{"id":15250,"date":"2026-05-06T08:41:20","date_gmt":"2026-05-06T08:41:20","guid":{"rendered":"https:\/\/busondakika.com.tr\/?p=15250"},"modified":"2026-05-06T08:41:21","modified_gmt":"2026-05-06T08:41:21","slug":"kaspersky-daemon-tools-resmi-web-sitesi-uzerinden-yurutulen-tedarik-zinciri-saldirisini-ortaya-cikardi","status":"publish","type":"post","link":"https:\/\/busondakika.com.tr\/?p=15250","title":{"rendered":"Kaspersky, Daemon Tools Resmi Web Sitesi \u00dczerinden Y\u00fcr\u00fct\u00fclen Tedarik Zinciri Sald\u0131r\u0131s\u0131n\u0131 Ortaya \u00c7\u0131kard\u0131"},"content":{"rendered":"<p> <strong>Kaspersky\u2019nin K\u00fcresel Ara\u015ft\u0131rma ve Analiz Ekibi (GReAT), yayg\u0131n olarak kullan\u0131lan sanal s\u00fcr\u00fcc\u00fc em\u00fclasyon yaz\u0131l\u0131m\u0131 Daemon Tools&#8217;un resmi web sitesini hedef alan aktif bir tedarik zinciri sald\u0131r\u0131s\u0131 ke\u015ffetti. Ele ge\u00e7irilen y\u00fckleyici, yasal uygulama ile birlikte arka kap\u0131 (backdoor) zararl\u0131 yaz\u0131l\u0131m\u0131 da\u011f\u0131tarak sald\u0131rganlar\u0131n enfekte olan cihazlarda sald\u0131rganlar\u0131n istedikleri herhangi bir komutu \u00e7al\u0131\u015ft\u0131rmas\u0131na ve cihazlar\u0131 uzaktan kontrol etmesine olanak tan\u0131yor.<\/strong><\/p>\n<p>Yap\u0131lan son telemetri \u00e7al\u0131\u015fmalar\u0131, siber sald\u0131rganlar\u0131n 8 Nisan 2026&#8217;dan bu yana modifiye edilmi\u015f yaz\u0131l\u0131mlar\u0131 do\u011frudan \u00fcreticinin ana alan ad\u0131 (domain) \u00fczerinden da\u011f\u0131tt\u0131\u011f\u0131n\u0131 ortaya koydu. Sald\u0131rganlar\u0131n, zararl\u0131 yaz\u0131l\u0131m\u0131 ge\u00e7erli bir geli\u015ftirici dijital sertifikas\u0131yla imzalayarak ba\u015far\u0131yla gizledi\u011fi tespit edildi. S\u00f6z konusu k\u00f6t\u00fc niyetli m\u00fcdahale, Daemon Tools&#8217;un 12.5.0.2421 s\u00fcr\u00fcm\u00fcnden mevcut en g\u00fcncel s\u00fcr\u00fcme kadar olan t\u00fcm versiyonlar\u0131n\u0131 etkiliyor. Kaspersky, gerekli \u00f6nlemlerin al\u0131nmas\u0131 i\u00e7in Daemon Tools&#8217;un geli\u015ftiricisi AVB Disc Soft\u2019u bilgilendirdi.<\/p>\n<p>Disk em\u00fclasyon yaz\u0131l\u0131mlar\u0131, do\u011fas\u0131 gere\u011fi d\u00fc\u015f\u00fck seviyeli sistem eri\u015fimine ihtiya\u00e7 duydu\u011fundan, kullan\u0131c\u0131lar kurulum s\u0131ras\u0131nda uygulamaya genellikle y\u00fcksek d\u00fczeyde y\u00f6netici ayr\u0131cal\u0131klar\u0131 tan\u0131maktad\u0131r. Bu g\u00fcven mekanizmas\u0131, yaz\u0131l\u0131ma g\u00f6m\u00fclen zararl\u0131 yaz\u0131l\u0131m\u0131n ana i\u015fletim sisteminde derin bir yer edinmesine (foothold) ve cihaz b\u00fct\u00fcnl\u00fc\u011f\u00fcn\u00fcn ciddi \u015fekilde bozulmas\u0131na zemin haz\u0131rl\u0131yor. Analizler, sald\u0131rganlar\u0131n yasal uygulama ikili dosyalar\u0131n\u0131 (binaries) manip\u00fcle ederek i\u015flem ba\u015flang\u0131c\u0131nda k\u00f6t\u00fc niyetli kod \u00e7al\u0131\u015ft\u0131rd\u0131\u011f\u0131n\u0131 ve kal\u0131c\u0131l\u0131k sa\u011flamak i\u00e7in yasal bir Windows hizmetini istismar etti\u011fini g\u00f6steriyor.