{"id":41069,"date":"2026-02-22T03:39:04","date_gmt":"2026-02-22T03:39:04","guid":{"rendered":"https:\/\/bihavadis.com\/?p=41069"},"modified":"2026-02-22T03:39:04","modified_gmt":"2026-02-22T03:39:04","slug":"kilitle-ifsa-et-baski-kur","status":"publish","type":"post","link":"https:\/\/bihavadis.com\/index.php\/2026\/02\/22\/kilitle-ifsa-et-baski-kur\/","title":{"rendered":"Kilitle, if\u015fa et, bask\u0131 kur"},"content":{"rendered":"<p><strong>Fidye yaz\u0131l\u0131m\u0131 geni\u015f bir su\u00e7lu kitlesinin ilgisini \u00e7ekmeye devam ederken tehditlerin uyarlanabilirli\u011fi ve kal\u0131c\u0131l\u0131\u011f\u0131 da art\u0131yor. Su\u00e7lular \u00e7al\u0131nan verileri kamuoyu \u00f6n\u00fcnde sergileyebildikleri s\u00fcrece bu y\u00f6ntemi kullanmay\u0131 s\u00fcrd\u00fcr\u00fcyor ve fidye yaz\u0131l\u0131m\u0131 su\u00e7 ekonomisi i\u00e7in \u00f6nemli bir gelir kayna\u011f\u0131 olmaya devam ediyor. Siber g\u00fcvenlik \u015firketi ESET, kurulu\u015flar\u0131n fidye yaz\u0131l\u0131m\u0131 tehdidi i\u00e7in almalar\u0131 gereken savunma \u00f6nlemleri ile ilgili bilgilendirmede bulundu.<\/strong><\/p>\n<p>Siber su\u00e7lar ya\u015fanan d\u00f6nemin \u00f6zelliklerine ve teknolojinin geli\u015fimine g\u00f6re de\u011fi\u015fiyor. Siber \u015fantaj, daha geni\u015f bir su\u00e7 kategorisi olarak kal\u0131c\u0131l\u0131\u011f\u0131n\u0131 kan\u0131tlam\u0131\u015f olsa da en zararl\u0131 t\u00fcrlerinden biri olan fidye yaz\u0131l\u0131m\u0131 art\u0131k yaln\u0131zca \u015fifreleme ile s\u0131n\u0131rl\u0131 de\u011fil. \u00a0Ge\u00e7mi\u015fte sald\u0131rganlar dosya veya sistemleri kilitleyerek \u015fifre \u00e7\u00f6zme anahtar\u0131 kar\u015f\u0131l\u0131\u011f\u0131nda \u00f6deme talep ederken son y\u0131llarda kampanyalar \u015fifrelemeyi veri s\u0131zd\u0131rma ve \u00e7al\u0131nan bilgileri yay\u0131mlama tehditleriyle birle\u015ftiriyor.<strong>\u00a0<\/strong>Bu noktada \u00f6zel s\u0131z\u0131nt\u0131 siteleri veya veri s\u0131z\u0131nt\u0131 siteleri (DLS\u2019ler) devreye giriyor. \u0130lk olarak 2019\u2019un sonlar\u0131nda ortaya \u00e7\u0131kan bu siteler, \u00e7ift \u015fantaj stratejisinin bel kemi\u011fi h\u00e2line geldi. Tehdit akt\u00f6rleri kurumsal verileri \u015fifrelemeden \u00f6nce \u00e7al\u0131yor ve ard\u0131ndan bu verileri kamuya a\u00e7\u0131k \u015fekilde kullanarak bir g\u00fcvenlik olay\u0131n\u0131 do\u011frudan bir \u00a0krize d\u00f6n\u00fc\u015ft\u00fcr\u00fcyor.<\/p>\n<p>Fidye yaz\u0131l\u0131m\u0131 art\u0131k yaln\u0131zca sistemlerin kilitlenmesi de\u011fil, ayn\u0131 zamanda veri h\u0131rs\u0131zl\u0131\u011f\u0131 ve \u015fantaj sorunu olarak de\u011ferlendiriliyor. Kamuya a\u00e7\u0131k takip projeleri de bu e\u011filimi do\u011frulasa da s\u0131z\u0131nt\u0131 sitelerinin yaln\u0131zca su\u00e7lular\u0131n duyurmay\u0131 se\u00e7ti\u011fi olaylar\u0131 yans\u0131tt\u0131\u011f\u0131, ger\u00e7ek kurban say\u0131s\u0131n\u0131n daha y\u00fcksek olabilece\u011fi belirtiliyor.