{"id":8464,"date":"2022-04-19T10:26:05","date_gmt":"2022-04-19T07:26:05","guid":{"rendered":"https:\/\/www.hosting.com.tr\/blog\/?p=8464"},"modified":"2025-01-23T12:02:00","modified_gmt":"2025-01-23T09:02:00","slug":"ransomware","status":"publish","type":"post","link":"https:\/\/www.hosting.com.tr\/blog\/ransomware\/","title":{"rendered":"Ransomware Nedir? Ransomware Sald\u0131r\u0131s\u0131ndan Nas\u0131l Korunursunuz?"},"content":{"rendered":"\n<p>Ransomware, i\u015fletmelerin \u015fu anda kar\u015f\u0131 kar\u015f\u0131ya oldu\u011fu en \u00f6nemli siber g\u00fcvenlik risklerinden biridir. 2019 Verizon Data Breach Report\u2019a g\u00f6re, fidye yaz\u0131l\u0131mlar\u0131, command &amp; control (C2) sald\u0131r\u0131lar\u0131ndan sonra en s\u0131k g\u00f6r\u00fclen 2. k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m sald\u0131r\u0131s\u0131d\u0131r.&nbsp;<\/p>\n\n\n\n<p>Peki ransomware tam olarak nedir?<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"ransomware-nedir\">Ransomware Nedir?<\/h2>\n\n\n\n<p>Ransomware yani fidye yaz\u0131l\u0131m\u0131, bilgisayarlar\u0131n\u0131za bula\u015fan; dosyalar\u0131n\u0131z\u0131, klas\u00f6rlerinizi, yaz\u0131l\u0131mlar\u0131n\u0131z\u0131 ve di\u011fer sistemlerinizi kilitleyen bir t\u00fcr k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131md\u0131r. Kendisini sistemlerinize ekledikten sonra, t\u00fcm verilerinizi \u015fifreler, b\u00f6ylece verilerinize eri\u015femez veya onlar\u0131 kullanamazs\u0131n\u0131z. Fidye yaz\u0131l\u0131m\u0131n\u0131 kontrol eden ki\u015fi, size dosyalar\u0131n\u0131z\u0131 ele ge\u00e7irdi\u011fine dair bir mesaj g\u00f6nderir ve bir fidye talep eder. Fidyeyi \u00f6deyene kadar dosyalar\u0131n\u0131za eri\u015femezsiniz. \u00c7o\u011fu \u015firket genellikle fidyeyi \u00f6der, \u00e7\u00fcnk\u00fc herhangi bir kesinti, i\u015f s\u00fcreklili\u011fi i\u00e7in y\u0131k\u0131c\u0131 olabilir.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"ransomware-saldirilari-nasil-calisir\">Ransomware Sald\u0131r\u0131lar\u0131 Nas\u0131l \u00c7al\u0131\u015f\u0131r?<\/h2>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"750\" height=\"300\" src=\"https:\/\/www.hosting.com.tr\/blog\/wp-content\/uploads\/2022\/04\/ransomware-saldirilari-nasil-calisir.jpeg\" alt=\"Ransomware Sald\u0131r\u0131lar\u0131 Nas\u0131l \u00c7al\u0131\u015f\u0131r?\" class=\"wp-image-8468\" srcset=\"https:\/\/www.hosting.com.tr\/blog\/wp-content\/uploads\/2022\/04\/ransomware-saldirilari-nasil-calisir.jpeg 750w, https:\/\/www.hosting.com.tr\/blog\/wp-content\/uploads\/2022\/04\/ransomware-saldirilari-nasil-calisir-300x120.jpeg 300w\" sizes=\"auto, (max-width: 750px) 100vw, 750px\" \/><\/figure><\/div>\n\n\n\n<p>Ransomware, cihaz\u0131n\u0131zdaki t\u00fcm dosyalar\u0131 \u015fifreler, b\u00f6ylece \u015fifre \u00e7\u00f6zme anahtar\u0131 olmadan bunlara eri\u015femezsiniz. Ayr\u0131ca cihaz\u0131n\u0131z\u0131 tamamen kilitleyebilir. Su\u00e7lular daha sonra fidye yaz\u0131l\u0131m\u0131 \u015fifre \u00e7\u00f6zme anahtar\u0131 kar\u015f\u0131l\u0131\u011f\u0131nda cihaz ba\u015f\u0131na Bitcoin cinsinden tipik olarak 300 ila 500 dolar aras\u0131nda bir fidye \u00fccreti talep eder.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"fidye-yazilimi-cihazima-nasil-bulasabilir\">Fidye Yaz\u0131l\u0131m\u0131 Cihaz\u0131ma Nas\u0131l Bula\u015fabilir?