{"id":2259,"date":"2022-04-19T10:21:52","date_gmt":"2022-04-19T07:21:52","guid":{"rendered":"https:\/\/uzmanposta.com\/blog\/?p=2259"},"modified":"2025-02-14T09:56:14","modified_gmt":"2025-02-14T06:56:14","slug":"ransomware","status":"publish","type":"post","link":"https:\/\/uzmanposta.com\/blog\/ransomware\/","title":{"rendered":"Ransomware Nedir, Nas\u0131l \u00c7al\u0131\u015f\u0131r? Fidye Vir\u00fcs\u00fcn\u00fcn Mail Yoluyla Bula\u015fmas\u0131n\u0131 Engelleme\u00a0"},"content":{"rendered":"\n<p>Ransomware sald\u0131r\u0131s\u0131 y\u00fcz\u00fcnden kritik i\u015f verileriniz aniden rehin al\u0131nd\u0131\u011f\u0131n\u0131 varsayal\u0131m. Bilgisayar korsanlar\u0131, onu eri\u015filemez k\u0131lmak i\u00e7in geli\u015fmi\u015f \u015fifreleme kulland\u0131 ve \u015fimdi de sizden para talep ediyor.&nbsp;<\/p>\n\n\n\n<p>Bu senaryoda nas\u0131l bir yol izlersiniz?&nbsp;<\/p>\n\n\n\n<p>\u00d6demeyi reddedebilirsiniz, fakat \u00f6demeyi yapsan\u0131z bile verilerinizin g\u00fcvenli\u011fini sa\u011flayabilir misiniz?&nbsp;<\/p>\n\n\n\n<p>Siz se\u00e7eneklerinizi d\u00fc\u015f\u00fcn\u00fcrken, i\u015fletmeniz her saniye kan kaybetmeye devam eder. Her ge\u00e7en dakika do\u011fru se\u00e7imi yapma bask\u0131s\u0131n\u0131 art\u0131r\u0131r.<\/p>\n\n\n\n<p>Bu senaryo hayali de\u011fil, \u015fimdiden d\u00fcnya \u00e7ap\u0131ndaki t\u00fcm sekt\u00f6rlerdeki her b\u00fcy\u00fckl\u00fckteki \u015firketi etkiledi ve s\u0131radaki \u015firket siz olabilirsiniz.&nbsp;<\/p>\n\n\n\n<p>B\u00f6yle bir felaket senaryosuna haz\u0131r m\u0131s\u0131n?<\/p>\n\n\n\n<p>Cevab\u0131n\u0131z hay\u0131rsa, bu yaz\u0131m\u0131zda size ransomware ile ilgili t\u00fcm detaylar\u0131 ad\u0131m ad\u0131m anlataca\u011f\u0131z.<\/p>\n\n\n\n<p>Haydi ba\u015flayal\u0131m!<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Ransomware Nedir?<\/h2>\n\n\n\n<p>Ransomware yani fidye yaz\u0131l\u0131m\u0131, ki\u015fisel bilgileri ve belgeleri \u015fifrelerken \u015fifrelerini \u00e7\u00f6zmek i\u00e7in bir fidye miktar\u0131 talep eden k\u00f6t\u00fc ama\u00e7l\u0131 bir yaz\u0131l\u0131md\u0131r. Bu fidye \u00f6demesi, anonimli\u011fi sa\u011flamak i\u00e7in temel olarak kripto para birimi kullan\u0131larak yap\u0131l\u0131r, ancak ba\u015fka yollar da kullan\u0131labilir. Dosyalar \u015fifrelendi\u011finde veya bir parolayla kilitlendi\u011finde, kurbana fidye \u00f6demesinin nas\u0131l yap\u0131laca\u011f\u0131n\u0131 ve bunun i\u00e7in dosyalar\u0131n kilidinin nas\u0131l a\u00e7\u0131laca\u011f\u0131n\u0131 a\u00e7\u0131klayan bir metin dosyas\u0131 sunulur.<\/p>\n\n\n\n<p>Para \u00f6dendikten sonra bile, bilgisayar korsanlar\u0131n\u0131n \u015fifre \u00e7\u00f6zme anahtar\u0131n\u0131 g\u00f6nderece\u011finin veya dosyalar\u0131n kilidini a\u00e7aca\u011f\u0131n\u0131n garantisi yoktur, ancak baz\u0131 hassas durumlarda kurbanlar en iyisini umarak \u00f6demeyi yaparlar.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Ransomware ve Malware Aras\u0131ndaki Fark Nedir?<\/h2>\n\n\n\n<p><a href=\"https:\/\/uzmanposta.com\/blog\/malware\/\">Malware (k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m)<\/a>, bir cihaza zarar veren t\u00fcm programlar\u0131 kapsayan genel bir terimdir. Bu nedenle hem vir\u00fcsler hem de fidye yaz\u0131l\u0131mlar\u0131 k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlard\u0131r. Fidye yaz\u0131l\u0131m\u0131, etkinle\u015ftirme s\u0131ras\u0131nda yay\u0131lan ve vir\u00fcsl\u00fc bilgisayar a\u011f\u0131ndaki dosyalar\u0131 \u015fifreleyen k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131md\u0131r. Cihaz\u0131n \u015fifresi yaln\u0131zca bir fidye \u00f6dendi\u011finde bilgisayar korsan\u0131 taraf\u0131ndan \u00e7\u00f6z\u00fcl\u00fcr.<\/p>\n\n\n\n<p><strong>Ransomware bir vir\u00fcs m\u00fc?<\/strong><\/p>\n\n\n\n<p>Hay\u0131r, fidye yaz\u0131l\u0131m\u0131 bir vir\u00fcs de\u011fildir. Vir\u00fcsler ve fidye yaz\u0131l\u0131mlar\u0131n\u0131n ikisi de k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m olsa da farkl\u0131d\u0131r. Vir\u00fcsler verilere bula\u015f\u0131r ve kendilerini \u00e7o\u011falt\u0131r. Ransomware ise dosyalar\u0131 \u015fifreler.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Ransomware Nas\u0131l \u00c7al\u0131\u015f\u0131r?<\/h2>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-full\"><img decoding=\"async\" width=\"750\" height=\"375\" src=\"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2022\/04\/ransomware-nasil-calisir.png\" alt=\"Ransomware Nas\u0131l \u00c7al\u0131\u015f\u0131r?