{"id":9704,"date":"2021-06-08T13:05:08","date_gmt":"2021-06-08T10:05:08","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=9704"},"modified":"2021-06-08T13:05:08","modified_gmt":"2021-06-08T10:05:08","slug":"rsa2021-dangerous-iot","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/rsa2021-dangerous-iot\/9704\/","title":{"rendered":"A\u011fa ba\u011fl\u0131 IoT cihazlar\u0131n\u0131 m\u0131 korumal\u0131 yoksa a\u011f\u0131 IoT cihazlar\u0131ndan m\u0131?"},"content":{"rendered":"<p><a href=\"https:\/\/www.kaspersky.com\/blog\/tag\/rsac\/\" target=\"_blank\" rel=\"noopener nofollow\">2021 RSA Konferans\u0131<\/a>\u2018nda d\u00fczenlenen <a href=\"https:\/\/www.rsaconference.com\/usa\/agenda\/session\/Into%20the%20Mind%20of%20an%20IoT%20Hacker%20%20How%20to%20Protect%20IoT%20Networks%20%20Devices\" target=\"_blank\" rel=\"noopener nofollow\">Bir IoT Hacker\u0131n\u0131n Zihnine (Into the Mind of an IoT Hacker)<\/a> oturumunda g\u00fcvenlik uzmanlar\u0131 Itzik Feiglevitch ve Justin Sowder, \u00e7e\u015fitli IoT cihazlar\u0131ndaki g\u00fcvenlik a\u00e7\u0131klar\u0131 ve kurumsal siber g\u00fcvenlik a\u00e7\u0131s\u0131ndan ele al\u0131nmas\u0131 gereken \u00f6zel uygulamalar konusuna dikkat \u00e7ektiler. Bununla birlikte g\u00fcn\u00fcm\u00fcz i\u015fletmelerideki IoT g\u00fcvenli\u011fine ili\u015fkin durumu g\u00f6steren birka\u00e7 \u00e7arp\u0131c\u0131 \u00f6rnek sundular.<\/p>\n<p>Kurumsal IoT donan\u0131mlar\u0131n\u0131 takip eden az say\u0131da siber g\u00fcvenlik uzman\u0131 var. B\u00fcy\u00fck bir \u00e7o\u011funlu\u011fu bu donan\u0131mlar\u0131 takip etmez \u00e7\u00fcnk\u00fc ak\u0131ll\u0131 asans\u00f6rler, her t\u00fcrdeki sens\u00f6rler, IPTV, yaz\u0131c\u0131lar, g\u00fcvenlik kameralar\u0131 ve bunun gibi \u00e7ok geni\u015f bir yelpazede yer alan cihazlar\u0131n her biri kendi i\u015fletim sistemine ve tescilli protokollere sahiptir ve bir\u00e7o\u011funda olup biteni g\u00f6rebilece\u011finiz d\u00fczg\u00fcn bir kontrol aray\u00fcz\u00fc bulunmaz. \u015eirketinizde bu cihazlardan binlercesi olabilir.<\/p>\n<h2>IoT cihazlar\u0131n\u0131n yeni siber g\u00fcvenlik riskleri yaratmas\u0131n\u0131n nedeni<\/h2>\n<p>IoT cihazlar\u0131 her zaman ilgili altyap\u0131ya ait de\u011fildir; bir a\u011fa ba\u011fl\u0131 bir yaz\u0131c\u0131 normalde bir a\u011f ayg\u0131t\u0131 olarak say\u0131lsa da, ayn\u0131 \u015fey \u201cak\u0131ll\u0131 bina\u201d bile\u015fenleri ve hatta IP telefon sistemleri i\u00e7in ge\u00e7erli de\u011fildir. A\u00e7\u0131k olmak gerekirse, bu t\u00fcr cihazlar kurumsal i\u015f istasyonlar\u0131yla ayn\u0131 a\u011fa ba\u011flanma e\u011filimindedir.<\/p>\n<p>Personel de\u011fi\u015fikli\u011fi de durumun daha karma\u015f\u0131k hale gelmesine neden olabiliyor. Siber g\u00fcvenlik ve BT personelindeki de\u011fi\u015fim oran\u0131 ne kadar y\u00fcksekse, yeni \u00e7al\u0131\u015fmaya ba\u015flayan bir personelin a\u011fa ba\u011fl\u0131 IoT hayvanat bah\u00e7esi hakk\u0131nda bilgi sahibi olma olas\u0131l\u0131\u011f\u0131 da o kadar d\u00fc\u015f\u00fck olur.<\/p>\n<p>Belki de bu durumla ilgili ya\u015fanabilecek en k\u00f6t\u00fc senaryo, bu cihazlardan baz\u0131lar\u0131na d\u0131\u015far\u0131dan eri\u015filebilmesidir. Bunu konuda sa\u011flay\u0131c\u0131n\u0131n cihaz \u00fczerinde baz\u0131 kontroller ger\u00e7ekle\u015ftirmesi, evden \u00e7al\u0131\u015fma imkan\u0131, bak\u0131m gibi ge\u00e7erli nedenler olabilir ancak ancak bir yandan kurumsal a\u011fa ba\u011fl\u0131 cihazlar\u0131n olmas\u0131, di\u011fer yandan cihazlar\u0131n s\u00fcrekli internet ba\u011fl\u0131 olmas\u0131 risk do\u011furur.