<\/h2>\n\n\n\n<p>Fidye yaz\u0131l\u0131mlar\u0131; e-posta eklerinden, g\u00fcvenli\u011fi ihlal edilmi\u015f veya k\u00f6t\u00fc ama\u00e7l\u0131 web sitelerinden, reklamlardan ya da g\u00fcvenli olmayan Wi\u2011Fi a\u011flar\u0131ndan indirilebilir. Di\u011fer k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlar da sizin haberiniz olmadan fidye yaz\u0131l\u0131mlar\u0131n\u0131 indirebilir.<\/p>\n\n\n\n<p><strong>Peki fidye yaz\u0131l\u0131m\u0131 cep telefonuna bula\u015fabilir mi?<\/strong><\/p>\n\n\n\n<p>Evet. Mobil fidye yaz\u0131l\u0131m\u0131 hem iOS hem de Android cihazlar i\u00e7in mevcuttur. Daha da k\u00f6t\u00fcs\u00fc, ak\u0131ll\u0131 cihazlar\u0131 kullanan \u00e7ok say\u0131da insan nedeniyle b\u00fcy\u00fcyen bir tehdittir.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"ransomware-neden-bu-kadar-tehlikelidir\">Ransomware Neden Bu Kadar Tehlikelidir?<\/h2>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"750\" height=\"300\" src=\"https:\/\/www.hosting.com.tr\/blog\/wp-content\/uploads\/2022\/04\/ransomware-neden-bu-kadar-tehlikelidir.jpeg\" alt=\"\" class=\"wp-image-8467\" srcset=\"https:\/\/www.hosting.com.tr\/blog\/wp-content\/uploads\/2022\/04\/ransomware-neden-bu-kadar-tehlikelidir.jpeg 750w, https:\/\/www.hosting.com.tr\/blog\/wp-content\/uploads\/2022\/04\/ransomware-neden-bu-kadar-tehlikelidir-300x120.jpeg 300w\" sizes=\"auto, (max-width: 750px) 100vw, 750px\" \/><\/figure><\/div>\n\n\n\n<p>K\u00fc\u00e7\u00fck i\u015fletmeler fidye yaz\u0131l\u0131mlar\u0131ndan dolay\u0131 risk alt\u0131nda olmad\u0131klar\u0131n\u0131 d\u00fc\u015f\u00fcnse de, bu do\u011fru bir d\u00fc\u015f\u00fcnce de\u011fildir. <a href=\"https:\/\/www.verizon.com\/business\/resources\/reports\/2020-data-breach-investigations-report.pdf\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">2019<\/a>&#8216;da siber su\u00e7 ma\u011fdurlar\u0131n\u0131n yakla\u015f\u0131k 1\/3&#8217;\u00fc k\u00fc\u00e7\u00fck ve orta \u00f6l\u00e7ekli i\u015fletmelerden olu\u015fuyordu ve bu say\u0131n\u0131n giderek artmas\u0131 bekleniyor.&nbsp;<\/p>\n\n\n\n<p>Rakamlardan da anlayaca\u011f\u0131n\u0131z gibi bilgisayar korsanlar\u0131 bazen k\u00fc\u00e7\u00fck \u015firketlerin pe\u015fine d\u00fc\u015fmeyi tercih eder, \u00e7\u00fcnk\u00fc g\u00fcvenliklerinin olmas\u0131 gerekti\u011fi gibi olmad\u0131\u011f\u0131n\u0131 bilirler. Bu y\u00fczden asla hedef olmad\u0131\u011f\u0131n\u0131z\u0131 varsaymay\u0131n. Fidye yaz\u0131l\u0131m\u0131, her t\u00fcr ve b\u00fcy\u00fckl\u00fckteki \u015firket i\u00e7in ciddi bir risktir. Kimse bu durumdan muaf de\u011fildir.<\/p>\n\n\n\n<p>Fidye yaz\u0131l\u0131m\u0131 sald\u0131r\u0131lar\u0131, hayati i\u015f verilerinizden ayr\u0131lman\u0131n \u00f6tesinde ek riskler de ta\u015f\u0131r. Bir \u015firketin sistemlerine fidye yaz\u0131l\u0131m\u0131 bula\u015ft\u0131rmak genellikle haftalar al\u0131r. Bu s\u00fcre boyunca, k\u00f6t\u00fc niyetli taraflar, hassas dosyalar\u0131n\u0131za, klas\u00f6rlerinize ve finansal verilerinize tam eri\u015fime sahiptir ve bunlar\u0131 kolayca \u00e7al\u0131p dark web&#8217;de yeniden satabilir veya iki kez \u00f6deme yapman\u0131z\u0131 isteyebilirler.<\/p>\n\n\n\n<p>Ayr\u0131ca, bilgisayar korsanlar\u0131n\u0131n s\u00f6zlerini tutacaklar\u0131n\u0131n garantisi yoktur. \u00d6deme taleplerini kar\u015f\u0131lam\u0131\u015f olsan\u0131z bile verilerinizi yine de s\u0131zd\u0131rmalar\u0131 m\u00fcmk\u00fcnd\u00fcr.<\/p>\n\n\n\n<p>S\u0131zan verilerin ki\u015fisel olarak tan\u0131mlanabilir bilgileri (PII), finansal verileri, \u00f6deme verilerini veya m\u00fc\u015fterilerinizden birine ait fikri m\u00fclkiyeti i\u00e7erdi\u011fini varsayal\u0131m. Bu durumda, yasal para cezalar\u0131ndan ve davalardan siz sorumlu olursunuz.