\" class=\"wp-image-2265\" srcset=\"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2022\/04\/ransomware-nasil-calisir.png 750w, https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2022\/04\/ransomware-nasil-calisir-300x150.png 300w, https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2022\/04\/ransomware-nasil-calisir-360x180.png 360w\" sizes=\"(max-width: 750px) 100vw, 750px\" \/><\/figure><\/div>\n\n\n\n<ul class=\"wp-block-list\"><li>Fidye yaz\u0131l\u0131m\u0131n\u0131n yay\u0131lmas\u0131 \u00e7o\u011funlukla kimlik av\u0131 sald\u0131r\u0131lar\u0131yla ba\u015flar. Bir fidye yaz\u0131l\u0131m\u0131 sald\u0131r\u0131s\u0131, vir\u00fcsl\u00fc e-posta\u2019lar, mesajlar ve k\u00f6t\u00fc ama\u00e7l\u0131 siteler arac\u0131l\u0131\u011f\u0131yla kurban\u0131n cihaz\u0131na eri\u015fim sa\u011flar ve bu cihazdaki verileri \u015fifreler.<\/li><li>Fidye yaz\u0131l\u0131m\u0131 basit asimetrik \u015fifreleme algoritmalar\u0131 kullan\u0131r, bir kullan\u0131c\u0131n\u0131n dosyalar\u0131n\u0131 engeller ve anahtar\u0131 bilmeden bu dosyalar\u0131n \u015fifresinin \u00e7\u00f6z\u00fclmesini zorla\u015ft\u0131r\u0131r.<\/li><li>Ayr\u0131ca, yerel olarak depolanan dosyalar\u0131, e\u015flenmi\u015f ve e\u015flenmemi\u015f a\u011fdan eri\u015filebilen ayg\u0131tlar\u0131 i\u00e7eren hedeflenen dosya t\u00fcrleri i\u00e7in konumlar\u0131 e\u015fler.<\/li><li>Bunlar\u0131 k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m, g\u00fcvenilmeyen uygulama y\u00fcklemesi veya hatta g\u00fcvenli\u011fi ihlal edilmi\u015f bir kablosuz a\u011f arac\u0131l\u0131\u011f\u0131yla bula\u015ft\u0131rabilir.<\/li><li>Fidye yaz\u0131l\u0131ml\u0131 bir sistemi ihlal etmenin ba\u015fka bir yolu da Uzak Masa\u00fcst\u00fc Protokol\u00fc veya RDP eri\u015fimi kullanmakt\u0131r. Bu protokol\u00fc kullanarak bir bilgisayara uzaktan eri\u015ferek, bir bilgisayar korsan\u0131n\u0131n bu geli\u015fmelerden habersiz sahibi ile birlikte sisteme k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m y\u00fcklemesine izin verir.<\/li><li>Fidye yaz\u0131l\u0131m\u0131, \u015fifre \u00e7\u00f6zme i\u015flemini a\u00e7\u0131klayan talimat dosyalar\u0131 ekler ve ard\u0131ndan bu dosyalar\u0131 kullan\u0131c\u0131ya bir fidye notu sunmak i\u00e7in kullan\u0131r.<\/li><li>Fidye yaz\u0131l\u0131m\u0131 genellikle yaln\u0131zca \u00f6deme talimat\u0131 dosyalar\u0131n\u0131 b\u0131rakarak kendini sonland\u0131r\u0131p yok eder.<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Ransomware T\u00fcrleri Nelerdir?<\/h2>\n\n\n\n<p>Her fidye yaz\u0131l\u0131m\u0131 t\u00fcr\u00fc genellikle farkl\u0131d\u0131r, belirli a\u011flara sald\u0131rmak i\u00e7in geli\u015ftirildi\u011finden, \u00e7al\u0131\u015fma bi\u00e7imleri \u00e7ok farkl\u0131 olabilir. \u015eu anda kullan\u0131lan farkl\u0131 t\u00fcrde bir\u00e7ok ransomware t\u00fcr\u00fc vard\u0131r:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">1. Crypto Ransomware<\/h3>\n\n\n\n<p>Bu fidye yaz\u0131l\u0131m\u0131, bilgisayarlardaki yerel dosya ve belgeleri \u015fifreler. Dosyalar \u015fifrelendikten sonra, fidye yaz\u0131l\u0131m\u0131n\u0131n varyant\u0131 eski de\u011filse ve anahtarlar zaten internette mevcut de\u011filse \u015fifre \u00e7\u00f6zme anahtar\u0131n\u0131n bulunmas\u0131 imkans\u0131zd\u0131r.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">2. Locky Ransomware<\/h3>\n\n\n\n<p>Bilgisayar korsanlar\u0131na yap\u0131lan \u00f6deme tamamlan\u0131ncaya kadar standart bilgisayar i\u015flevlerine eri\u015filmesini engelleyen bir t\u00fcr k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131md\u0131r. Kurban\u0131n bilgisayar\u0131 birincil ama\u00e7lar i\u00e7in kullanmas\u0131na izin vermeyen bir kilit ekran\u0131 g\u00f6sterir.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">3. Mac Ransomware<\/h3>\n\n\n\n<p>2016&#8217;dan beri Mac i\u015fletim sistemlerinde fidye yaz\u0131l\u0131m\u0131 tespit edildi. KeRanger ad\u0131 verilen bu fidye yaz\u0131l\u0131m\u0131 bi\u00e7imi, Apple sistemlerine bula\u015f\u0131r ve Transmission adl\u0131 bir uygulama arac\u0131l\u0131\u011f\u0131yla kurbanlar\u0131n dosyalar\u0131n\u0131 \u015fifreler.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">4. Samsan Ransomware<\/h3>\n\n\n\n<p>A\u011flar\u0131n\u0131n internete bakan k\u0131sm\u0131ndaki yama uygulanmam\u0131\u015f WildFly uygulama sunucular\u0131na sald\u0131r\u0131r. Fidye yaz\u0131l\u0131m\u0131 a\u011f\u0131n i\u00e7ine girdikten sonra sald\u0131racak di\u011fer sistemleri arar.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">5. Ransomware-as-a-Service (RaaS)<\/h3>\n\n\n\n<p>Hizmet olarak fidye yaz\u0131l\u0131m\u0131, dark web&#8217;de anonim olarak bar\u0131nd\u0131r\u0131lan ve siber su\u00e7lular taraf\u0131ndan sunulan k\u00f6t\u00fc ama\u00e7l\u0131 bir yaz\u0131l\u0131md\u0131r. Bu bilgisayar korsanlar\u0131; y\u00fck\u00fc da\u011f\u0131tmak, fidye yaz\u0131l\u0131m\u0131 \u015fifre \u00e7\u00f6z\u00fcc\u00fclerini y\u00f6netmek ve fidyenin bir pay\u0131 i\u00e7in \u00f6deme toplamak dahil her ad\u0131m\u0131 y\u00f6netir.