{"id":3009,"date":"2023-03-20T09:58:50","date_gmt":"2023-03-20T06:58:50","guid":{"rendered":"https:\/\/uzmanposta.com\/blog\/?p=3009"},"modified":"2023-05-18T21:01:09","modified_gmt":"2023-05-18T18:01:09","slug":"advanced-persistent-threat-apt","status":"publish","type":"post","link":"https:\/\/uzmanposta.com\/blog\/advanced-persistent-threat-apt\/","title":{"rendered":"Advanced Persistent Threat (APT) Nedir? Ki\u015filer ve \u0130\u015fletmeler Kendilerini Geli\u015fmi\u015f Kal\u0131c\u0131 Tehdit Sald\u0131r\u0131lar\u0131ndan Nas\u0131l Korumal\u0131?\ufffc"},"content":{"rendered":"\n<p><strong>Advanced persistent threat<\/strong> yani <strong>geli\u015fmi\u015f kal\u0131c\u0131 tehdit<\/strong>, bilgisayar korsanlar\u0131n\u0131n genellikle uzun bir s\u00fcre boyunca tespit edilemeyen sistemlere s\u0131zmak i\u00e7in birlikte \u00e7al\u0131\u015ft\u0131\u011f\u0131 ve verileri \u00e7ald\u0131\u011f\u0131 bir siber sald\u0131r\u0131 t\u00fcr\u00fcd\u00fcr. \u00c7o\u011fu durumda, bu siber sald\u0131r\u0131lar, ba\u015fka bir h\u00fck\u00fcmeti baltalamak isteyen ulus devletler taraf\u0131ndan ger\u00e7ekle\u015ftirilir.<\/p>\n\n\n\n<p>K\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m ve kimlik av\u0131 gibi di\u011fer siber sald\u0131r\u0131lar birka\u00e7 g\u00fcn i\u00e7inde i\u015fe yararken, bir APT aylar hatta y\u0131llar i\u00e7inde ger\u00e7ekle\u015febilir.<\/p>\n\n\n\n<p>APT gruplar\u0131, daha zorlu g\u00f6revlerin \u00fcstesinden gelmek i\u00e7in olu\u015fturulur, ancak bunlar sand\u0131\u011f\u0131n\u0131z kadar pahal\u0131 de\u011fildir. Bir APT sald\u0131r\u0131s\u0131n\u0131n maliyetinin 2019&#8217;da 15.000 dolara kadar d\u00fc\u015ft\u00fc\u011f\u00fc g\u00f6zlemlenmi\u015ftir. Bu siber sald\u0131r\u0131lar\u0131n en pahal\u0131 y\u00f6n\u00fc, sistem ve a\u011flar i\u00e7indeki g\u00fcvenlik a\u00e7\u0131klar\u0131n\u0131 bulmalar\u0131na yard\u0131mc\u0131 olan ticari penetrasyon testi ara\u00e7lar\u0131d\u0131r.<\/p>\n\n\n\n<p>Bir APT sald\u0131r\u0131s\u0131n\u0131n arkas\u0131ndaki ama\u00e7lar, di\u011fer siber sald\u0131r\u0131 t\u00fcrleri gibi mali kazan\u00e7lar i\u00e7in olabilir, ancak bunlar ayn\u0131 zamanda siyasi casusluk ama\u00e7lar\u0131 i\u00e7in de kullan\u0131l\u0131r.&nbsp;<\/p>\n\n\n\n<p>APT terimi bazen bu taktikleri kullanan ve devlet destekli olmas\u0131 gerekmeyen k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlar\u0131 belirtmek i\u00e7in de kullan\u0131l\u0131r, ancak en yayg\u0131n kullan\u0131m devlet destekli sald\u0131r\u0131lar\u0131 ifade eder.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Advanced Persistent Threat Nas\u0131l \u00c7al\u0131\u015f\u0131r?<\/h2>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-full\"><img decoding=\"async\" width=\"725\" height=\"661\" src=\"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/03\/advanced-persistent-threat-nasil-calisir.png\" alt=\"\" class=\"wp-image-3153\" srcset=\"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/03\/advanced-persistent-threat-nasil-calisir.png 725w, https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/03\/advanced-persistent-threat-nasil-calisir-300x274.png 300w\" sizes=\"(max-width: 725px) 100vw, 725px\" \/><figcaption>Kaynak: researchgate<\/figcaption><\/figure><\/div>\n\n\n\n<p>Bir APT sald\u0131r\u0131s\u0131 s\u0131zma ile ba\u015flar. Ard\u0131ndan, bir APT sald\u0131r\u0131s\u0131 varl\u0131\u011f\u0131n\u0131 geni\u015fletmeye ve de\u011ferli verilere eri\u015fimi olan \u00e7al\u0131\u015fanlar\u0131 tehlikeye atmaya \u00e7al\u0131\u015f\u0131r. Yeterli bilgi topland\u0131ktan sonra bilgisayar korsanlar\u0131 \u00e7\u0131kard\u0131klar\u0131n\u0131 bir DDoS sald\u0131r\u0131s\u0131 veya ba\u015fka bir dikkat da\u011f\u0131tma y\u00f6ntemiyle maskeler.