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"ransomware-turleri-nelerdir\">Ransomware T\u00fcrleri Nelerdir?<\/h2>\n\n\n\n<p>\u015eu an bilgisayar korsanlar\u0131 taraf\u0131ndan kullan\u0131lan farkl\u0131 t\u00fcrde bir\u00e7ok ransomware vard\u0131r:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"1-crypto-ransomware\">1. Crypto Ransomware<\/h3>\n\n\n\n<p>2017&#8217;deki WannaCry fidye yaz\u0131l\u0131m\u0131 sald\u0131r\u0131s\u0131 gibi kripto k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlar, yaln\u0131zca klas\u00f6rleri, dosyalar\u0131 ve sabit s\u00fcr\u00fcc\u00fcleri hedefler ve \u015fifreler. Bu klasik bir fidye yaz\u0131l\u0131m\u0131 sald\u0131r\u0131s\u0131d\u0131r ve WannaCry \u00f6rne\u011finde, Windows i\u015fletim sistemi \u00e7al\u0131\u015ft\u0131ran sistemleri hedef ald\u0131 ve Bitcoin&#8217;de fidye talep etti.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"2-doxware\">2. Doxware&nbsp;<\/h3>\n\n\n\n<p>Doxware veya s\u0131z\u0131nt\u0131 yaz\u0131l\u0131m\u0131, fidye talep eden veya \u00e7al\u0131nan bilgilerinizi \u00e7evrimi\u00e7i yay\u0131nlamakla tehdit eden fidye yaz\u0131l\u0131m\u0131n\u0131n ayn\u0131 alt k\u00fcmesidir. Bu, tipik olarak ki\u015fisel foto\u011fraflara ve di\u011fer hassas dosyalara ba\u011flanan sald\u0131r\u0131 t\u00fcr\u00fcd\u00fcr.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"3-locker-ransomware\">3. Locker Ransomware<\/h3>\n\n\n\n<p>Locker fidye yaz\u0131l\u0131m\u0131, kullan\u0131c\u0131y\u0131 tamamen kilitlemek i\u00e7in hedef i\u015fletim sistemine bula\u015ft\u0131\u011f\u0131 i\u00e7in bu \u015fekilde adland\u0131r\u0131l\u0131r. Bu t\u00fcr fidye yaz\u0131l\u0131mlar\u0131 \u00e7o\u011funlukla Android tabanl\u0131d\u0131r ve herhangi bir uygulamaya veya dosyaya eri\u015fmeyi imkans\u0131z hale getirir. 2048 bitlik bir RSA \u015fifreleme anahtar\u0131 \u00e7ifti olu\u015fturan CryptoLocker, bu t\u00fcr fidye yaz\u0131l\u0131m\u0131 vir\u00fcslerine bir \u00f6rnektir.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"4-mobil-ransomware\"><strong>4. Mobil Ransomware<\/strong><\/h3>\n\n\n\n<p>Mobil fidye yaz\u0131l\u0131m\u0131 2014&#8217;ten bu yana geni\u015f \u00f6l\u00e7ekte mevcuttur. Temelde ayn\u0131 \u015fekilde \u00e7al\u0131\u015f\u0131r, ancak uygulamalar arac\u0131l\u0131\u011f\u0131yla teslim edilir ve kullan\u0131c\u0131lara &#8220;kilitli&#8221; mesajlar b\u0131rak\u0131r.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"5-scareware\">5. Scareware<\/h3>\n\n\n\n<p>Scareware, bir vir\u00fcsten koruma arac\u0131n\u0131 taklit eder, sisteminizdeki sorunlar\u0131 &#8220;alg\u0131lar&#8221; ve ard\u0131ndan bunlar\u0131 \u00e7\u00f6zmek i\u00e7in fidye talep eder. Baz\u0131 korku yaz\u0131l\u0131mlar\u0131 kurban sistemlerini kilitlerken, di\u011fer t\u00fcrler ekran\u0131 a\u00e7\u0131l\u0131r pencerelerle doldurur.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"ransomware-saldirisindan-nasil-korunursunuz\">Ransomware Sald\u0131r\u0131s\u0131ndan Nas\u0131l Korunursunuz?<\/h2>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"750\" height=\"300\" src=\"https:\/\/www.hosting.com.tr\/blog\/wp-content\/uploads\/2022\/04\/ransomware-saldirilarindan-nasil-korunursunuz.jpeg\" alt=\"Ransomware Sald\u0131r\u0131s\u0131ndan Nas\u0131l Korunursunuz?