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">6. Labirent Ransomware<\/h3>\n\n\n\n<p>S\u0131z\u0131nt\u0131 yaz\u0131l\u0131m olarak adland\u0131r\u0131lan e\u011filimi temsil eden bir fidye yaz\u0131l\u0131m\u0131 \u00e7e\u015fididir. Veriler \u015fifrelendikten sonra, k\u00f6t\u00fc niyetli ki\u015filer, fidye \u00f6denmedi\u011fi s\u00fcrece \u00f6zel verileri dark web&#8217;e s\u0131zd\u0131rmakla tehdit eder.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">7. Scareware Ransomware<\/h3>\n\n\n\n<p>Bilgisayar\u0131n\u0131zda bir vir\u00fcs veya ba\u015fka bir sorun tespit etti\u011fini iddia eden ve sorunu \u00e7\u00f6zmek i\u00e7in sizi \u00f6demeye y\u00f6nlendiren sahte bir yaz\u0131l\u0131md\u0131r. Baz\u0131 yaz\u0131l\u0131mlar bilgisayar\u0131 kilitlerken, di\u011ferleri dosyalara zarar vermeden ekran\u0131 a\u00e7\u0131l\u0131r uyar\u0131larla doldurur.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Ransomware Nas\u0131l Yay\u0131l\u0131r?<\/h2>\n\n\n\n<p>Ransomware genellikle k\u00f6t\u00fc ama\u00e7l\u0131 ba\u011flant\u0131lar i\u00e7eren e-posta kimlik av\u0131 mesajlar\u0131 veya do\u011frudan indirme yoluyla yay\u0131l\u0131r. \u0130ndirme, bir kullan\u0131c\u0131 istemeden bir siteyi ziyaret etti\u011finde ve kullan\u0131c\u0131n\u0131n bilgisayar\u0131na veya mobil cihaz\u0131na k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m indirildi\u011finde ger\u00e7ekle\u015fir. Do\u011frudan indirme genellikle g\u00fcncel olmayan veya g\u00fcvenlik a\u00e7\u0131\u011f\u0131 olan bir taray\u0131c\u0131, uygulama veya i\u015fletim sisteminden yararlan\u0131r. Fidye yaz\u0131l\u0131m\u0131 daha sonra bu g\u00fcvenlik a\u00e7\u0131klar\u0131n\u0131 yay\u0131lacak di\u011fer sistemleri bulmak i\u00e7in kullan\u0131r.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Ransomware Sald\u0131r\u0131lar\u0131 Nas\u0131l \u00d6nlenir?<\/h2>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-full\"><img decoding=\"async\" width=\"750\" height=\"375\" src=\"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2022\/04\/ransomware-saldirilari-nasil-onlenir-1.png\" alt=\"Ransomware Sald\u0131r\u0131lar\u0131 Nas\u0131l \u00d6nlenir?\" class=\"wp-image-2264\" srcset=\"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2022\/04\/ransomware-saldirilari-nasil-onlenir-1.png 750w, https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2022\/04\/ransomware-saldirilari-nasil-onlenir-1-300x150.png 300w, https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2022\/04\/ransomware-saldirilari-nasil-onlenir-1-360x180.png 360w\" sizes=\"(max-width: 750px) 100vw, 750px\" \/><\/figure><\/div>\n\n\n\n<p>Art\u0131k ransomware sald\u0131r\u0131s\u0131n\u0131n ne oldu\u011funu bildi\u011finize g\u00f6re, \u015fimdi de bu sald\u0131r\u0131lar\u0131n nas\u0131l \u00f6nlenebilece\u011fini inceleyelim:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Ransomware sald\u0131r\u0131lar\u0131ndan korunmak i\u00e7in verilerinizin her zaman yedekleyin. Yedekleme i\u00e7in bulut depolama kullanabilir ya da sabit s\u00fcr\u00fcc\u00fcde fiziksel bir yedekleme yapabilirsiniz.<\/li><li>Sistemi en son g\u00fcvenlik yamalar\u0131yla g\u00fcncel tutun.<\/li><li>Sistem g\u00fcncellemelerinin yan\u0131 s\u0131ra, bilgisayar\u0131n\u0131za her zaman tan\u0131nm\u0131\u015f bir antivir\u00fcs yaz\u0131l\u0131m\u0131n\u0131n kurun. Kaspersky ve Bitdefender gibi \u00e7ok say\u0131da vir\u00fcsten koruma yaz\u0131l\u0131m\u0131, \u00f6zel belgelerin \u015fifrelenip \u015fifrelenmedi\u011fini d\u00fczenli olarak kontrol eden fidye yaz\u0131l\u0131m\u0131na kar\u015f\u0131 koruma \u00f6zelliklerine sahiptir.<\/li><li>\u0130nternette gezinirken, her zaman ek g\u00fcvenlik i\u00e7in HTTPS protokol\u00fcn\u00fcn varl\u0131\u011f\u0131n\u0131 g\u00f6steren adres \u00e7ubu\u011fundaki kilit simgesini kontrol edin.<\/li><li>E-posta ekleri, ana fidye yaz\u0131l\u0131m\u0131 bula\u015fma vekt\u00f6rleri aras\u0131ndad\u0131r. Bu y\u00fczden g\u00fcvenilmeyen veya tan\u0131d\u0131k olmayan g\u00f6nderenlerden gelen ekleri veya e-posta\u2019lar\u0131 a\u00e7maktan ka\u00e7\u0131n\u0131n. \u00d6zellikle kimlik av\u0131 spam&#8217;\u0131, hassas verilerinize eri\u015fmenizi engelleyebilecek ger\u00e7ekten k\u00f6t\u00fc ama\u00e7l\u0131 kod i\u00e7eren me\u015fru g\u00f6r\u00fcn\u00fcml\u00fc ba\u011flant\u0131lar i\u00e7erebilir.