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">1. \u0130stihbarat Toplama<\/h3>\n\n\n\n<p>Bilgisayar korsan\u0131, a\u011f topolojisi, \u00e7al\u0131\u015fanlar ve g\u00fcvenlik sistemleri dahil olmak \u00fczere hedef i\u015fletme hakk\u0131nda bilgi toplayarak i\u015fe ba\u015flar. Bu bilgiler, halka a\u00e7\u0131k kaynaklardan ya da sosyal m\u00fchendislik yoluyla veya i\u015fletmenim web sitesindeki g\u00fcvenlik a\u00e7\u0131klar\u0131ndan yararlan\u0131larak elde edilebilir.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">2. Giri\u015f Noktalar\u0131 ve S\u0131zma<\/h3>\n\n\n\n<p>Bilgisayar korsan\u0131, hedef a\u011fa veya sisteme hedefli kimlik av\u0131 e-posta\u2019lar\u0131, yama yap\u0131lmam\u0131\u015f yaz\u0131l\u0131m g\u00fcvenlik a\u00e7\u0131klar\u0131ndan yararlanma veya \u00e7al\u0131nan kimlik bilgilerini kullanma gibi \u00e7e\u015fitli yollarla eri\u015fim sa\u011flar.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">3. \u0130leti\u015fim \u2013 Komuta ve Kontrol<\/h3>\n\n\n\n<p>Bilgisayar korsan\u0131 a\u011f\u0131n i\u00e7ine girdikten sonra hedef sistem \u00fczerinde kal\u0131c\u0131 eri\u015fim ve kontrol sa\u011flamak i\u00e7in bir arka kap\u0131 veya komuta &#8211; kontrol (C2) kanal\u0131 kurar. Bilgisayar korsan\u0131, gizli kalmak i\u00e7in k\u00f6t\u00fc ama\u00e7l\u0131 trafi\u011fi me\u015fru a\u011f trafi\u011fi gibi g\u00f6stermek veya ileti\u015fimleri gizlemek i\u00e7in \u015fifreleme kullanmak gibi \u00e7e\u015fitli teknikler kullan\u0131r.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">4. Ayr\u0131cal\u0131klar\u0131 Art\u0131rma<\/h3>\n\n\n\n<p>Bilgisayar korsan\u0131, daha de\u011ferli bilgi ve sistemlere eri\u015fim elde etmek i\u00e7in hedef sistemdeki ayr\u0131cal\u0131klar\u0131n\u0131 y\u00fckseltmeye \u00e7al\u0131\u015f\u0131r. Bu, yama uygulanmam\u0131\u015f g\u00fcvenlik a\u00e7\u0131klar\u0131ndan yararlan\u0131larak \u00e7al\u0131nan kimlik bilgileri kullan\u0131larak veya sosyal m\u00fchendislik sald\u0131r\u0131lar\u0131 ile ba\u015far\u0131labilir.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">5. Yanal Hareket<\/h3>\n\n\n\n<p>Bilgisayar korsan\u0131, hedef a\u011f boyunca yanal olarak hareket ederek farkl\u0131 sistemleri ke\u015ffeder ve daha de\u011ferli hedefler bulur. Bu, bilgisayar korsan\u0131n\u0131n tespit edilmekten ka\u00e7mas\u0131na ve a\u011f \u00fczerinde kontrol\u00fc elinde tutmas\u0131na yard\u0131mc\u0131 olur.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">6. Kal\u0131c\u0131l\u0131\u011f\u0131 Koruma<\/h3>\n\n\n\n<p>Bilgisayar korsan\u0131, genellikle g\u00fcvenlik sistemleri taraf\u0131ndan tespit edilmekten ka\u00e7\u0131nmak i\u00e7in ara\u00e7 ve tekniklerini periyodik olarak g\u00fcncelleyerek hedef a\u011f \u00fczerinde eri\u015fim ve kontrol sa\u011flamaya devam eder.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">7. Verileri S\u0131zd\u0131rma<\/h3>\n\n\n\n<p>Son olarak, bilgisayar korsan\u0131 hassas verileri hedef a\u011f veya sistemden s\u0131zd\u0131r\u0131r. Veriler \u00e7al\u0131nabilir, karanl\u0131k a\u011fda sat\u0131labilir veya ba\u015fka k\u00f6t\u00fc ama\u00e7lar i\u00e7in kullan\u0131labilir.<\/p>\n\n\n\n<p>APT sald\u0131r\u0131lar\u0131n\u0131n tamamlanmas\u0131 aylar hatta y\u0131llar alabilir ve bir i\u015fletmenin itibar\u0131na ve mali durumuna \u00f6nemli \u00f6l\u00e7\u00fcde zarar verebilir.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Bir APT Sald\u0131r\u0131s\u0131n\u0131n \u00d6zellikleri<\/h2>\n\n\n\n<p>A\u015fa\u011f\u0131dakiler, bir APT sald\u0131r\u0131s\u0131n\u0131n ortak \u00f6zelliklerinden baz\u0131lar\u0131d\u0131r:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">1. Hedeflilik<\/h3>\n\n\n\n<p>APT sald\u0131r\u0131lar\u0131, belirli bir i\u015fletmeye veya sekt\u00f6re odaklan\u0131r. Bilgisayar korsanlar\u0131, istismar edilebilecek g\u00fcvenlik a\u00e7\u0131klar\u0131n\u0131 ve zay\u0131fl\u0131klar\u0131 belirlemek i\u00e7in hedefin sistemlerini, \u00e7al\u0131\u015fanlar\u0131n\u0131 ve altyap\u0131s\u0131n\u0131 ara\u015ft\u0131rmak i\u00e7in zaman harcar.