<\/p>\n<p>Kaspersky telemetri verileri, enfekte olmu\u015f g\u00fcncellemelerin 100&#8217;den fazla \u00fclke ve b\u00f6lgede k\u00fcresel \u00e7apta yay\u0131ld\u0131\u011f\u0131na i\u015faret ediyor. Ma\u011fdurlar\u0131n b\u00fcy\u00fck \u00e7o\u011funlu\u011fu\u00a0<strong>T\u00fcrkiye<\/strong>, Rusya, Brezilya, \u0130spanya, Almanya, Fransa, \u0130talya ve \u00c7in&#8217;de yer al\u0131yor.<\/p>\n<p>Veriler, etkilenen sistemlerin %10&#8217;unun ticari i\u015fletmelere ve kurumlara ait oldu\u011funu g\u00f6steriyor. Daemon Tools her ne kadar bireysel kullan\u0131c\u0131lar aras\u0131nda pop\u00fcler olsa da kurumsal ortamlardaki varl\u0131\u011f\u0131, \u015firket a\u011flar\u0131n\u0131 ciddi ikincil risklere maruz b\u0131rak\u0131yor.<\/p>\n<p>Perakende, bilim, kamu ve imalat sekt\u00f6rlerindeki kurulu\u015flara ait ondan fazla makineden olu\u015fan dar bir grupta, Kaspersky GReAT ekibi sald\u0131rganlar\u0131n manuel olarak ek zararl\u0131 y\u00fckler (shellcode injector ve daha \u00f6nce tan\u0131mlanmam\u0131\u015f Uzaktan Eri\u015fim Truva Atlar\u0131 &#8211; RAT&#8217;lar) yerle\u015ftirdi\u011fini g\u00f6zlemledi. Kurbanlar\u0131n spesifik end\u00fcstri profili ile komutlarda g\u00f6r\u00fclen yaz\u0131m hatalar\u0131 ve tutars\u0131zl\u0131klar, bu takip faaliyetlerinin do\u011frudan belirli hedeflere y\u00f6nelik &#8220;elle&#8221; (hands-on) y\u00fcr\u00fct\u00fcld\u00fc\u011f\u00fcn\u00fc kan\u0131tl\u0131yor. \u0130mplante edilen zararl\u0131larda \u00c7ince diline ait kal\u0131nt\u0131lar bulunsa da kampanya hen\u00fcz bilinen herhangi bir tehdit grubuyla ili\u015fkilendirilmi\u015f de\u011fil.<\/p>\n<p><strong>Kaspersky GReAT K\u0131demli G\u00fcvenlik Ara\u015ft\u0131rmac\u0131s\u0131 Georgy Kucherin<\/strong>, konuya ili\u015fkin \u015fu a\u00e7\u0131klamada bulundu: &#8220;<em>Kullan\u0131c\u0131lar, do\u011frudan resmi bir \u00fcreticiden indirilen ve dijital olarak imzalanm\u0131\u015f yaz\u0131l\u0131mlara kay\u0131ts\u0131z \u015farts\u0131z g\u00fcvendi\u011fi i\u00e7in bu t\u00fcr bir ihlal geleneksel s\u0131n\u0131r savunma mekanizmalar\u0131n\u0131 tamamen devre d\u0131\u015f\u0131 b\u0131rak\u0131yor. Bu durum, Daemon Tools sald\u0131r\u0131s\u0131n\u0131n yakla\u015f\u0131k bir ay boyunca fark edilmeden devam etmesine neden oldu. Bu s\u00fcre zarf\u0131, sald\u0131r\u0131n\u0131n arkas\u0131ndaki akt\u00f6r\u00fcn geli\u015fmi\u015f sald\u0131r\u0131 yeteneklerine sahip, sofistike bir yap\u0131 oldu\u011funu g\u00f6steriyor. \u0130hlalin karma\u015f\u0131kl\u0131\u011f\u0131 g\u00f6z \u00f6n\u00fcne al\u0131nd\u0131\u011f\u0131nda, kurumlar\u0131n b\u00fcnyesinde Daemon Tools y\u00fckl\u00fc makineleri izole etmeleri ve kurumsal a\u011f i\u00e7inde zararl\u0131 faaliyetlerin yay\u0131lmas\u0131n\u0131 \u00f6nlemek i\u00e7in kapsaml\u0131 g\u00fcvenlik taramalar\u0131 yapmalar\u0131 kritik \u00f6neme sahiptir<\/em>.