\" class=\"wp-image-8466\" srcset=\"https:\/\/www.hosting.com.tr\/blog\/wp-content\/uploads\/2022\/04\/ransomware-saldirilarindan-nasil-korunursunuz.jpeg 750w, https:\/\/www.hosting.com.tr\/blog\/wp-content\/uploads\/2022\/04\/ransomware-saldirilarindan-nasil-korunursunuz-300x120.jpeg 300w\" sizes=\"auto, (max-width: 750px) 100vw, 750px\" \/><\/figure><\/div>\n\n\n\n<p>\u0130\u015fletmenizi fidye yaz\u0131l\u0131mlar\u0131ndan korumak i\u00e7in alabilece\u011finiz t\u00fcm \u00f6nlemleri a\u015fa\u011f\u0131da sizin i\u00e7in listeledik:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"1-sistemlerinizi-duzenli-olarak-yedekleyin\">1. Sistemlerinizi d\u00fczenli olarak yedekleyin<\/h3>\n\n\n\n<p>Ransomware sald\u0131r\u0131lar\u0131n\u0131n temel amac\u0131, verilerinizi almak ve sizi sistemlerinizin d\u0131\u015f\u0131nda tutmakt\u0131r. Bilgisayar korsanlar\u0131 bilgilerinizin tek kopyas\u0131na sahip olduklar\u0131nda, verilerin de\u011feri \u00f6nemli \u00f6l\u00e7\u00fcde artar ve bu durum kurban\u0131, verileri geri almak i\u00e7in hat\u0131r\u0131 say\u0131l\u0131r bir mebla\u011f \u00f6demeye te\u015fvik eder. Ancak, verilerinizin yedekleri varsa, her \u015fey de\u011fi\u015fir. Etkilenen cihazlar\u0131 a\u011fdan ay\u0131rabilir, silebilir ve g\u00fcvenli bir ortamda yeniden olu\u015fturabilirsiniz.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"2-yamalari-yayinlanir-yayinlanmaz-uygulayin\">2. Yamalar\u0131 yay\u0131nlan\u0131r yay\u0131nlanmaz uygulay\u0131n<\/h3>\n\n\n\n<p>Neredeyse t\u00fcm yaz\u0131l\u0131m sat\u0131c\u0131lar\u0131 d\u00fczenli olarak g\u00fcvenlik yamalar\u0131 yay\u0131nlar. Yaz\u0131l\u0131mda herhangi bir g\u00fcvenlik a\u00e7\u0131\u011f\u0131 tespit edilir edilmez, onu d\u00fczeltmeye ve bu g\u00fcvenlik a\u00e7\u0131\u011f\u0131ndan kaynaklanan riski azaltmak i\u00e7in bir yama veya g\u00fcncelleme yay\u0131nlamaya \u00e7al\u0131\u015f\u0131rlar. T\u00fcm bu yamalar yay\u0131nlan\u0131r yay\u0131nlanmaz uygulanmal\u0131d\u0131r. Antivir\u00fcs ve g\u00fcvenlik duvarlar\u0131 da s\u0131k s\u0131k g\u00fcncellenmelidir. \u00c7o\u011fu zaman, mobil cihazlar g\u00fcvenilmeyen a\u011flara uzun s\u00fcreler boyunca ba\u011flan\u0131r (\u00f6rne\u011fin, uzun i\u015f gezileri s\u0131ras\u0131nda). Bu gibi durumlar i\u00e7in i\u015fletmelerin internet \u00fczerinden cihazlar\u0131 g\u00fcncelleyebilen \u00e7\u00f6z\u00fcmler da\u011f\u0131tmas\u0131 gerekir. Kurulu\u015f a\u011f\u0131 i\u00e7inde veya d\u0131\u015f\u0131nda, t\u00fcm cihazlar\u0131n kurulu\u015f taraf\u0131ndan yetkilendirilen t\u00fcm yamalarla g\u00fcncel olmas\u0131n\u0131 sa\u011flayan bir\u00e7ok ticari cihaz y\u00f6netimi \u00e7\u00f6z\u00fcm\u00fc bulunmaktad\u0131r.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"3-sistemlerinizi-ve-antivirusunuzu-guncel-tutun\">3. Sistemlerinizi ve antivir\u00fcs\u00fcn\u00fcz\u00fc g\u00fcncel tutun<\/h3>\n\n\n\n<p>G\u00fcncellenmi\u015f vir\u00fcsten koruma ve k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mdan koruma yaz\u0131l\u0131m\u0131, fidye yaz\u0131l\u0131m\u0131 gibi tehditlere kar\u015f\u0131 sizi korur. Her iki yaz\u0131l\u0131m t\u00fcr\u00fc de, s\u00fcrekli g\u00fcncellenen, bilinen tehditlerden olu\u015fan b\u00fcy\u00fck kitapl\u0131klara eri\u015fime sahiptir. Her \u015feyi g\u00fcncel tutarak sadece sistemlerinizi g\u00fcvende tutmakla kalmaz, ayn\u0131 zamanda k\u00fct\u00fcphaneye katk\u0131da bulunmaya da yard\u0131mc\u0131 olabilirsiniz.