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">2. Gizlilik<\/h3>\n\n\n\n<p>APT sald\u0131r\u0131lar\u0131, uzun s\u00fcre tespit edilmeyecek \u015fekilde tasarlanm\u0131\u015ft\u0131r. Bilgisayar korsanlar\u0131, gizli kalmak ve tespit edilmekten ka\u00e7\u0131nmak i\u00e7in rootkit&#8217;ler, arka kap\u0131lar ve komuta ve kontrol (C2) sunucular\u0131 gibi geli\u015fmi\u015f teknikler kullan\u0131r.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">3. Kal\u0131c\u0131l\u0131k<\/h3>\n\n\n\n<p>APT sald\u0131r\u0131lar\u0131 tek seferlik bir olay de\u011fildir. Hedef a\u011fa kal\u0131c\u0131 olarak s\u0131zmak ve kontrol\u00fcn\u00fc s\u00fcrd\u00fcrmek i\u00e7in tasarlanm\u0131\u015ft\u0131r. Bilgisayar korsanlar\u0131, uzun bir s\u00fcre tespit edilmeden kalmak i\u00e7in yanal hareket, veri h\u0131rs\u0131zl\u0131\u011f\u0131 ve \u0131srar gibi taktiklerin bir kombinasyonunu kullanabilir.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">4. Geli\u015fmi\u015f Teknikler<\/h3>\n\n\n\n<p>APT sald\u0131r\u0131lar\u0131, geleneksel g\u00fcvenlik \u00f6nlemlerini atlamak ve hedef a\u011fa eri\u015fim elde etmek i\u00e7in sosyal m\u00fchendislik, s\u0131f\u0131r g\u00fcn istismarlar\u0131 ve \u00f6zel k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlar gibi geli\u015fmi\u015f teknikler kullan\u0131r.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">5. Koordine ve Organize<\/h3>\n\n\n\n<p>APT sald\u0131r\u0131lar\u0131 genellikle koordineli ve organize bir \u015fekilde birlikte \u00e7al\u0131\u015fan bir grup y\u00fcksek vas\u0131fl\u0131 bilgisayar korsan\u0131 taraf\u0131ndan ger\u00e7ekle\u015ftirilir. Grup i\u00e7inde belirli roller ve sorumluluklar olabilir ve bu ki\u015filer birbirleriyle ileti\u015fim kurmak i\u00e7in \u015fifreli ileti\u015fim kanallar\u0131 kullanabilir.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">6. Veri H\u0131rs\u0131zl\u0131\u011f\u0131<\/h3>\n\n\n\n<p>APT sald\u0131r\u0131lar\u0131, hassas verileri hedef a\u011fdan \u00e7almak i\u00e7in tasarlanm\u0131\u015ft\u0131r. Bilgisayar korsanlar\u0131, verilerin \u00e7al\u0131nmas\u0131n\u0131 gizlemek ve tespit edilmekten ka\u00e7\u0131nmak i\u00e7in steganografi, \u015fifreleme ve karartma gibi geli\u015fmi\u015f teknikler kullan\u0131r.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">7. Uzun Vadeli Etki<\/h3>\n\n\n\n<p>Ba\u015far\u0131l\u0131 bir APT sald\u0131r\u0131s\u0131n\u0131n hedef i\u015fletme i\u00e7in uzun vadeli sonu\u00e7lar\u0131 olabilir. Bu, mali kayba, itibar\u0131n zarar g\u00f6rmesine ve fikri m\u00fclkiyet kayb\u0131na neden olabilir.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">APT Sald\u0131r\u0131lar\u0131n\u0131n Arkas\u0131nda Kim Var?<\/h2>\n\n\n\n<p><strong>APT sald\u0131r\u0131lar\u0131n\u0131n amac\u0131<\/strong> mutlaka mali de\u011fildir. APT\u2019ler \u00e7o\u011funlukla istihbaratla ilgili oldu\u011fu i\u00e7in en \u00e7ok \u00fclkelerin kendi siber askeri veya bilgisayar korsan\u0131 kurulu\u015flar\u0131 taraf\u0131ndan ger\u00e7ekle\u015ftirilen sald\u0131r\u0131 t\u00fcrleridir. Bu, ulus-devlet sald\u0131rganlar\u0131n\u0131n ve devlet destekli gruplar\u0131n \u00e7o\u011funlukla APT sald\u0131r\u0131lar\u0131 ger\u00e7ekle\u015ftirdikleri anlam\u0131na gelir.