<\/p>\n<p><strong>Veri s\u0131z\u0131nt\u0131 siteleri nas\u0131l kullan\u0131l\u0131yor?<\/strong><\/p>\n<p>Dark web \u00fczerinde bar\u0131nd\u0131r\u0131lan ve Tor a\u011f\u0131 \u00fczerinden eri\u015filen veri s\u0131z\u0131nt\u0131 siteleri, genellikle \u00e7al\u0131nan verilerin bir b\u00f6l\u00fcm\u00fcn\u00fc yay\u0131ml\u0131yor. \u00d6deme yap\u0131lmazsa t\u00fcm verilerin a\u00e7\u0131klanaca\u011f\u0131 tehdidinde bulunuyor. Baz\u0131 durumlarda kurban \u00f6deme yapmay\u0131 reddetti\u011finde veriler yay\u0131mlan\u0131yor ve bask\u0131 daha da art\u0131yor. Kurbanlara ait bilgiler, \u00e7al\u0131nan verinin kapsam\u0131 ve belirlenen son tarihler bu stratejinin par\u00e7as\u0131 olarak sunuluyor. Bu yakla\u015f\u0131m\u0131n y\u0131k\u0131c\u0131 etkisi, h\u0131z ve g\u00f6r\u00fcn\u00fcrl\u00fckten kaynaklan\u0131yor. Olay kamuoyuna duyuruldu\u011fu anda birden fazla risk ayn\u0131 anda ortaya \u00e7\u0131k\u0131yor ve \u00e7o\u011fu zaman kurulu\u015flar sald\u0131r\u0131n\u0131n kapsam\u0131n\u0131 tam olarak anlamadan yo\u011fun belirsizlik alt\u0131nda kal\u0131yor.\u00a0<\/p>\n<p>Veri s\u0131z\u0131nt\u0131 siteleri bu nedenle do\u011frudan bir bask\u0131 arac\u0131 olarak kullan\u0131l\u0131yor. Sald\u0131rganlar bl\u00f6f yapmad\u0131klar\u0131n\u0131 g\u00f6stermek i\u00e7in genellikle s\u0131n\u0131rl\u0131 miktarda veri yay\u0131ml\u0131yor. Kurban \u00f6deme yapmazsa daha fazlas\u0131 payla\u015f\u0131lmaya devam ediyor. Zarar \u00e7o\u011fu zaman ilk kurbanla s\u0131n\u0131rl\u0131 kalm\u0131yor. S\u0131zd\u0131r\u0131lan veya yeniden sat\u0131lan veriler kimlik av\u0131, i\u015f e-postas\u0131 doland\u0131r\u0131c\u0131l\u0131\u011f\u0131 ve kimlik sahtek\u00e2rl\u0131\u011f\u0131 gibi sonraki su\u00e7lar\u0131n kayna\u011f\u0131 h\u00e2line geliyor. Tedarik zinciri olaylar\u0131nda ihlal m\u00fc\u015fterilere ve i\u015f ortaklar\u0131na kadar yay\u0131labiliyor. Bu domino etkisi, fidye yaz\u0131l\u0131m\u0131n\u0131n m\u00fcnferit olaylar de\u011fil sistemik bir risk olarak de\u011ferlendirilmesinin nedenlerinden biri olarak g\u00f6r\u00fcl\u00fcyor.<\/p>\n<p><strong>S\u0131z\u0131nt\u0131 sitesinin her \u00f6\u011fesi, psikolojik bask\u0131y\u0131 en \u00fcst d\u00fczeye \u00e7\u0131karmak i\u00e7in tasarlan\u0131yor.<\/strong><\/p>\n<p><strong>Yetkisiz eri\u015fimin kan\u0131t\u0131<\/strong>. \u00c7eteler, sald\u0131r\u0131n\u0131n ger\u00e7ek oldu\u011funu ve tehdidin inand\u0131r\u0131c\u0131 oldu\u011funu g\u00f6stermek i\u00e7in s\u00f6zle\u015fmeler ve \u015firket i\u00e7i e-postalar gibi \u00f6rnek belgeler yay\u0131mlar.\u00a0<\/p>\n<p><strong>Aciliyet<\/strong>: Zamanlay\u0131c\u0131lar ve geri say\u0131mlar, zaman\u0131n dolmakta oldu\u011fu hissini uyand\u0131r\u0131r \u00e7\u00fcnk\u00fc zaman bask\u0131s\u0131 alt\u0131nda al\u0131nan kararlar genellikle saati kontrol eden taraf\u0131n lehine olur.