\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/rsa2021-hijacked-router\/17570\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/rsa2021-hijacked-router\/14884\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/rsa2021-hijacked-router\/30982\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/rsa2021-hijacked-router\/27133\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/rsa2021-hijacked-router\/23979\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/rsa2021-hijacked-router\/29298\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/rsa2021-hijacked-router\/29095\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/rsac\/","name":"RSAC"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/9695","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/700"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=9695"}],"version-history":[{"count":1,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/9695\/revisions"}],"predecessor-version":[{"id":9697,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/9695\/revisions\/9697"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/9696"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=9695"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=9695"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=9695"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}