<\/p>\n\n\n\n<p>Bununla birlikte, son zamanlarda di\u011fer iyi finanse edilmi\u015f ve kaynaklara sahip bilgisayar korsan\u0131 gruplar\u0131n\u0131n APT sald\u0131r\u0131lar\u0131 ger\u00e7ekle\u015fti\u011fi g\u00f6r\u00fclmektedir. Bu bilgisayar korsan\u0131 gruplar\u0131 ya devlet kurumlar\u0131 ad\u0131na \u00e7al\u0131\u015facak (muhtemelen kazan\u00e7l\u0131 bir fiyat kar\u015f\u0131l\u0131\u011f\u0131nda) ya da b\u00fcy\u00fck \u015firketler veya devlet daireleri hakk\u0131nda casusluk yapmak i\u00e7in ba\u015fka nedenleri olabilecek b\u00fcy\u00fck \u015firketler taraf\u0131ndan yap\u0131labilir.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">APT Sald\u0131r\u0131lar\u0131 \u0130\u00e7in En \u00c7ok Kim Risk Alt\u0131ndad\u0131r?<\/h2>\n\n\n\n<p>H\u00fck\u00fcmetler, devlet kurumlar\u0131 ve kritik bir altyap\u0131ya sahip olan \u015firketler, APT sald\u0131r\u0131lar\u0131n\u0131n en \u00e7ok hedef ald\u0131\u011f\u0131 kitledir. Ancak, bar\u0131nd\u0131rd\u0131klar\u0131 veri miktar\u0131 ve en hassas verilerinin de\u011feri nedeniyle b\u00fcy\u00fck \u015firket ve i\u015fletmeler de ana hedefler aras\u0131ndad\u0131r.<\/p>\n\n\n\n<p>Ge\u00e7ti\u011fimiz birka\u00e7 y\u0131lda, APT sald\u0131r\u0131lar\u0131 orta \u00f6l\u00e7ekli i\u015fletmeler, b\u00fcy\u00fck tedarik zinciri ve altyap\u0131 sa\u011flay\u0131c\u0131lar\u0131 (SolarWinds&#8217;te g\u00f6rd\u00fc\u011f\u00fcm\u00fcz gibi) gibi her t\u00fcrl\u00fc kurulu\u015fu etkilemi\u015ftir ve bu trendin 2022 ve sonras\u0131nda da devam etmesi muhtemeldir. Bunun nedeni, APT sald\u0131r\u0131lar\u0131n\u0131 ger\u00e7ekle\u015ftirmenin art\u0131k daha kolay olmas\u0131 ve hacker gruplar\u0131n\u0131n bu t\u00fcr sald\u0131r\u0131lar\u0131 ger\u00e7ekle\u015ftirmek i\u00e7in daha fazla kayna\u011fa sahip olmas\u0131d\u0131r.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">APT Sald\u0131r\u0131lar\u0131na Kar\u015f\u0131 Nas\u0131l Korunursunuz?<\/h2>\n\n\n\n<p><strong>Geli\u015fmi\u015f Kal\u0131c\u0131 Tehdit (APT) sald\u0131r\u0131lar\u0131na kar\u015f\u0131 koruma sa\u011flamak <\/strong>i\u00e7in \u00e7ok katmanl\u0131 bir g\u00fcvenlik yakla\u015f\u0131m\u0131 gerekir. \u0130\u015fletmelerin APT sald\u0131r\u0131lar\u0131na kar\u015f\u0131 korunmas\u0131na yard\u0131mc\u0131 olabilecek baz\u0131 \u00f6nlemler a\u015fa\u011f\u0131dakileri i\u00e7erir:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">1. G\u00fcvenlik fark\u0131ndal\u0131\u011f\u0131 e\u011fitimi<\/h3>\n\n\n\n<p>APT sald\u0131r\u0131lar\u0131na kar\u015f\u0131 korunman\u0131n en etkili yollar\u0131ndan biri, \u00e7al\u0131\u015fanlar\u0131, bilgisayar korsanlar\u0131n\u0131n bir a\u011fa eri\u015fim elde etmek i\u00e7in kulland\u0131klar\u0131 kimlik av\u0131 e-posta\u2019lar\u0131n\u0131 ve di\u011fer sosyal m\u00fchendislik taktiklerini tan\u0131ma konusunda e\u011fitmektir.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">2. A\u011f segmentasyonu<\/h3>\n\n\n\n<p>Bir a\u011f\u0131 segmentlere ay\u0131rmak, bir APT sald\u0131r\u0131s\u0131n\u0131n yay\u0131lmas\u0131n\u0131 kontrol alt\u0131na almaya yard\u0131mc\u0131 olabilir. Bir a\u011f\u0131 daha k\u00fc\u00e7\u00fck par\u00e7alara b\u00f6lerek, bir bilgisayar korsan\u0131n\u0131n eri\u015fimi belirli bir alanla s\u0131n\u0131rland\u0131r\u0131labilir ve bu da bilgisayar korsanlar\u0131n\u0131n a\u011f boyunca yatay olarak hareket etmesini engeller.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">3. Eri\u015fim kontrol\u00fc<\/h3>\n\n\n\n<p>Hassas veri ve sistemlere eri\u015fimi sadece ihtiyac\u0131 olan ki\u015filerle s\u0131n\u0131rlamak, APT sald\u0131r\u0131s\u0131 riskini azaltmaya yard\u0131mc\u0131 olur. Eri\u015fim kontrol\u00fc, iki fakt\u00f6rl\u00fc kimlik do\u011frulama ve g\u00fc\u00e7l\u00fc parola politikalar\u0131 uygulama gibi \u00f6nlemleri i\u00e7erebilir.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">4. D\u00fczenli yama uygulama<\/h3>\n\n\n\n<p>Sistem ve yaz\u0131l\u0131mlar\u0131 en son g\u00fcvenlik yamalar\u0131yla g\u00fcncel tutmak, bilgisayar korsanlar\u0131n\u0131n bilinen g\u00fcvenlik a\u00e7\u0131klar\u0131ndan yararlanmalar\u0131n\u0131 \u00f6nlemeye yard\u0131mc\u0131 olur.