&#8221;<\/p>\n<p>Kaspersky, s\u00f6z konusu tehlikeli y\u00fckleyicilerin \u00e7al\u0131\u015ft\u0131r\u0131lmas\u0131n\u0131 aktif olarak tespit edip engellemektedir. Kurumlara, a\u011flar\u0131nda Daemon Tools Lite varl\u0131\u011f\u0131n\u0131 denetlemeleri, etkilenen u\u00e7 noktalar\u0131 izole etmeleri ve yetkisiz komut y\u00fcr\u00fctme veya yanlamas\u0131na hareket (lateral movement) faaliyetlerini izlemeleri tavsiye edilmektedir. Bireysel kullan\u0131c\u0131lar\u0131n ise etkilenen uygulamay\u0131 derhal kald\u0131rmalar\u0131 ve sistemlerini derinlemesine bir taramadan ge\u00e7irmeleri gerekmektedir.<\/p>\n<p>Kaspersky\u2019nin Mart 2026\u2019da yay\u0131nlad\u0131\u011f\u0131 \u00e7al\u0131\u015fma, tedarik zinciri sald\u0131r\u0131lar\u0131n\u0131n ge\u00e7ti\u011fimiz 12 ay i\u00e7inde i\u015fletmelerin kar\u015f\u0131la\u015ft\u0131\u011f\u0131 en yayg\u0131n siber tehdit oldu\u011funu, ancak kurulu\u015flar\u0131n yaln\u0131zca %9\u2019unun bunu \u00f6ncelikli bir endi\u015fe kayna\u011f\u0131 olarak g\u00f6rd\u00fc\u011f\u00fcn\u00fc ortaya koymu\u015ftu.<\/p>\n<p>Yaz\u0131l\u0131m tedarik zinciri sald\u0131r\u0131lar\u0131ndan kaynaklanan riskleri azaltmak i\u00e7in kurulu\u015flara \u015fu g\u00fcvenlik \u00f6nlemlerini \u00f6neriyor:<\/p>\n<ul type=\"disc\">\n<li><strong>Yaz\u0131l\u0131m tedarik zincirlerini denetleyin:<\/strong>\u00a0\u00dc\u00e7\u00fcnc\u00fc taraf uygulamalar\u0131n kurumsal ortamlarda kullan\u0131m\u0131na izin vermeden \u00f6nce \u00fcreticinin g\u00fcvenlik ge\u00e7mi\u015fini de\u011ferlendirin, g\u00fcvenlik a\u00e7\u0131\u011f\u0131 bildirim kay\u0131tlar\u0131n\u0131 inceleyin ve sekt\u00f6r g\u00fcvenlik standartlar\u0131na uyumlulu\u011funu do\u011frulay\u0131n.\u00a0<\/li>\n<li><strong>S\u0131k\u0131 tedarik ve kullan\u0131m protokolleri uygulay\u0131n:<\/strong>\u00a0Kullan\u0131lan t\u00fcm yaz\u0131l\u0131mlar i\u00e7in d\u00fczenli g\u00fcvenlik denetimleri zorunlu hale getirin ve \u00e7al\u0131\u015fanlar\u0131n kulland\u0131\u011f\u0131 ara\u00e7lar\u0131n kurumun i\u00e7 g\u00fcvenlik politikalar\u0131 ile olay bildirim gerekliliklerine uygun oldu\u011fundan emin olun.\u00a0<\/li>\n<li><strong>Y\u00f6netici yetkilerini s\u0131n\u0131rland\u0131r\u0131n:<\/strong>\u00a0En az ayr\u0131cal\u0131k prensibi ve s\u0131f\u0131r g\u00fcven mimarisi gibi \u00f6nleyici g\u00fcvenlik yakla\u015f\u0131mlar\u0131n\u0131 uygulay\u0131n. Kullan\u0131c\u0131 eri\u015fim haklar\u0131n\u0131n s\u0131n\u0131rland\u0131r\u0131lmas\u0131, g\u00fcvenilir bir uygulaman\u0131n ele ge\u00e7irilmesi durumunda olu\u015fabilecek etki alan\u0131n\u0131 \u00f6nemli \u00f6l\u00e7\u00fcde azalt\u0131r.