<\/li><li>Bulut hizmetlerini kullanmak (\u00f6rne\u011fin bir fidye yaz\u0131l\u0131m\u0131 sald\u0131r\u0131s\u0131ndan sonra yedeklemek ve kurtarmak i\u00e7in) hasar\u0131n azalt\u0131lmas\u0131na yard\u0131mc\u0131 olabilir ve i\u015fletmenizin dosyalar\u0131n\u0131 \u015fifrelenmemi\u015f \u015fekilde geri almas\u0131na izin verebilir.<\/li><li>Nomoreransom.org adl\u0131 bir web sitesi, en iyi bilinen fidye yaz\u0131l\u0131m\u0131 paketleri i\u00e7in bir \u015fifre \u00e7\u00f6zme ara\u00e7lar\u0131 koleksiyonuna sahiptir. Fidye yaz\u0131l\u0131m\u0131na kar\u015f\u0131 koruma ara\u00e7lar\u0131n\u0131n listesi kurbana yard\u0131mc\u0131 olmad\u0131ysa, belirli \u015fifreli dosyalar\u0131n \u015fifresinin \u00e7\u00f6z\u00fclmesine de yard\u0131mc\u0131 olabilir.<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Ransomware Nas\u0131l Kald\u0131r\u0131l\u0131r?<\/h2>\n\n\n\n<p>Bir ransomware vir\u00fcs sald\u0131r\u0131s\u0131n\u0131n sisteminizi ele ge\u00e7irmesi durumunda, a\u015fa\u011f\u0131daki ad\u0131mlar\u0131 uygulayarak yeniden eri\u015fim sa\u011flayabilirsiniz:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Etkilenen cihaz\u0131 izole edin ve fidye yaz\u0131l\u0131m\u0131 t\u00fcr\u00fcn\u00fc tan\u0131y\u0131n.<\/li><li>Yeniden eri\u015febilmek i\u00e7in vir\u00fcsl\u00fc dosyalar\u0131n\u0131z\u0131n \u015fifresini \u00e7\u00f6zmek i\u00e7in fidye yaz\u0131l\u0131m\u0131 \u015fifre \u00e7\u00f6zme ara\u00e7lar\u0131n\u0131 da\u011f\u0131t\u0131n.<\/li><li>Fidye yaz\u0131l\u0131m\u0131 vir\u00fcs\u00fcn\u00fc tespit etmek i\u00e7in cihaz\u0131 ara\u015ft\u0131r\u0131n ve taray\u0131n.<\/li><li>Dosyalar\u0131 veri yedeklerinden kurtar\u0131n. Diski bi\u00e7imlendirdikten ve temizlemeyi geri y\u00fckledikten sonra, fidye yaz\u0131l\u0131m\u0131 sisteminizden ba\u015far\u0131yla kald\u0131r\u0131lacakt\u0131r.<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Ransomware Vir\u00fcs\u00fcn\u00fcn Maile Yoluyla Bula\u015fmas\u0131n\u0131 Engellemek \u0130\u00e7in Alman\u0131z Gereken \u00d6nlemler<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">1. E-posta adresinizi vermekten ka\u00e7\u0131n\u0131n<\/h3>\n\n\n\n<p>Pek \u00e7ok bilgisayar korsan\u0131, herkesin eri\u015febilece\u011fi web sitelerinde (web forumlar\u0131 gibi) arama yaparak bulabilecekleri e-posta adresi toplar. Ama\u00e7, k\u00f6t\u00fc ama\u00e7l\u0131 kodu yaymak veya istenmeyen posta g\u00f6ndermek, istenmeyen reklam kampanyalar\u0131 ba\u015flatmak veya kimlik av\u0131 sald\u0131r\u0131lar\u0131 d\u00fczenlemek gibi di\u011fer k\u00f6t\u00fc ama\u00e7l\u0131 faaliyetleri ger\u00e7ekle\u015ftirmek i\u00e7in \u00e7ok say\u0131da e-posta hesab\u0131n\u0131 bir araya getirmektir.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">2. E-posta i\u00e7eri\u011fini kontrol edin<\/h3>\n\n\n\n<p>E-posta\u2019lar\u0131n i\u00e7eri\u011finin yan\u0131 s\u0131ra ekler, k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlar\u0131 yaymak i\u00e7in \u00e7ok yayg\u0131n bir y\u00f6ntemdir. Bu nedenle, bir e-posta g\u00f6ndereni kontrol etmek, kula\u011fa kar\u015f\u0131 koyamayacak kadar cazip gelen tekliflere \u00f6zen g\u00f6stermek, g\u00f6nderilenin ger\u00e7ekten bir e-posta olup olmad\u0131\u011f\u0131n\u0131 kontrol etmek ve \u015f\u00fcpheli ba\u011flant\u0131lara t\u0131klamamak gibi uygulamalar, al\u0131nmas\u0131 gereken temel \u00f6nlemlerdir.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">3. Geli\u015fmi\u015f e-posta g\u00fcvenlik \u00f6nlemlerine sahip bir e-posta servis sa\u011flay\u0131c\u0131 kullan\u0131n<\/h3>\n\n\n\n<p>Uzman Posta gibi profesyonel e-posta servis sa\u011flay\u0131c\u0131lar\u0131, sizi spam\u2019den ve di\u011fer sald\u0131r\u0131lardan korumak i\u00e7in geli\u015fmi\u015f e-posta g\u00fcvenlik \u00f6nlemlerine sahiptir. Bu \u00f6nlemler aras\u0131nda, g\u00fc\u00e7l\u00fc parola ve eri\u015fim kontrol mekanizmalar\u0131na sahip e-posta sunucular\u0131; \u015fifreli e-posta mesajlar\u0131, spam filtreleme yaz\u0131l\u0131m\u0131 vb. bir\u00e7ok \u00f6zellik vard\u0131r.<\/p>\n\n\n\n<p>Siz de spam e-posta\u2019lardan hi\u00e7bir zahmete girmeden kurtulmak istiyorsan\u0131z, <a href=\"https:\/\/uzmanposta.com\/kurumsal-e-posta\/\">profesyonel e-posta servisimiz<\/a>de bulunan paket fiyat ve \u00f6zelliklerimizi detayl\u0131 incelemek i\u00e7in hemen t\u0131klay\u0131n.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">4. \u0130\u015fletim sisteminizi, yaz\u0131l\u0131m\u0131n\u0131z\u0131 ve uygulamalar\u0131n\u0131z\u0131 g\u00fcncel tutun<\/h3>\n\n\n\n<p>Yaz\u0131l\u0131m\u0131n\u0131z\u0131 g\u00fcncellemek, daha fazla bula\u015fmay\u0131 \u00f6nlemek i\u00e7in gereklidir. Vir\u00fcsten koruma yaz\u0131l\u0131m\u0131n\u0131z varsa, vir\u00fcs imzalar\u0131n\u0131n g\u00fcncel olmas\u0131 ve ayarlar\u0131n\u0131n do\u011fru yap\u0131land\u0131r\u0131lmas\u0131 \u00f6nemlidir, b\u00f6ylece bu t\u00fcr bir tehdit tespit edilirse engellenir.