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"4-kullanici-erisimini-ayricaliklarini-kisitlayin\">4. Kullan\u0131c\u0131 eri\u015fimini\/ayr\u0131cal\u0131klar\u0131n\u0131 k\u0131s\u0131tlay\u0131n<\/h3>\n\n\n\n<p>K\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m\u0131n a\u011fda yay\u0131lmas\u0131n\u0131n ana nedenlerinden biri, kullan\u0131c\u0131ya verilen ayr\u0131cal\u0131klar\u0131n k\u00f6t\u00fcye kullan\u0131lmas\u0131d\u0131r. Hemen hemen t\u00fcm kullan\u0131c\u0131lar, beraberinde gelen riskleri fark etmeden i\u015f istasyonlar\u0131nda tam y\u00f6netici haklar\u0131na sahip olmak ister. Y\u00f6netici haklar\u0131yla, tek bir vir\u00fcsl\u00fc bilgisayar, t\u00fcm i\u015fletmenin altyap\u0131s\u0131nda hasara yol a\u00e7abilir. Bu y\u00fczden t\u00fcm kullan\u0131c\u0131lara profillerine ve ihtiya\u00e7lar\u0131na g\u00f6re eri\u015fim verilmelidir ve t\u00fcm verileri korumak i\u00e7in eri\u015fim haklar\u0131 periyodik olarak s\u0131k s\u0131k g\u00f6zden ge\u00e7irilmelidir.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"5-calisanlarinizi-baglantilarin-tehlikeleri-hakkinda-egitin\">5. \u00c7al\u0131\u015fanlar\u0131n\u0131z\u0131 ba\u011flant\u0131lar\u0131n tehlikeleri hakk\u0131nda e\u011fitin<\/h3>\n\n\n\n<p>Fidye yaz\u0131l\u0131mlar\u0131 \u00e7o\u011funlukla e-posta\u2019lardaki \u015f\u00fcpheli ba\u011flant\u0131lar veya g\u00fcvenilmeyen kaynaklardan indirilen dosyalar arac\u0131l\u0131\u011f\u0131yla yay\u0131l\u0131r. Bilgisayara girdikten sonra kod, fidye kar\u015f\u0131l\u0131\u011f\u0131nda \u015fifreledi\u011fi kimlik bilgileri veya veriler i\u00e7in bilgisayar\u0131 tarar. Fidyeyi \u00f6deseniz bile verilerinizi geri alaca\u011f\u0131n\u0131z\u0131n garantisi yoktur.&nbsp;<\/p>\n\n\n\n<p>Fakat \u00e7al\u0131\u015fanlar\u0131n\u0131z ba\u011flant\u0131lar konusunda bilgiliyse, t\u00fcm bunlardan kolayca ka\u00e7\u0131nabilirsiniz. A\u015fa\u011f\u0131dakileri yaparak \u00e7al\u0131\u015fanlar\u0131n\u0131za yard\u0131mc\u0131 olabilirsiniz:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>T\u0131klanabilecek ba\u011flant\u0131lar ve t\u0131klanmamas\u0131 gereken ba\u011flant\u0131lar konusunda net olan bir e-posta g\u00fcvenlik politikas\u0131 olu\u015fturun.<\/li><li>\u015eirket cihazlar\u0131nda indirmeye veya yaz\u0131l\u0131m kurulumuna izin verme (kullan\u0131c\u0131 izinleri arac\u0131l\u0131\u011f\u0131yla).<\/li><li>\u00c7al\u0131\u015fanlar\u0131 fidye yaz\u0131l\u0131m\u0131 ve kimlik av\u0131 konusunda e\u011fitmek.&nbsp;<\/li><li>\u00c7al\u0131\u015fanlar\u0131n\u0131za kimlik av\u0131 sim\u00fclasyonlar\u0131 yapt\u0131rmak. Google&#8217;\u0131n kimlik av\u0131 testi gibi \u00fccretsiz bir arac\u0131 kullanarak planl\u0131 bir al\u0131\u015ft\u0131rmayla ba\u015flayabilirsiniz.<\/li><\/ul>\n\n\n\n<p>Fidye yaz\u0131l\u0131m\u0131 sald\u0131r\u0131lar\u0131 ger\u00e7ektir ve di\u011fer t\u00fcm siber sald\u0131r\u0131lardan \u00e7ok daha fazla zarara neden olur. Fidye yaz\u0131l\u0131m\u0131 tehdidiyle m\u00fccadele etmeye haz\u0131rl\u0131kl\u0131 olmayan bir i\u015fletme, sald\u0131r\u0131n\u0131n b\u00fcy\u00fckl\u00fc\u011f\u00fcne ba\u011fl\u0131 olarak veri kayb\u0131ndan operasyonel ba\u015far\u0131s\u0131zl\u0131\u011fa ve i\u015fin tamamen kapanmas\u0131na kadar ciddi sonu\u00e7larla kar\u015f\u0131 kar\u015f\u0131ya kalabilir. Bu nedenle, fidye yaz\u0131l\u0131mlar\u0131na kar\u015f\u0131 bir sald\u0131r\u0131y\u0131 \u00f6nlemek veya en az\u0131ndan \u015firketinizi vurmas\u0131 durumunda etkisini en aza indirmek i\u00e7in gerekli \u00f6nlemleri almak \u00f6nemlidir.