\u00a0<\/li>\n<li><strong>S\u00fcrekli altyap\u0131 izleme \u00e7\u00f6z\u00fcmleri kullan\u0131n:<\/strong>\u00a0Kaspersky Next \u00fcr\u00fcn ailesi gibi Geni\u015fletilmi\u015f Tespit ve M\u00fcdahale (XDR) \u00e7\u00f6z\u00fcmlerinin kullan\u0131lmas\u0131n\u0131 \u00f6neriyor. Bu \u00e7\u00f6z\u00fcmler, a\u011f trafi\u011findeki anomalileri veya g\u00fcvenilir yaz\u0131l\u0131mlar \u00fczerinden ger\u00e7ekle\u015ftirilen yetkisiz i\u015flemleri ger\u00e7ek zamanl\u0131 olarak tespit etmeye yard\u0131mc\u0131 oluyor.\u00a0<\/li>\n<li><strong>Olay m\u00fcdahale senaryolar\u0131n\u0131 g\u00fcncelleyin:<\/strong>\u00a0Kurumsal g\u00fcvenlik stratejilerinin tedarik zinciri ihlallerini a\u00e7\u0131k \u015fekilde kapsad\u0131\u011f\u0131ndan emin olun. Olay m\u00fcdahale planlar\u0131; ele ge\u00e7irilen \u00fc\u00e7\u00fcnc\u00fc taraf uygulamalar\u0131n h\u0131zl\u0131 \u015fekilde tespit edilmesi, s\u0131n\u0131rland\u0131r\u0131lmas\u0131 ve kurum i\u00e7i sistemlerden ayr\u0131\u015ft\u0131r\u0131lmas\u0131na y\u00f6nelik \u00f6nceden tan\u0131ml\u0131 ad\u0131mlar\u0131 i\u00e7ermelidir.<\/li>\n<\/ul>\n<p>\u00a0<\/p>\n<p>\u00a0<\/p>\n<p>Kaynak: (BYZHA) Beyaz Haber Ajans\u0131<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Kaspersky\u2019nin K\u00fcresel Ara\u015ft\u0131rma ve Analiz Ekibi (GReAT), yayg\u0131n olarak kullan\u0131lan sanal s\u00fcr\u00fcc\u00fc em\u00fclasyon yaz\u0131l\u0131m\u0131 Daemon Tools&#8217;un resmi web sitesini hedef alan aktif bir tedarik zinciri sald\u0131r\u0131s\u0131 ke\u015ffetti.<\/p>\n","protected":false},"author":1,"featured_media":15251,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[25],"tags":[],"class_list":["post-15250","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-teknoloji"],"_links":{"self":[{"href":"https:\/\/busondakika.com.tr\/index.php?rest_route=\/wp\/v2\/posts\/15250","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/busondakika.com.tr\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/busondakika.com.tr\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/busondakika.com.tr\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/busondakika.com.tr\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=15250"}],"version-history":[{"count":1,"href":"https:\/\/busondakika.com.tr\/index.php?rest_route=\/wp\/v2\/posts\/15250\/revisions"}],"predecessor-version":[{"id":15252,"href":"https:\/\/busondakika.com.tr\/index.php?rest_route=\/wp\/v2\/posts\/15250\/revisions\/15252"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/busondakika.com.tr\/index.php?rest_route=\/wp\/v2\/media\/15251"}],"wp:attachment":[{"href":"https:\/\/busondakika.com.tr\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=15250"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/busondakika.com.tr\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=15250"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/busondakika.com.tr\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=15250"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}