<\/p>\n\n\n\n<p>Benzer \u015fekilde, bilgisayar\u0131n\u0131za indirip y\u00fckledi\u011finiz yaz\u0131l\u0131m\u0131n orijinalli\u011fini kontrol etmeniz de \u00f6nemlidir. Fidye yaz\u0131l\u0131m\u0131 yayman\u0131n en yayg\u0131n y\u00f6ntemi e-posta olsa da, web sitelerine veya s\u0131k indirilen yasal programlara ve uygulamalara bula\u015fmak gibi di\u011fer sald\u0131r\u0131 vekt\u00f6rleri de kullan\u0131labilir.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">5. Bilgilerinizi harici s\u00fcr\u00fcc\u00fclerde yedekleyin<\/h3>\n\n\n\n<p>K\u00f6t\u00fc ama\u00e7l\u0131 bir kodun bilgisayar\u0131n\u0131za veya bilgilerinize ba\u015far\u0131yla bula\u015fmas\u0131 ve zarar vermesi durumunda, son \u00e7are koruma y\u00f6ntemi olarak yard\u0131mc\u0131 olabilecek uygulama, yedek s\u00fcr\u00fcc\u00fclerin kullan\u0131lmas\u0131d\u0131r.&nbsp;<\/p>\n\n\n\n<p>Tan\u0131mad\u0131\u011f\u0131n\u0131z ki\u015filerden gelen e-posta mesajlar\u0131n\u0131 yok saymak ve ekleri indirmemek, bula\u015fmay\u0131 \u00f6nlemenin en \u00f6nemli iki yoludur, ancak bilgisayar\u0131n\u0131za fidye yaz\u0131l\u0131m\u0131 bula\u015f\u0131rsa, yedekleme en iyi savunma silah\u0131n\u0131zd\u0131r.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Fidye Yaz\u0131l\u0131m\u0131n\u0131 \u00d6demeli Misiniz?<\/h2>\n\n\n\n<p>Hay\u0131r. \u00c7o\u011fu durumda fidyeyi \u00f6dememelisiniz. Bunun yerine herhangi bir fidye yaz\u0131l\u0131m\u0131n\u0131n sisteminize bula\u015fmas\u0131n\u0131 \u00f6nlemek i\u00e7in mevcut olan yedekleme ve kurtarma se\u00e7eneklerine \u00f6ncelik vermelisiniz. Verileri fidye yaz\u0131l\u0131mlar\u0131ndan korumak ve \u00f6nlemek i\u00e7in fidyeyi \u00f6demek asla bir se\u00e7enek de\u011fildir.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Tarihteki En Pop\u00fcler Ransomware Sald\u0131r\u0131lar\u0131<\/h2>\n\n\n\n<p>A\u015fa\u011f\u0131da son y\u0131llarda meydana gelen ve t\u00fcm d\u00fcnyan\u0131n dikkatini \u00e7eken en pop\u00fcler be\u015f fidye yaz\u0131l\u0131m\u0131 sald\u0131r\u0131s\u0131n\u0131 bulabilirsiniz:<\/p>\n\n\n\n<p><strong>WannaCry:<\/strong> WannaCry fidye yaz\u0131l\u0131m\u0131 ilk olarak 2017&#8217;de ortaya \u00e7\u0131kt\u0131 ve 150&#8217;den fazla \u00fclkede binlerce bilgisayara bula\u015ft\u0131.<\/p>\n\n\n\n<p><strong>Petya:<\/strong> Petya fidye yaz\u0131l\u0131m\u0131, ilk olarak 2016&#8217;da ortaya \u00e7\u0131kan \u015fifreleyici bir k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131md\u0131r. Kritik dosyalar\u0131 \u015fifreler ve \u00f6demedi\u011finiz s\u00fcrece onlar\u0131 rehin tutar.<\/p>\n\n\n\n<p><strong>Cerber:<\/strong> 2016 y\u0131l\u0131nda ortaya \u00e7\u0131kan Cerber, kimlik av\u0131 e-posta\u2019lar\u0131 yoluyla yay\u0131lan ve geli\u015fmi\u015f \u015fifreleme y\u00f6ntemleriyle kullan\u0131c\u0131lar\u0131n dosya ve verilerini \u015fifreler.&nbsp;<\/p>\n\n\n\n<p><strong>BadRabbit:<\/strong> BadRabbit fidye yaz\u0131l\u0131m\u0131, Petya fidye yaz\u0131l\u0131m\u0131n\u0131n geli\u015ftirilmi\u015f bir \u00e7e\u015fididir. Kurbanlar\u0131n bilgisayarlar\u0131n\u0131, sunucular\u0131n\u0131 ve di\u011fer dosyalar\u0131n\u0131 kilitler ve fidye \u00f6denene kadar tekrar eri\u015fimlerini engeller.<\/p>\n\n\n\n<p><strong>Locky:<\/strong> 2016&#8217;da piyasaya s\u00fcr\u00fclen Locky, bula\u015f\u0131c\u0131 makrolar i\u00e7eren kusurlu bir Microsoft Word belgesi bi\u00e7iminde bir fatura arac\u0131l\u0131\u011f\u0131yla \u00f6deme talep eden e-posta\u2019lar kullan\u0131larak g\u00f6nderilen bir t\u00fcr fidye yaz\u0131l\u0131m\u0131d\u0131r.<\/p>\n\n\n\n<p>\u00d6zetle diyebiliriz ki, kurumsal \u00e7al\u0131\u015fma k\u00fclt\u00fcr\u00fcn\u00fcn ofisten evden \u00e7al\u0131\u015fmaya kaymas\u0131 nedeniyle fidye yaz\u0131l\u0131m\u0131 sald\u0131r\u0131lar\u0131 giderek daha yayg\u0131n hale geldi. Mart 2021&#8217;de, CNA Financial adl\u0131 Chicago merkezli bir \u015firket, yakla\u015f\u0131k 75.000 kullan\u0131c\u0131y\u0131 etkileyen bir fidye yaz\u0131l\u0131m\u0131 sald\u0131r\u0131s\u0131na u\u011frad\u0131. \u015eirket daha sonra sistem eri\u015fimini geri almak i\u00e7in 40 milyon dolar \u00f6demek zorunda kald\u0131. Bu \u00f6rnekten de anlayaca\u011f\u0131n\u0131z gibi fidye yaz\u0131l\u0131m\u0131, i\u015fletmelere \u00e7ok fazla maliyete neden olur. Bu y\u00fczden d\u00fcnya \u00e7ap\u0131ndaki g\u00fcvenlik uzmanlar\u0131 aras\u0131nda b\u00fcy\u00fcyen bir tehdittir.<\/p>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<p><strong>\u0130lgili \u0130\u00e7erikler:<\/strong><\/p>\n\n\n\n<p><a href=\"https:\/\/uzmanposta.com\/blog\/advanced-persistent-threat-apt\/\">Advanced Persistent Threat (APT) Nedir? Ki\u015filer ve \u0130\u015fletmeler Kendilerini Geli\u015fmi\u015f Kal\u0131c\u0131 Tehdit Sald\u0131r\u0131lar\u0131ndan Nas\u0131l Korumal\u0131?