<\/p>\n<p>Kula\u011fa \u00e7eli\u015fkili gelebilir ancak g\u00fcn\u00fcm\u00fcz elektronik cihazlar\u0131n sa\u011flaml\u0131\u011f\u0131 bir ba\u015fka risk fakt\u00f6r\u00fcd\u00fcr: Baz\u0131 IoT cihazlar\u0131n\u0131n \u00f6mr\u00fc \u00e7ok uzundur ve tasarland\u0131klar\u0131 zamana g\u00f6re \u00e7ok daha karma\u015f\u0131k g\u00fcvenlik ortamlar\u0131nda \u00e7al\u0131\u015f\u0131rlar.<\/p>\n<p>\u00d6rne\u011fin baz\u0131 cihazlar, art\u0131k g\u00fcncellenmeyen eski, g\u00fcvenlik a\u00e7\u0131\u011f\u0131 bulunan i\u015fletim sistemleri \u00fczerinde \u00e7al\u0131\u015f\u0131rlar ve bu sistemler g\u00fcncellenebilseler bile g\u00fcncellemenin cihaza fiziksel eri\u015fim sa\u011flanarak yap\u0131lmas\u0131 gerekebilir ki bu da zordan imkans\u0131za varan seviyede bir olas\u0131l\u0131kt\u0131r. Baz\u0131 cihazlarda ise de\u011fi\u015ftirilemeyen parolalar, arka kap\u0131 hata ay\u0131klamalar\u0131n\u0131n yanl\u0131\u015fl\u0131kla son s\u00fcr\u00fcmdeki \u00fcr\u00fcn yaz\u0131l\u0131m\u0131nda kalmas\u0131 ve bunun gibi, bir BT g\u00fcvenlik uzman\u0131n\u0131n hayat\u0131na heyecan katacak bir \u00e7ok s\u00fcrpriz vard\u0131r.<\/p>\n<h2>Sald\u0131rganlar\u0131n IoT cihazlar\u0131na ilgi duymalar\u0131n\u0131n nedeni<\/h2>\n<p>Siber su\u00e7lular, hem ana bilgisayar\u0131n bulundu\u011fu \u015firketlere sald\u0131rmak hem de di\u011fer \u015firketlere y\u00f6nelik sald\u0131r\u0131lar d\u00fczenlemek gibi \u00e7e\u015fitli nedenlerle IoT cihazlar\u0131n\u0131 ilgi \u00e7ekici buluyorlar. G\u00fcvenli\u011fi ihlal edilmi\u015f ak\u0131ll\u0131 cihazlar genellikle \u015fu temel ama\u00e7lar i\u00e7in kullan\u0131l\u0131yor:<\/p>\n<ul>\n<li>DDoS sald\u0131r\u0131lar\u0131 i\u00e7in bir botnet olu\u015fturmak;<\/li>\n<li>Kripto para madencili\u011fi;<\/li>\n<li>Gizli bilgileri \u00e7almak;<\/li>\n<li>Sabotaj;<\/li>\n<li>A\u011fda daha fazla sald\u0131r\u0131 ger\u00e7ekle\u015ftirmek ve yanal hareket i\u00e7in bir s\u0131\u00e7rama tahtas\u0131 olarak kullanmak.<\/li>\n<\/ul>\n<h2>\u00d6rnek olay incelemeleri<\/h2>\n<p>Ara\u015ft\u0131rmac\u0131lar olduk\u00e7a sa\u00e7ma baz\u0131 vakalar anlatt\u0131lar. Bunlar hem internete ba\u011fl\u0131 standart cihazlarla hem de olduk\u00e7a belirli bir amaca y\u00f6nelik olan \u00f6zel cihazlarla ilgiliydi. Dikkat \u00e7eken iki \u00f6rnekte, ultrason cihazlar\u0131 ve Zigbee protokollerini kullanan cihazlar \u00f6ne \u00e7\u0131k\u0131yor.<\/p>\n<h3>Ultrason cihaz\u0131<\/h3>\n<p>Sa\u011fl\u0131k sekt\u00f6r\u00fcnde faaliyet g\u00f6steren g\u00fcn\u00fcm\u00fcz i\u015fletmeleri, \u00e7ok say\u0131da IoT t\u0131bbi cihazdan yararlan\u0131yor. Ara\u015ft\u0131rmac\u0131lar, bu cihazlar\u0131n g\u00fcvenli\u011fini test etmek i\u00e7in kullan\u0131lm\u0131\u015f bir ultrason cihaz\u0131 sat\u0131n ald\u0131 ve onu hacklemeye \u00e7al\u0131\u015ft\u0131. Cihaz\u0131 ele ge\u00e7irmek yaln\u0131zca be\u015f dakikalar\u0131n\u0131 ald\u0131; cihaz, Windows 2000\u2019in hi\u00e7 g\u00fcncellenmemi\u015f bir s\u00fcr\u00fcm\u00fcn ile \u00e7al\u0131\u015f\u0131yordu. Ayr\u0131ca, sadece cihaz\u0131n kontrol\u00fcn\u00fc ele ge\u00e7irmekle kalmay\u0131p, ayn\u0131 zamanda \u00f6nceki sahibin cihazdan silmedi\u011fi hasta verilerine de eri\u015febildiler.<\/p>\n<p>Doktorlar genellikle t\u0131bbi cihazlar\u0131 y\u0131llarca, hatta on y\u0131llarca g\u00fcncellemeden veya y\u00fckseltmeden kullan\u0131rlar. E\u011fer cihaz bozulmad\u0131ysa ya da ba\u015fka bir neden yoksa bu anla\u015f\u0131labilir bir durumdur ancak bu cihazlar \u00f6m\u00fcrleri boyunca sadece onlar\u0131 sat\u0131n alan ilk i\u015fletmede kullan\u0131lmazlar; genellikle ba\u015fkas\u0131na sat\u0131l\u0131r ve kullan\u0131lmaya devam ederler.