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">5. U\u00e7 nokta korumas\u0131<\/h3>\n\n\n\n<p>Vir\u00fcsten koruma yaz\u0131l\u0131m\u0131, g\u00fcvenlik duvarlar\u0131 ve izinsiz giri\u015f tespit sistemleri gibi u\u00e7 nokta koruma \u00e7\u00f6z\u00fcmleri, u\u00e7 noktada APT sald\u0131r\u0131lar\u0131n\u0131n alg\u0131lanmas\u0131na ve \u00f6nlenmesine yard\u0131mc\u0131 olur.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">6. A\u011f izleme<\/h3>\n\n\n\n<p>A\u011f trafi\u011finin s\u00fcrekli izlenmesi, \u015f\u00fcpheli etkinli\u011fin ve potansiyel bir APT sald\u0131r\u0131s\u0131n\u0131n g\u00f6stergelerinin saptanmas\u0131na yard\u0131mc\u0131 olur.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">6. Olay yan\u0131t planlamas\u0131<\/h3>\n\n\n\n<p>\u0130\u015fletmelerin, olas\u0131 bir APT sald\u0131r\u0131s\u0131na yan\u0131t vermek i\u00e7in sald\u0131r\u0131y\u0131 kontrol alt\u0131na alma, hafifletme ve payda\u015flarla ileti\u015fim kurma prosed\u00fcrleri dahil olmak \u00fczere bir plan\u0131 olmal\u0131d\u0131r.<\/p>\n\n\n\n<p>\u0130\u015fletmeler, bu \u00f6nlemleri uygulayarak bir APT sald\u0131r\u0131s\u0131n\u0131n kurban\u0131 olma risklerini \u00f6nemli \u00f6l\u00e7\u00fcde azaltabilir. Fakat, APT sald\u0131r\u0131lar\u0131n\u0131n son derece karma\u015f\u0131k oldu\u011funu, s\u00fcrekli geli\u015fti\u011fini ve i\u015fletmelerin bilgisayar korsanlar\u0131n\u0131n \u00f6n\u00fcnde ge\u00e7ebilmek i\u00e7in s\u00fcrekli tetikte kalmas\u0131 gerekti\u011fini bilmesi gerekir.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Advanced Persistent Threat \u00d6rnekleri<\/h2>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-full\"><img decoding=\"async\" width=\"1000\" height=\"500\" src=\"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/03\/advanced-persistent-threat-ornekleri.jpeg\" alt=\"\" class=\"wp-image-3154\" srcset=\"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/03\/advanced-persistent-threat-ornekleri.jpeg 1000w, https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/03\/advanced-persistent-threat-ornekleri-300x150.jpeg 300w, https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/03\/advanced-persistent-threat-ornekleri-768x384.jpeg 768w, https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/03\/advanced-persistent-threat-ornekleri-360x180.jpeg 360w, https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/03\/advanced-persistent-threat-ornekleri-750x375.jpeg 750w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" \/><\/figure><\/div>\n\n\n\n<p>Y\u0131llar boyunca Geli\u015fmi\u015f Kal\u0131c\u0131 Tehdit (APT) sald\u0131r\u0131lar\u0131n\u0131n birka\u00e7 pop\u00fcler \u00f6rne\u011fi olmu\u015ftur. Bunlar a\u015fa\u011f\u0131daki \u015fekildedir:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">1. Operation Aurora<\/h3>\n\n\n\n<p>Operation Aurora, 2009-2010&#8217;da Google, Adobe ve Juniper Networks dahil olmak \u00fczere bir\u00e7ok b\u00fcy\u00fck \u015firketi hedef alan bir siber sald\u0131r\u0131yd\u0131. Devlet destekli oldu\u011funa inan\u0131lan bilgisayar korsanlar\u0131, hedeflenen \u015firketlerin a\u011flar\u0131na eri\u015fmek ve fikri m\u00fclkiyeti \u00e7almak i\u00e7in s\u0131f\u0131r\u0131nc\u0131 g\u00fcn a\u00e7\u0131klar\u0131 ve sosyal m\u00fchendislik taktiklerinin bir kombinasyonunu kulland\u0131.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">2. Stuxnet<\/h3>\n\n\n\n<p>Bir APT&#8217;nin ilk ve tarihsel olarak en belirgin \u00f6rneklerinden biri, \u0130ran&#8217;\u0131n n\u00fckleer program\u0131n\u0131 hedef almak i\u00e7in tasarlanm\u0131\u015f olan Stuxnet&#8217;tir. Stuxnet, 2010 y\u0131l\u0131nda ke\u015ffedilmi\u015f olmas\u0131na ra\u011fmen 2005 y\u0131l\u0131ndan beri geli\u015ftirilme a\u015famas\u0131nda oldu\u011fu d\u00fc\u015f\u00fcn\u00fclmektedir.