<\/p>\n<p><strong>Kamuya if\u015fa<\/strong>: \u00c7al\u0131nan veriler hi\u00e7bir zaman kamuya a\u00e7\u0131klanmasa bile ihlalle ili\u015fkilendirilmek bile itibar kayb\u0131na neden olur ve bu zarar\u0131n giderilmesi y\u0131llar alabilir.<\/p>\n<p><strong>Yasal risk<\/strong>: Giderek geni\u015fleyen eyalet d\u00fczeyindeki gizlilik yasalar\u0131 gibi \u00e7er\u00e7eveler alt\u0131nda, ki\u015fisel verileri i\u00e7eren do\u011frulanm\u0131\u015f bir ihlal, zorunlu a\u00e7\u0131klamalar, soru\u015fturmalar ve para cezalar\u0131na yol a\u00e7abilir.<\/p>\n<p><strong>Geni\u015f etkiler ve kal\u0131c\u0131 sonu\u00e7lar<\/strong><\/p>\n<p>Veri s\u0131z\u0131nt\u0131s\u0131 ihtimali; itibar kayb\u0131, m\u00fc\u015fteri g\u00fcveninin zedelenmesi, finansal zararlar ve yasal yapt\u0131r\u0131mlar gibi \u00e7ok say\u0131da riski ayn\u0131 anda tetikliyor. \u00c7al\u0131nan verilerin sat\u0131lmas\u0131 su\u00e7 ekonomisini besliyor ve yeni sald\u0131r\u0131lar\u0131n \u00f6n\u00fcn\u00fc a\u00e7\u0131yor. Baz\u0131 gruplar\u0131n \u015fifrelemeyi tamamen atlayarak yaln\u0131zca veri ele ge\u00e7irip yay\u0131mlama tehdidiyle \u015fantaj yapt\u0131\u011f\u0131 da g\u00f6r\u00fcl\u00fcyor.<\/p>\n<p>Kurban durumunda olan kurulu\u015flar \u00e7o\u011fu zaman yeterli de\u011ferlendirme s\u00fcresi olmadan karar vermek zorunda kal\u0131yor. \u0130hlalden etkilenen bireyler ise uzun s\u00fcren temizlik s\u00fcre\u00e7leri, hesap ele ge\u00e7irmeleri ve kimlik doland\u0131r\u0131c\u0131l\u0131\u011f\u0131 gibi risklerle kar\u015f\u0131la\u015f\u0131yor. Fidyeyi \u00f6demek kolay bir \u00e7\u00f6z\u00fcm gibi g\u00f6r\u00fcnse de dosyalar\u0131n geri al\u0131naca\u011f\u0131n\u0131 ya da verilerin gizli kalaca\u011f\u0131n\u0131 garanti etmiyor. \u00d6deme yapan bir\u00e7ok kurulu\u015fun k\u0131sa s\u00fcre i\u00e7inde yeniden sald\u0131r\u0131ya u\u011frad\u0131\u011f\u0131 biliniyor ve yap\u0131lan her \u00f6deme yeni sald\u0131r\u0131lar\u0131n finansman\u0131na katk\u0131 sa\u011fl\u0131yor.<\/p>\n<p><strong>Kurulu\u015flar i\u00e7in fidye yaz\u0131l\u0131m\u0131 tehdidi \u00a0kapsaml\u0131 savunma \u00f6nlemleri gerektirir:<\/strong><\/p>\n<ul>\n<li>EDR\/XDR\/MDR \u00f6zelliklerine sahip geli\u015fmi\u015f g\u00fcvenlik \u00e7\u00f6z\u00fcmleri kullanmak. Bu \u00e7\u00f6z\u00fcmler, yetkisiz i\u015flem y\u00fcr\u00fctme ve \u015f\u00fcpheli yanal hareket gibi anormal davran\u0131\u015flar\u0131 izleyerek tehdidi an\u0131nda durdurur.<\/li>\n<li>\u0130yi tan\u0131mlanm\u0131\u015f, s\u0131k\u0131 eri\u015fim kontrolleriyle yanal hareketleri k\u0131s\u0131tlama. S\u0131f\u0131r G\u00fcven ilkeleri, herhangi bir varl\u0131k i\u00e7in varsay\u0131lan g\u00fcven varsay\u0131mlar\u0131n\u0131 ortadan kald\u0131rarak \u015firketin g\u00fcvenlik durumunu g\u00fc\u00e7lendirir.