<\/p>\n<h3>Zigbee protokolleri<\/h3>\n<p>\u015eirketler, \u00f6rg\u00fcsel a\u011f olu\u015fturmak ve \u00e7o\u011funlukla ak\u0131ll\u0131 bir binadaki \u00e7e\u015fitli bile\u015fenleri birbiriyle ba\u011flamak i\u00e7in cihazlar aras\u0131nda enerji tasarruflu kablosuz ileti\u015fim sa\u011flanmas\u0131 amac\u0131yla 2003 y\u0131l\u0131nda geli\u015ftirilen Zigbee a\u011f protokollerini kullan\u0131rlar. Sonu\u00e7 olarak, ofiste herhangi bir yerde olan bir a\u011f ge\u00e7idi ile \u00f6rne\u011fin bir ak\u0131ll\u0131 ayd\u0131nlatma sistemi gibi d\u00fczinelerce farkl\u0131 cihaz\u0131 kontrol edilir.<\/p>\n<p>Baz\u0131 ara\u015ft\u0131rmac\u0131lar, bir siber su\u00e7lunun normal bir diz\u00fcst\u00fc bilgisayarda, bir Zigbee cihaz\u0131n\u0131 kolayca taklit edebilece\u011fini, bir a\u011f ge\u00e7idine ba\u011flanabilece\u011fini ve k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m y\u00fckleyebilece\u011fini s\u00f6yl\u00fcyor. Siber su\u00e7lunun, \u00f6rne\u011fin ofis lobisi gibi Zigbee a\u011f\u0131n\u0131n kapsama alan\u0131 i\u00e7inde olmas\u0131 yeterlidir. A\u011f ge\u00e7idinin kontrol\u00fcn\u00fc ele ge\u00e7irdikten sonra a\u011fa ba\u011fl\u0131 cihazlar\u0131, \u00f6rne\u011fin binadaki t\u00fcm ak\u0131ll\u0131 \u0131\u015f\u0131klar\u0131 kapatmak gibi bir \u00e7ok bir \u015fekilde sabote edebilirler.<\/p>\n<h2>Kurumsal bir a\u011f\u0131n g\u00fcvenli\u011finin sa\u011flanmas\u0131<\/h2>\n<p>G\u00fcvenlik g\u00f6revlileri, kurumsal <em>a\u011fdaki<\/em> IOT cihazlar\u0131n\u0131n m\u0131, yoksa kurumsal a\u011f\u0131n IOT <em>cihazlar\u0131ndan<\/em> m\u0131 korunmas\u0131 gerekti\u011fi konusundan her zaman emin olam\u0131yorlar. Asl\u0131nda her iki sorunun da \u00e7\u00f6z\u00fclmesi gerekiyor. Buradaki as\u0131l \u00f6nemli nokta, a\u011fdaki her unsurun ve i\u015flemin g\u00f6r\u00fcn\u00fcr olmas\u0131n\u0131n sa\u011flanmas\u0131d\u0131r. Kurumsal g\u00fcvenli\u011fin sa\u011flanmas\u0131, \u00f6ncelikle a\u011fa ba\u011fl\u0131 t\u00fcm cihazlar\u0131n tan\u0131mlanmas\u0131n\u0131, do\u011fru \u015fekilde s\u0131n\u0131fland\u0131r\u0131lmas\u0131n\u0131 ve ideal olarak ilgili risklerin analiz edilmesini gerektirir.<\/p>\n<p>Bir sonraki ad\u0131m, tabi ki, analiz sonu\u00e7lar\u0131na g\u00f6re a\u011f b\u00f6l\u00fcmlendirmesi yap\u0131lmas\u0131d\u0131r. Bir cihaz\u0131n kullan\u0131m\u0131 zorunlu ve ikamesi m\u00fcmk\u00fcn de\u011fil ancak g\u00fcncellemelerle giderilemeyecek g\u00fcvenlik a\u00e7\u0131klar\u0131na sahipse a\u011f\u0131n\u0131z\u0131, savunmas\u0131z cihazlar\u0131n internete eri\u015fimini engelleyecek \u015fekilde yap\u0131land\u0131rman\u0131z ve ayr\u0131ca di\u011fer a\u011f segmentlerine olan eri\u015fimlerini kald\u0131rman\u0131z gereklidir. \u0130deali, <u>segmentasyon i\u00e7in<\/u> bir <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/zero-trust-security\/8619\/\" target=\"_blank\" rel=\"noopener\">S\u0131f\u0131r G\u00fcven konsepti<\/a> kullanman\u0131zd\u0131r.<\/p>\n<p>\u0130lgili segmentlerdeki anormallikler i\u00e7in a\u011f trafi\u011fini izlemek, DDoS sald\u0131r\u0131lar\u0131 veya madencilik amac\u0131yla kullan\u0131lan g\u00fcvenli\u011fi ihlal edilmi\u015f IoT cihazlar\u0131n\u0131 izleme beceriniz a\u00e7\u0131s\u0131ndan da kritik \u00f6neme sahiptir.