<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/uzmanposta.com\/blog\/ransomware\/\">Ransomware Nedir, Nas\u0131l \u00c7al\u0131\u015f\u0131r? Ransomware Vir\u00fcs\u00fcn\u00fcn Mail Yoluyla Bula\u015fmas\u0131n\u0131 Engelleme&nbsp;<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/uzmanposta.com\/blog\/viruslu-e-mail-guvenligi\/\">Vir\u00fcsl\u00fc E-Mailler Hakk\u0131nda Al\u0131nacak \u00d6nlemler ve E-Posta G\u00fcvenli\u011fi<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/uzmanposta.com\/blog\/e-posta-sunucu-destekli-antivirus-programlari\/\">E-posta Sunucu Destekli Antivir\u00fcs Programlar\u0131<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/uzmanposta.com\/blog\/penetrasyon-sizma-testi\/\">Penetrasyon (S\u0131zma) Testi Nedir, A\u015famalar\u0131 Nelerdir? Firmalar G\u00fcvenlik A\u00e7\u0131klar\u0131n\u0131 Nas\u0131l Giderebilir?<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/uzmanposta.com\/blog\/credential-stuffing\/\">Credential Stuffing Nedir? Kimlik Bilgisi Doldurma Sald\u0131r\u0131s\u0131 Nas\u0131l \u00d6nlenir? E-ticaret Sitelerinin Verileri \u0130\u00e7in B\u00fcy\u00fck Tehlike<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/uzmanposta.com\/blog\/spoofing\/\">Spoofing Nedir? \u015eirketler \u0130\u00e7in Spoofing Tehditleri: IP Spoofing Sald\u0131r\u0131lar\u0131na Kar\u015f\u0131 Korunma Stratejileri<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/uzmanposta.com\/blog\/botnet\/\">Botnet Nedir? \u0130\u015fletmeler Verilerinin G\u00fcvenli\u011fini Nas\u0131l Sa\u011flamal\u0131? Botnet Sald\u0131r\u0131s\u0131ndan Nas\u0131l Korunmal\u0131d\u0131r?<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/uzmanposta.com\/blog\/mail-transfer-agent-mta\/\">Mail Transfer Agent (MTA) Nedir? \u0130\u015fletmeler Online Ortamda E-Posta Hesaplar\u0131n\u0131 Nas\u0131l Korumal\u0131?<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/uzmanposta.com\/blog\/dlp-data-loss-prevention\/\">DLP (Data Loss Prevention) Nedir? Kurumlar \u0130\u00e7in \u0130nternet Ortam\u0131nda Tehditleri \u0130zleme ve Verileri G\u00fcvende Tutma Rehberi<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/uzmanposta.com\/blog\/firewall-nedir\/\">Firewall Nedir, Ne \u0130\u015fe Yarar? Firewall T\u00fcrleri<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/uzmanposta.com\/blog\/phishing-nedir\/\">Phishing Nedir? Phishing (Oltalama) Sald\u0131r\u0131s\u0131 Nas\u0131l Engellenir?<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/uzmanposta.com\/blog\/sosyal-muhendislik\/\">Sosyal M\u00fchendislik Nedir? Sosyal M\u00fchendislik Sald\u0131r\u0131lar\u0131 Nas\u0131l \u00d6nlenir?<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/uzmanposta.com\/blog\/kimlik-avi-nedir-nasil-onlenir\/\">Kimlik Av\u0131 Nedir, Nas\u0131l \u00d6nlenir?<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/uzmanposta.com\/blog\/man-in-the-middle-atagi-mitm\/\">Man-in-the-Middle Ata\u011f\u0131 (MitM) Nedir? Nas\u0131l \u00c7al\u0131\u015f\u0131r? Nas\u0131l \u00d6nlenir?<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ransomware sald\u0131r\u0131s\u0131 y\u00fcz\u00fcnden kritik i\u015f verileriniz aniden rehin al\u0131nd\u0131\u011f\u0131n\u0131 varsayal\u0131m. Bilgisayar korsanlar\u0131, onu eri\u015filemez k\u0131lmak i\u00e7in geli\u015fmi\u015f \u015fifreleme kulland\u0131 ve \u015fimdi de sizden para talep ediyor.&nbsp; Bu senaryoda nas\u0131l bir yol izlersiniz?&nbsp; \u00d6demeyi reddedebilirsiniz, fakat \u00f6demeyi yapsan\u0131z bile verilerinizin g\u00fcvenli\u011fini sa\u011flayabilir misiniz?&nbsp; Siz se\u00e7eneklerinizi d\u00fc\u015f\u00fcn\u00fcrken, i\u015fletmeniz her saniye kan kaybetmeye devam eder. Her ge\u00e7en dakika [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":2266,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[86,1],"tags":[],"class_list":["post-2259","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-guvenlik","category-nedir-nasil-yapilir"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Ransomware Nedir, Nas\u0131l \u00c7al\u0131\u015f\u0131r? Fidye Vir\u00fcs\u00fcn\u00fcn Mail Yoluyla Bula\u015fmas\u0131n\u0131 Engelleme\u00a0 - Uzman Posta<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/uzmanposta.com\/blog\/ransomware\/\" \/>\n<meta property=\"og:locale\" content=\"tr_TR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ransomware Nedir, Nas\u0131l \u00c7al\u0131\u015f\u0131r? Fidye Vir\u00fcs\u00fcn\u00fcn Mail Yoluyla Bula\u015fmas\u0131n\u0131 Engelleme\u00a0 - Uzman Posta\" \/>\n<meta property=\"og:description\" content=\"Ransomware sald\u0131r\u0131s\u0131 y\u00fcz\u00fcnden kritik i\u015f verileriniz aniden rehin al\u0131nd\u0131\u011f\u0131n\u0131 varsayal\u0131m. Bilgisayar korsanlar\u0131, onu eri\u015filemez k\u0131lmak i\u00e7in geli\u015fmi\u015f \u015fifreleme kulland\u0131 ve \u015fimdi de sizden para talep ediyor.