\u00a0<\/li>\n<li>T\u00fcm yaz\u0131l\u0131mlar\u0131n g\u00fcncel tutulmas\u0131. Bilinen g\u00fcvenlik a\u00e7\u0131klar\u0131, fidye yaz\u0131l\u0131m\u0131 akt\u00f6rleri i\u00e7in ba\u015fl\u0131ca giri\u015f vekt\u00f6rlerinden biridir.\u00a0<\/li>\n<li>Fidye yaz\u0131l\u0131m\u0131n\u0131n eri\u015femeyece\u011fi veya de\u011fi\u015ftiremeyece\u011fi, izole edilmi\u015f, hava bo\u015flu\u011fu olan ortamlarda yedeklemeler saklay\u0131n. Fidye yaz\u0131l\u0131m\u0131n\u0131n birincil amac\u0131, hassas verileri bulmak ve \u015fifrelemektir. Dayan\u0131kl\u0131 yedeklemeler ve fidye yaz\u0131l\u0131m\u0131 giderme yetenekleri, tehdidin neden oldu\u011fu hasar\u0131 azaltmada b\u00fcy\u00fck rol oynar.<\/li>\n<li>\u0130yi tasarlanm\u0131\u015f g\u00fcvenlik fark\u0131ndal\u0131\u011f\u0131 e\u011fitimleriyle etkili bir savunma bariyeri olu\u015fturulabilir. K\u00f6t\u00fc ama\u00e7l\u0131 e-postalar\u0131 erken tespit edebilen bir \u00e7al\u0131\u015fan, fidye yaz\u0131l\u0131m\u0131 akt\u00f6rlerinin en sevdi\u011fi giri\u015f noktalar\u0131ndan birini ortadan kald\u0131r\u0131r ve bu tek ba\u015f\u0131na, t\u00fcm kurulu\u015funuzu ma\u011fdur eden bir sald\u0131r\u0131 riskini \u00f6nemli \u00f6l\u00e7\u00fcde azaltabilir.<\/li>\n<\/ul>\n<p>\u00a0<\/p>\n<p>Kaynak: (BYZHA) Beyaz Haber Ajans\u0131<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Fidye yaz\u0131l\u0131m\u0131 geni\u015f bir su\u00e7lu kitlesinin ilgisini \u00e7ekmeye devam ederken tehditlerin uyarlanabilirli\u011fi ve kal\u0131c\u0131l\u0131\u011f\u0131 da art\u0131yor.<\/p>\n","protected":false},"author":1,"featured_media":41070,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[14],"tags":[5728,286,4583,292,367],"class_list":["post-41069","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-spor","tag-fidye-yazilimi","tag-suc","tag-tehdidi","tag-veri","tag-zaman"],"_links":{"self":[{"href":"https:\/\/bihavadis.com\/index.php\/wp-json\/wp\/v2\/posts\/41069","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/bihavadis.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/bihavadis.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/bihavadis.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/bihavadis.com\/index.php\/wp-json\/wp\/v2\/comments?post=41069"}],"version-history":[{"count":1,"href":"https:\/\/bihavadis.com\/index.php\/wp-json\/wp\/v2\/posts\/41069\/revisions"}],"predecessor-version":[{"id":41071,"href":"https:\/\/bihavadis.com\/index.php\/wp-json\/wp\/v2\/posts\/41069\/revisions\/41071"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/bihavadis.com\/index.php\/wp-json\/wp\/v2\/media\/41070"}],"wp:attachment":[{"href":"https:\/\/bihavadis.com\/index.php\/wp-json\/wp\/v2\/media?parent=41069"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/bihavadis.com\/index.php\/wp-json\/wp\/v2\/categories?post=41069"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/bihavadis.com\/index.php\/wp-json\/wp\/v2\/tags?post=41069"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}