<\/p>\n<p>Son olarak, a\u011fa eri\u015fim i\u00e7in ba\u011flant\u0131 noktas\u0131 olu\u015fturmak ve di\u011fer sistemlere sald\u0131rmak amac\u0131yla IoT cihazlar\u0131n\u0131 kullanan geli\u015fmi\u015f sald\u0131r\u0131lar\u0131n erken tespiti i\u00e7in\u00a0<a href=\"https:\/\/www.kaspersky.com.tr\/enterprise-security\/threat-management-defense-solution?icid=tr_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder____tmd___\" target=\"_blank\" rel=\"noopener\">EDR s\u0131n\u0131f\u0131 bir \u00e7\u00f6z\u00fcm<\/a> kullan\u0131n.<\/p>\n<p><strong><input type=\"hidden\" class=\"category_for_banner\" value=\"kesb-b2b\"><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>IoT cihazlar\u0131, bir \u015firketin sald\u0131r\u0131 y\u00fczeyini \u00f6nemli \u00f6l\u00e7\u00fcde art\u0131rma e\u011filiminde olsa da riski en aza indirebilirsiniz. <\/p>\n","protected":false},"author":700,"featured_media":9705,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1726,1194],"tags":[1922,790,629,1876,2420,815,2411,2428],"class_list":{"0":"post-9704","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-enterprise","8":"category-business","9":"tag-akilli-cihazlar","10":"tag-guvenlik-aciklari","11":"tag-iot","12":"tag-rsa-konferansi","13":"tag-rsa2021","14":"tag-rsac","15":"tag-saglik-hizmetleri","16":"tag-tip"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/rsa2021-dangerous-iot\/9704\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/rsa2021-dangerous-iot\/22927\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/rsa2021-dangerous-iot\/18413\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/rsa2021-dangerous-iot\/24865\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/rsa2021-dangerous-iot\/22850\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/rsa2021-dangerous-iot\/22062\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/rsa2021-dangerous-iot\/25426\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/rsa2021-dangerous-iot\/24855\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/rsa2021-dangerous-iot\/30870\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/rsa2021-dangerous-iot\/40161\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/rsa2021-dangerous-iot\/17080\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/rsa2021-dangerous-iot\/17577\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/rsa2021-dangerous-iot\/14898\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/rsa2021-dangerous-iot\/26892\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/rsa2021-dangerous-iot\/31005\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/rsa2021-dangerous-iot\/27144\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/rsa2021-dangerous-iot\/23996\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/rsa2021-dangerous-iot\/29304\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/rsa2021-dangerous-iot\/29101\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/rsac\/","name":"RSAC"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/9704","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/700"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=9704"}],"version-history":[{"count":1,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/9704\/revisions"}],"predecessor-version":[{"id":9706,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/9704\/revisions\/9706"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/9705"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=9704"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=9704"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=9704"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}