&nbsp; Bu senaryoda nas\u0131l bir yol izlersiniz?&nbsp; \u00d6demeyi reddedebilirsiniz, fakat \u00f6demeyi yapsan\u0131z bile verilerinizin g\u00fcvenli\u011fini sa\u011flayabilir misiniz?&nbsp; Siz se\u00e7eneklerinizi d\u00fc\u015f\u00fcn\u00fcrken, i\u015fletmeniz her saniye kan kaybetmeye devam eder. Her ge\u00e7en dakika [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/uzmanposta.com\/blog\/ransomware\/\" \/>\n<meta property=\"og:site_name\" content=\"Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/uzmanposta\/\" \/>\n<meta property=\"article:published_time\" content=\"2022-04-19T07:21:52+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-02-14T06:56:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2022\/04\/ransomware-nedir-nasil-calisir-ransomware-virusunun-mail-yoluyla-bulasmasini-engelleme.png\" \/>\n\t<meta property=\"og:image:width\" content=\"750\" \/>\n\t<meta property=\"og:image:height\" content=\"375\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Sibel Ho\u015f\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@uZmanPosta\" \/>\n<meta name=\"twitter:site\" content=\"@uZmanPosta\" \/>\n<meta name=\"twitter:label1\" content=\"Yazan:\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sibel Ho\u015f\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tahmini okuma s\u00fcresi\" \/>\n\t<meta name=\"twitter:data2\" content=\"11 dakika\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ransomware Nedir, Nas\u0131l \u00c7al\u0131\u015f\u0131r? Fidye Vir\u00fcs\u00fcn\u00fcn Mail Yoluyla Bula\u015fmas\u0131n\u0131 Engelleme\u00a0 - Uzman Posta","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/uzmanposta.com\/blog\/ransomware\/","og_locale":"tr_TR","og_type":"article","og_title":"Ransomware Nedir, Nas\u0131l \u00c7al\u0131\u015f\u0131r? Fidye Vir\u00fcs\u00fcn\u00fcn Mail Yoluyla Bula\u015fmas\u0131n\u0131 Engelleme\u00a0 - Uzman Posta","og_description":"Ransomware sald\u0131r\u0131s\u0131 y\u00fcz\u00fcnden kritik i\u015f verileriniz aniden rehin al\u0131nd\u0131\u011f\u0131n\u0131 varsayal\u0131m. Bilgisayar korsanlar\u0131, onu eri\u015filemez k\u0131lmak i\u00e7in geli\u015fmi\u015f \u015fifreleme kulland\u0131 ve \u015fimdi de sizden para talep ediyor.&nbsp; Bu senaryoda nas\u0131l bir yol izlersiniz?&nbsp; \u00d6demeyi reddedebilirsiniz, fakat \u00f6demeyi yapsan\u0131z bile verilerinizin g\u00fcvenli\u011fini sa\u011flayabilir misiniz?&nbsp; Siz se\u00e7eneklerinizi d\u00fc\u015f\u00fcn\u00fcrken, i\u015fletmeniz her saniye kan kaybetmeye devam eder. Her ge\u00e7en dakika [&hellip;]","og_url":"https:\/\/uzmanposta.com\/blog\/ransomware\/","og_site_name":"Blog","article_publisher":"https:\/\/www.facebook.com\/uzmanposta\/","article_published_time":"2022-04-19T07:21:52+00:00","article_modified_time":"2025-02-14T06:56:14+00:00","og_image":[{"width":750,"height":375,"url":"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2022\/04\/ransomware-nedir-nasil-calisir-ransomware-virusunun-mail-yoluyla-bulasmasini-engelleme.png","type":"image\/png"}],"author":"Sibel Ho\u015f","twitter_card":"summary_large_image","twitter_creator":"@uZmanPosta","twitter_site":"@uZmanPosta","twitter_misc":{"Yazan:":"Sibel Ho\u015f","Tahmini okuma s\u00fcresi":"11 dakika"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/uzmanposta.com\/blog\/ransomware\/#article","isPartOf":{"@id":"https:\/\/uzmanposta.com\/blog\/ransomware\/"},"author":{"name":"Sibel Ho\u015f","@id":"https:\/\/uzmanposta.com\/blog\/#\/schema\/person\/ac85212a35ebcaaf56c92a7e051813d6"},"headline":"Ransomware Nedir, Nas\u0131l \u00c7al\u0131\u015f\u0131r? Fidye Vir\u00fcs\u00fcn\u00fcn Mail Yoluyla Bula\u015fmas\u0131n\u0131 Engelleme\u00a0","datePublished":"2022-04-19T07:21:52+00:00","dateModified":"2025-02-14T06:56:14+00:00","mainEntityOfPage":{"@id":"https:\/\/uzmanposta.com\/blog\/ransomware\/"},"wordCount":2646,"publisher":{"@id":"https:\/\/uzmanposta.com\/blog\/#organization"},"image":{"@id":"https:\/\/uzmanposta.com\/blog\/ransomware\/#primaryimage"},"thumbnailUrl":"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2022\/04\/ransomware-nedir-nasil-calisir-ransomware-virusunun-mail-yoluyla-bulasmasini-engelleme.png","articleSection":["G\u00fcvenlik","Nedir? Nas\u0131l Yap\u0131l\u0131r?"],"inLanguage":"tr"},{"@type":"WebPage","@id":"https:\/\/uzmanposta.com\/blog\/ransomware\/","url":"https:\/\/uzmanposta.com\/blog\/ransomware\/","name":"Ransomware Nedir, Nas\u0131l \u00c7al\u0131\u015f\u0131r? Fidye Vir\u00fcs\u00fcn\u00fcn Mail Yoluyla Bula\u015fmas\u0131n\u0131 Engelleme\u00a0 - Uzman Posta","isPartOf":{"@id":"https:\/\/uzmanposta.