<\/p>\n\n\n\n<p>Stuxnet ke\u015ffedildi\u011finde, \u0130ran&#8217;da 14&#8217;ten fazla end\u00fcstriyel sitenin yaz\u0131l\u0131m\u0131na bula\u015fan 500 kilobaytl\u0131k bir bilgisayar solucan\u0131yd\u0131. Microsoft Windows makinelerini hedef ald\u0131 ve kendi kendine yay\u0131ld\u0131. Sonu\u00e7 olarak \u0130ran n\u00fckleer santrif\u00fcjlerinin neredeyse be\u015fte birini kaybetti.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">3. Sony Pictures hack<\/h3>\n\n\n\n<p>2014 y\u0131l\u0131nda Sony Pictures, hassas \u00e7al\u0131\u015fan verilerinin ve yay\u0131nlanmam\u0131\u015f filmlerin \u00e7al\u0131nmas\u0131yla sonu\u00e7lanan b\u00fcy\u00fck bir siber sald\u0131r\u0131ya maruz kald\u0131. Kuzey Koreli olduklar\u0131na inan\u0131lan bilgisayar korsanlar\u0131, sald\u0131r\u0131y\u0131 ger\u00e7ekle\u015ftirmek i\u00e7in \u00f6zel k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m, sosyal m\u00fchendislik ve y\u0131k\u0131c\u0131 taktiklerin bir kombinasyonunu kulland\u0131.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">4. Operation Cloud Hopper<\/h3>\n\n\n\n<p>Operation Cloud Hopper, m\u00fc\u015fterilerinin a\u011flar\u0131na eri\u015fim elde etmek i\u00e7in birka\u00e7 b\u00fcy\u00fck BT hizmeti \u015firketini hedef alan bir siber casusluk kampanyas\u0131yd\u0131. Devlet destekli oldu\u011funa inan\u0131lan bilgisayar korsanlar\u0131, sald\u0131r\u0131y\u0131 ger\u00e7ekle\u015ftirmek i\u00e7in hedef odakl\u0131 kimlik av\u0131, arka kap\u0131lar ve \u00f6zel k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlar\u0131n bir kombinasyonunu kulland\u0131.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">5. SolarWinds hack<\/h3>\n\n\n\n<p>2020&#8217;nin sonlar\u0131nda, birka\u00e7 ABD devlet kurumu ve \u015firketinin, bir tedarik zinciri sald\u0131r\u0131s\u0131n\u0131n par\u00e7as\u0131 olarak ihlal edildi\u011fi ke\u015ffedildi. Rus devlet destekli bilgisayar korsanlar\u0131 oldu\u011funa inan\u0131lan bu ki\u015filer, b\u00fcy\u00fck bir BT y\u00f6netim yaz\u0131l\u0131m\u0131 sa\u011flay\u0131c\u0131s\u0131 olan SolarWinds&#8217;in yaz\u0131l\u0131m tedarik zincirine s\u0131zd\u0131 ve bunu hedeflerine \u00f6zel k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m da\u011f\u0131tmak i\u00e7in kulland\u0131.<\/p>\n\n\n\n<p>Yukar\u0131dakiler, APT sald\u0131r\u0131lar\u0131n\u0131n sadece birka\u00e7 pop\u00fcler \u00f6rne\u011fidir. APT sald\u0131r\u0131lar\u0131, her b\u00fcy\u00fckl\u00fckteki i\u015fletme i\u00e7in ciddi bir tehdit olmaya devam etmektedir. Bu y\u00fczden i\u015fletmelerin her zaman tetikte kalmas\u0131 ve bu sald\u0131r\u0131lara kar\u015f\u0131 korunmak i\u00e7in sa\u011flam g\u00fcvenlik \u00f6nlemleri uygulamas\u0131 gerekir.<\/p>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<p><strong>\u0130lgili \u0130\u00e7erikler<\/strong><\/p>\n\n\n\n<p><a href=\"https:\/\/uzmanposta.com\/blog\/ssl-guvenlik-sertifikasi-nedir\/\">SSL Nedir? SSL G\u00fcvenlik Sertifikas\u0131 Ne \u0130\u015fe Yarar?<\/a>, <a href=\"https:\/\/uzmanposta.com\/blog\/tls\/\" target=\"_blank\" rel=\"noreferrer noopener\">TLS Nedir? SSL\/TLS Kullanarak G\u00fcvenli E-posta G\u00f6nderin veya Al\u0131n<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/uzmanposta.com\/blog\/phishing-nedir\/\" target=\"_blank\" rel=\"noreferrer noopener\">Phishing Nedir? Phishing (Oltalama) Sald\u0131r\u0131s\u0131 Nas\u0131l Engellenir?<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/uzmanposta.com\/blog\/ransomware\/\" target=\"_blank\" rel=\"noreferrer noopener\">Ransomware Nedir, Nas\u0131l \u00c7al\u0131\u015f\u0131r? Ransomware Vir\u00fcs\u00fcn\u00fcn Mail Yoluyla Bula\u015fmas\u0131n\u0131 Engelleme&nbsp;<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/uzmanposta.com\/blog\/bec\/\" target=\"_blank\" rel=\"noreferrer noopener\">Business Email Compromise (BEC) Nedir? BEC Sald\u0131r\u0131lar\u0131 Nas\u0131l Engellenir?