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"fidye-yaziliminin-kaldirilmasi-mumkun-mu\">Fidye Yaz\u0131l\u0131m\u0131n\u0131n Kald\u0131r\u0131lmas\u0131 M\u00fcmk\u00fcn M\u00fc?<\/h2>\n\n\n\n<p>Fidye yaz\u0131l\u0131m\u0131n\u0131n kald\u0131r\u0131lmas\u0131 zor ve hatta bazen cihaz\u0131n\u0131za y\u00fcklendikten sonra imkans\u0131z olabilir. Bu nedenle fidye yaz\u0131l\u0131m\u0131 korumas\u0131, fidye yaz\u0131l\u0131mlar\u0131n\u0131n cihaz\u0131n\u0131za bula\u015fmas\u0131n\u0131 \u00f6nleyen g\u00fcvenilir bir vir\u00fcsten koruma yaz\u0131l\u0131m\u0131yla ba\u015flar. Ayr\u0131ca d\u00fczenli yedeklemeler alarak da fidye yaz\u0131l\u0131mlar\u0131ndan korunabilirsiniz. B\u00f6ylece sald\u0131r\u0131ya u\u011frarsan\u0131z yedeklerden geri y\u00fckleyebilirsiniz.<\/p>\n","protected":false},"excerpt":{"rendered":"Ransomware, i\u015fletmelerin \u015fu anda kar\u015f\u0131 kar\u015f\u0131ya oldu\u011fu en \u00f6nemli siber g\u00fcvenlik risklerinden biridir. 2019 Verizon Data Breach Report\u2019a&hellip;\n","protected":false},"author":20,"featured_media":8465,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"csco_singular_sidebar":"","csco_page_header_type":"","csco_appearance_grid":"","csco_page_load_nextpost":"","csco_post_video_location":[],"csco_post_video_location_hash":"","csco_post_video_url":"","csco_post_video_bg_start_time":0,"csco_post_video_bg_end_time":0,"footnotes":""},"categories":[354,349],"tags":[310],"class_list":{"0":"post-8464","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-e-posta-mail","8":"category-guvenlik","9":"tag-kurumsal-e-posta","10":"cs-entry","11":"cs-video-wrap"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Ransomware Nedir? Ransomware Sald\u0131r\u0131s\u0131ndan Nas\u0131l Korunursunuz? - Hosting.com.tr<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.hosting.com.tr\/blog\/ransomware\/\" \/>\n<meta property=\"og:locale\" content=\"tr_TR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ransomware Nedir? Ransomware Sald\u0131r\u0131s\u0131ndan Nas\u0131l Korunursunuz? - Hosting.com.tr\" \/>\n<meta property=\"og:description\" content=\"Ransomware, i\u015fletmelerin \u015fu anda kar\u015f\u0131 kar\u015f\u0131ya oldu\u011fu en \u00f6nemli siber g\u00fcvenlik risklerinden biridir. 2019 Verizon Data Breach Report\u2019a&hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.hosting.com.tr\/blog\/ransomware\/\" \/>\n<meta property=\"og:site_name\" content=\"Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/hosting.com.tr\" \/>\n<meta property=\"article:published_time\" content=\"2022-04-19T07:26:05+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-23T09:02:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.hosting.com.tr\/blog\/wp-content\/uploads\/2022\/04\/ransomware-nedir-ransomware-saldirisindan-nasil-korunursunuz.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"720\" \/>\n\t<meta property=\"og:image:height\" content=\"400\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Sibel Ho\u015f\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@hostingcomtr\" \/>\n<meta name=\"twitter:site\" content=\"@hostingcomtr\" \/>\n<meta name=\"twitter:label1\" content=\"Yazan:\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sibel Ho\u015f\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tahmini okuma s\u00fcresi\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 dakika\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ransomware Nedir? Ransomware Sald\u0131r\u0131s\u0131ndan Nas\u0131l Korunursunuz? - Hosting.com.tr","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.hosting.com.tr\/blog\/ransomware\/","og_locale":"tr_TR","og_type":"article","og_title":"Ransomware Nedir? Ransomware Sald\u0131r\u0131s\u0131ndan Nas\u0131l Korunursunuz? - Hosting.com.tr","og_description":"Ransomware, i\u015fletmelerin \u015fu anda kar\u015f\u0131 kar\u015f\u0131ya oldu\u011fu en \u00f6nemli siber g\u00fcvenlik risklerinden biridir. 