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/uzmanposta.com\/blog\/ransomware\/#primaryimage"},"image":{"@id":"https:\/\/uzmanposta.com\/blog\/ransomware\/#primaryimage"},"thumbnailUrl":"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2022\/04\/ransomware-nedir-nasil-calisir-ransomware-virusunun-mail-yoluyla-bulasmasini-engelleme.png","datePublished":"2022-04-19T07:21:52+00:00","dateModified":"2025-02-14T06:56:14+00:00","breadcrumb":{"@id":"https:\/\/uzmanposta.com\/blog\/ransomware\/#breadcrumb"},"inLanguage":"tr","potentialAction":[{"@type":"ReadAction","target":["https:\/\/uzmanposta.com\/blog\/ransomware\/"]}]},{"@type":"ImageObject","inLanguage":"tr","@id":"https:\/\/uzmanposta.com\/blog\/ransomware\/#primaryimage","url":"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2022\/04\/ransomware-nedir-nasil-calisir-ransomware-virusunun-mail-yoluyla-bulasmasini-engelleme.png","contentUrl":"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2022\/04\/ransomware-nedir-nasil-calisir-ransomware-virusunun-mail-yoluyla-bulasmasini-engelleme.png","width":750,"height":375,"caption":"Ransomware Nedir, Nas\u0131l \u00c7al\u0131\u015f\u0131r? Ransomware Vir\u00fcs\u00fcn\u00fcn Mail Yoluyla Bula\u015fmas\u0131n\u0131 Engelleme\u00a0"},{"@type":"BreadcrumbList","@id":"https:\/\/uzmanposta.com\/blog\/ransomware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/uzmanposta.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Nedir? Nas\u0131l Yap\u0131l\u0131r?","item":"https:\/\/uzmanposta.com\/blog\/nedir-nasil-yapilir\/"},{"@type":"ListItem","position":3,"name":"Ransomware Nedir, Nas\u0131l \u00c7al\u0131\u015f\u0131r? Fidye Vir\u00fcs\u00fcn\u00fcn Mail Yoluyla Bula\u015fmas\u0131n\u0131 Engelleme\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/uzmanposta.com\/blog\/#website","url":"https:\/\/uzmanposta.com\/blog\/","name":"Blog","description":"","publisher":{"@id":"https:\/\/uzmanposta.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/uzmanposta.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"tr"},{"@type":"Organization","@id":"https:\/\/uzmanposta.com\/blog\/#organization","name":"Uzman Posta","url":"https:\/\/uzmanposta.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"tr","@id":"https:\/\/uzmanposta.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2020\/05\/logo.png","contentUrl":"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2020\/05\/logo.png","width":131,"height":60,"caption":"Uzman Posta"},"image":{"@id":"https:\/\/uzmanposta.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/uzmanposta\/","https:\/\/x.com\/uZmanPosta","https:\/\/www.instagram.com\/uzmanposta\/","https:\/\/www.linkedin.com\/company\/uzmanposta\/","https:\/\/www.youtube.com\/channel\/UCk2n1vp1YJ0n3XaDRWBi88Q"]},{"@type":"Person","@id":"https:\/\/uzmanposta.com\/blog\/#\/schema\/person\/ac85212a35ebcaaf56c92a7e051813d6","name":"Sibel Ho\u015f","image":{"@type":"ImageObject","inLanguage":"tr","@id":"https:\/\/secure.gravatar.com\/avatar\/f925f03d20ff0803ddb37c96d39d3793c085014ce56421050f24823c23db1c2a?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/f925f03d20ff0803ddb37c96d39d3793c085014ce56421050f24823c23db1c2a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f925f03d20ff0803ddb37c96d39d3793c085014ce56421050f24823c23db1c2a?s=96&d=mm&r=g","caption":"Sibel Ho\u015f"},"sameAs":["https:\/\/sibelhos.com\/","https:\/\/www.instagram.com\/bismoothie\/","https:\/\/www.linkedin.com\/in\/sibelhos\/"]}]}},"_links":{"self":[{"href":"https:\/\/uzmanposta.com\/blog\/wp-json\/wp\/v2\/posts\/2259","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/uzmanposta.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/uzmanposta.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/uzmanposta.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/uzmanposta.com\/blog\/wp-json\/wp\/v2\/comments?post=2259"}],"version-history":[{"count":0,"href":"https:\/\/uzmanposta.com\/blog\/wp-json\/wp\/v2\/posts\/2259\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/uzmanposta.com\/blog\/wp-json\/wp\/v2\/media\/2266"}],"wp:attachment":[{"href":"https:\/\/uzmanposta.com\/blog\/wp-json\/wp\/v2\/media?parent=2259"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/uzmanposta.com\/blog\/wp-json\/wp\/v2\/categories?post=2259"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/uzmanposta.com\/blog\/wp-json\/wp\/v2\/tags?post=2259"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}