<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/uzmanposta.com\/blog\/kimlik-avi-nedir-nasil-onlenir\/\" target=\"_blank\" rel=\"noreferrer noopener\">Kimlik Av\u0131 Nedir, Nas\u0131l \u00d6nlenir?<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/uzmanposta.com\/blog\/viruslu-e-mail-guvenligi\/\" target=\"_blank\" rel=\"noreferrer noopener\">Vir\u00fcsl\u00fc E-Mailler Hakk\u0131nda Al\u0131nacak \u00d6nlemler ve E-Posta G\u00fcvenli\u011fi<\/a>, <a href=\"https:\/\/uzmanposta.com\/blog\/e-posta-sunucu-destekli-antivirus-programlari\/\" target=\"_blank\" rel=\"noreferrer noopener\">E-posta Sunucu Destekli Antivir\u00fcs Programlar\u0131<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/uzmanposta.com\/blog\/antispam-nedir\/\" target=\"_blank\" rel=\"noreferrer noopener\">Antispam Nedir?&nbsp;<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/uzmanposta.com\/blog\/guvenli-e-posta-iletisimi\/\" target=\"_blank\" rel=\"noreferrer noopener\">G\u00fcvenli E-posta \u0130leti\u015fimi i\u00e7in Al\u0131nacak \u00d6nlemler<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/uzmanposta.com\/blog\/e-posta-uzerinden-yapilan-saldirilar-ve-alinmasi-gereken-onlemler\/\" target=\"_blank\" rel=\"noreferrer noopener\">E-Posta \u00dczerinden Yap\u0131lan Sald\u0131r\u0131lar ve Al\u0131nmas\u0131 Gereken \u00d6nlemler<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/uzmanposta.com\/blog\/siber-guvenlik-nedir-veri-guvenligini-nasil-saglariz\/\" target=\"_blank\" rel=\"noreferrer noopener\">Siber G\u00fcvenlik Nedir? Veri G\u00fcvenli\u011fini Nas\u0131l Sa\u011flar\u0131z?<\/a>, <a href=\"https:\/\/uzmanposta.com\/blog\/siber-saldiri\/\" target=\"_blank\" rel=\"noreferrer noopener\">Siber Sald\u0131r\u0131 Nedir? \u0130\u015fletmeler E-Posta Verilerini Siber Sald\u0131r\u0131dan Nas\u0131l Korumal\u0131d\u0131r?<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/uzmanposta.com\/blog\/sosyal-muhendislik\/\" target=\"_blank\" rel=\"noreferrer noopener\">Sosyal M\u00fchendislik Nedir? Sosyal M\u00fchendislik Sald\u0131r\u0131lar\u0131 Nas\u0131l \u00d6nlenir?<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/uzmanposta.com\/blog\/spam-e-posta-nedir\/\" target=\"_blank\" rel=\"noreferrer noopener\">Spam E-Posta Nedir? Zararl\u0131 Maillerden Korunun<\/a>, <a href=\"https:\/\/uzmanposta.com\/blog\/mail-neden-spama-duser-maillerin-spama-dusmesini-engelleme\/\" target=\"_blank\" rel=\"noreferrer noopener\">Mail Neden Spama D\u00fc\u015fer? \u00d6nemli Maillerin Spama D\u00fc\u015fmesini Engelleme<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/uzmanposta.com\/blog\/istenmeyen-e-posta\/\" target=\"_blank\" rel=\"noreferrer noopener\">\u0130stenmeyen E-Posta Nedir? \u0130stenmeyen Mailleri Engelleme<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/uzmanposta.com\/blog\/firewall-nedir\/\">Firewall Nedir, Ne \u0130\u015fe Yarar? Firewall T\u00fcrleri<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/uzmanposta.com\/blog\/dlp-data-loss-prevention\/\">DLP (Data Loss Prevention) Nedir? Kurumlar \u0130\u00e7in \u0130nternet Ortam\u0131nda Tehditleri \u0130zleme ve Verileri G\u00fcvende Tutma Rehberi<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/uzmanposta.com\/blog\/botnet\/\">Botnet Nedir? \u0130\u015fletmeler Verilerinin G\u00fcvenli\u011fini Nas\u0131l Sa\u011flamal\u0131? Botnet Sald\u0131r\u0131s\u0131ndan Nas\u0131l Korunmal\u0131d\u0131r?<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/uzmanposta.com\/blog\/mail-transfer-agent-mta\/\">Mail Transfer Agent (MTA) Nedir? \u0130\u015fletmeler Online Ortamda E-Posta Hesaplar\u0131n\u0131 Nas\u0131l Korumal\u0131?