2019 Verizon Data Breach Report\u2019a&hellip;","og_url":"https:\/\/www.hosting.com.tr\/blog\/ransomware\/","og_site_name":"Blog","article_publisher":"https:\/\/www.facebook.com\/hosting.com.tr","article_published_time":"2022-04-19T07:26:05+00:00","article_modified_time":"2025-01-23T09:02:00+00:00","og_image":[{"width":720,"height":400,"url":"https:\/\/www.hosting.com.tr\/blog\/wp-content\/uploads\/2022\/04\/ransomware-nedir-ransomware-saldirisindan-nasil-korunursunuz.jpeg","type":"image\/jpeg"}],"author":"Sibel Ho\u015f","twitter_card":"summary_large_image","twitter_creator":"@hostingcomtr","twitter_site":"@hostingcomtr","twitter_misc":{"Yazan:":"Sibel Ho\u015f","Tahmini okuma s\u00fcresi":"8 dakika"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.hosting.com.tr\/blog\/ransomware\/#article","isPartOf":{"@id":"https:\/\/www.hosting.com.tr\/blog\/ransomware\/"},"author":{"name":"Sibel Ho\u015f","@id":"https:\/\/www.hosting.com.tr\/blog\/#\/schema\/person\/769feb953535a36d98b2d05f5e3e1b73"},"headline":"Ransomware Nedir? Ransomware Sald\u0131r\u0131s\u0131ndan Nas\u0131l Korunursunuz?","datePublished":"2022-04-19T07:26:05+00:00","dateModified":"2025-01-23T09:02:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.hosting.com.tr\/blog\/ransomware\/"},"wordCount":1743,"commentCount":0,"publisher":{"@id":"https:\/\/www.hosting.com.tr\/blog\/#organization"},"image":{"@id":"https:\/\/www.hosting.com.tr\/blog\/ransomware\/#primaryimage"},"thumbnailUrl":"https:\/\/www.hosting.com.tr\/blog\/wp-content\/uploads\/2022\/04\/ransomware-nedir-ransomware-saldirisindan-nasil-korunursunuz.jpeg","keywords":["kurumsal e-posta"],"articleSection":["E-Posta &amp; Mail","G\u00fcvenlik"],"inLanguage":"tr","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.hosting.com.tr\/blog\/ransomware\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.hosting.com.tr\/blog\/ransomware\/","url":"https:\/\/www.hosting.com.tr\/blog\/ransomware\/","name":"Ransomware Nedir? Ransomware Sald\u0131r\u0131s\u0131ndan Nas\u0131l Korunursunuz? - Hosting.com.tr","isPartOf":{"@id":"https:\/\/www.hosting.com.tr\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.hosting.com.tr\/blog\/ransomware\/#primaryimage"},"image":{"@id":"https:\/\/www.hosting.com.tr\/blog\/ransomware\/#primaryimage"},"thumbnailUrl":"https:\/\/www.hosting.com.tr\/blog\/wp-content\/uploads\/2022\/04\/ransomware-nedir-ransomware-saldirisindan-nasil-korunursunuz.jpeg","datePublished":"2022-04-19T07:26:05+00:00","dateModified":"2025-01-23T09:02:00+00:00","breadcrumb":{"@id":"https:\/\/www.hosting.com.tr\/blog\/ransomware\/#breadcrumb"},"inLanguage":"tr","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.hosting.com.tr\/blog\/ransomware\/"]}]},{"@type":"ImageObject","inLanguage":"tr","@id":"https:\/\/www.hosting.com.tr\/blog\/ransomware\/#primaryimage","url":"https:\/\/www.hosting.com.tr\/blog\/wp-content\/uploads\/2022\/04\/ransomware-nedir-ransomware-saldirisindan-nasil-korunursunuz.jpeg","contentUrl":"https:\/\/www.hosting.com.tr\/blog\/wp-content\/uploads\/2022\/04\/ransomware-nedir-ransomware-saldirisindan-nasil-korunursunuz.jpeg","width":720,"height":400,"caption":"Ransomware Nedir? Ransomware Sald\u0131r\u0131s\u0131ndan Nas\u0131l Korunursunuz?"},{"@type":"BreadcrumbList","@id":"https:\/\/www.hosting.com.tr\/blog\/ransomware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.hosting.com.tr\/blog\/"},{"@type":"ListItem","position":2,"name":"G\u00fcvenlik","item":"https:\/\/www.hosting.com.tr\/blog\/guvenlik\/"},{"@type":"ListItem","position":3,"name":"Ransomware Nedir? Ransomware Sald\u0131r\u0131s\u0131ndan Nas\u0131l Korunursunuz?"}]},{"@type":"WebSite","@id":"https:\/\/www.hosting.com.tr\/blog\/#website","url":"https:\/\/www.hosting.com.tr\/blog\/","name":"Hosting.com.tr","description":"Domain, Hosting, Startup\/Kobi, Dijital Pazarlama, Teknoloji, Wordpress ve Nas\u0131l Yap\u0131l\u0131r? kategorilerinde en g\u00fcncel yaz\u0131lar.","publisher":{"@id":"https:\/\/www.hosting.com.tr\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.hosting.com.tr\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"tr"},{"@type":"Organization","@id":"https:\/\/www.hosting.com.tr\/blog\/#organization","name":"Webhosting A.\u015e","url":"https:\/\/www.hosting.com.tr\/blog\/","logo":{"@type":"ImageObject","inLanguage":"tr","@id":"https:\/\/www.hosting.com.tr\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.hosting.com.tr\/blog\/wp-content\/uploads\/2025\/04\/hosting-logo.png","contentUrl":"https:\/\/www.hosting.com.tr\/blog\/wp-content\/uploads\/2025\/04\/hosting-logo.png","width":500,"height":157,"caption":"Webhosting A.\u015e"},"image":{"@id":"https:\/\/www.hosting.com.tr\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/hosting.com.tr","https:\/\/x.com\/hostingcomtr","https:\/\/instagram.com\/hostingcomtr","https:\/\/www.linkedin.com\/company\/hosting-com-tr\/","https:\/\/www.youtube.com\/channel\/UCFNJq7pU_T2SEjv7UgLDtRw"]},{"@type":"Person","@id":"https:\/\/www.hosting.com.tr\/blog\/#\/schema\/person\/769feb953535a36d98b2d05f5e3e1b73","name":"Sibel Ho\u015f","image":{"@type":"ImageObject","inLanguage":"tr","@id":"https:\/\/www.hosting.com.tr\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/71ef095ec76abd2cd680813a0851c643003d6b211003d0d1b5eb4d0e6f04caa6?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/71ef095ec76abd2cd680813a0851c643003d6b211003d0d1b5eb4d0e6f04caa6?s=96&r=g","caption":"Sibel Ho\u015f"},"url":"https:\/\/www.hosting.com.tr\/blog\/author\/sibel\/"}]}},"_links":{"self":[{"href":"https:\/\/www.hosting.com.tr\/blog\/wp-json\/wp\/v2\/posts\/8464","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.hosting.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.hosting.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.hosting.com.tr\/blog\/wp-json\/wp\/v2\/users\/20"}],"replies":[{"embeddable":true,"href":"https:\/\/www.hosting.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=8464"}],"version-history":[{"count":0,"href":"https:\/\/www.hosting.com.tr\/blog\/wp-json\/wp\/v2\/posts\/8464\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.hosting.com.tr\/blog\/wp-json\/wp\/v2\/media\/8465"}],"wp:attachment":[{"href":"https:\/\/www.hosting.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=8464"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.hosting.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=8464"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.hosting.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=8464"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}