<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/uzmanposta.com\/blog\/credential-stuffing\/\">Credential Stuffing Nedir? Kimlik Bilgisi Doldurma Sald\u0131r\u0131s\u0131 Nas\u0131l \u00d6nlenir? E-ticaret Sitelerinin Verileri \u0130\u00e7in B\u00fcy\u00fck Tehlike<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/uzmanposta.com\/blog\/spoofing\/\">Spoofing Nedir? \u015eirketler \u0130\u00e7in Spoofing Tehditleri: IP Spoofing Sald\u0131r\u0131lar\u0131na Kar\u015f\u0131 Korunma Stratejileri<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/uzmanposta.com\/blog\/penetrasyon-sizma-testi\/\">Penetrasyon (S\u0131zma) Testi Nedir, A\u015famalar\u0131 Nelerdir? Firmalar G\u00fcvenlik A\u00e7\u0131klar\u0131n\u0131 Nas\u0131l Giderebilir?<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/uzmanposta.com\/blog\/malware\/\">Malware: Nedir? Nas\u0131l Temizlenir, Nas\u0131l Bula\u015f\u0131r? \u0130\u015fletmeler E-posta G\u00fcvenli\u011fi Hususunda Malware Sald\u0131r\u0131s\u0131ndan Nas\u0131l Korunabilir?<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/uzmanposta.com\/blog\/man-in-the-middle-atagi-mitm\/\">Man-in-the-Middle Ata\u011f\u0131 (MitM) Nedir? Nas\u0131l \u00c7al\u0131\u015f\u0131r? Nas\u0131l \u00d6nlenir?<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Advanced persistent threat yani geli\u015fmi\u015f kal\u0131c\u0131 tehdit, bilgisayar korsanlar\u0131n\u0131n genellikle uzun bir s\u00fcre boyunca tespit edilemeyen sistemlere s\u0131zmak i\u00e7in birlikte \u00e7al\u0131\u015ft\u0131\u011f\u0131 ve verileri \u00e7ald\u0131\u011f\u0131 bir siber sald\u0131r\u0131 t\u00fcr\u00fcd\u00fcr. \u00c7o\u011fu durumda, bu siber sald\u0131r\u0131lar, ba\u015fka bir h\u00fck\u00fcmeti baltalamak isteyen ulus devletler taraf\u0131ndan ger\u00e7ekle\u015ftirilir. K\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m ve kimlik av\u0131 gibi di\u011fer siber sald\u0131r\u0131lar birka\u00e7 g\u00fcn i\u00e7inde [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":3151,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[86,1],"tags":[],"class_list":["post-3009","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-guvenlik","category-nedir-nasil-yapilir"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Advanced Persistent Threat (APT) Nedir? Ki\u015filer ve \u0130\u015fletmeler Kendilerini Geli\u015fmi\u015f Kal\u0131c\u0131 Tehdit Sald\u0131r\u0131lar\u0131ndan Nas\u0131l Korumal\u0131?\ufffc - Uzman Posta<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/uzmanposta.com\/blog\/advanced-persistent-threat-apt\/\" \/>\n<meta property=\"og:locale\" content=\"tr_TR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Advanced Persistent Threat (APT) Nedir? Ki\u015filer ve \u0130\u015fletmeler Kendilerini Geli\u015fmi\u015f Kal\u0131c\u0131 Tehdit Sald\u0131r\u0131lar\u0131ndan Nas\u0131l Korumal\u0131?\ufffc - Uzman Posta\" \/>\n<meta property=\"og:description\" content=\"Advanced persistent threat yani geli\u015fmi\u015f kal\u0131c\u0131 tehdit, bilgisayar korsanlar\u0131n\u0131n genellikle uzun bir s\u00fcre boyunca tespit edilemeyen sistemlere s\u0131zmak i\u00e7in birlikte \u00e7al\u0131\u015ft\u0131\u011f\u0131 ve verileri \u00e7ald\u0131\u011f\u0131 bir siber sald\u0131r\u0131 t\u00fcr\u00fcd\u00fcr. \u00c7o\u011fu durumda, bu siber sald\u0131r\u0131lar, ba\u015fka bir h\u00fck\u00fcmeti baltalamak isteyen ulus devletler taraf\u0131ndan ger\u00e7ekle\u015ftirilir. K\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m ve kimlik av\u0131 gibi di\u011fer siber sald\u0131r\u0131lar birka\u00e7 g\u00fcn i\u00e7inde [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/uzmanposta.com\/blog\/advanced-persistent-threat-apt\/\" \/>\n<meta property=\"og:site_name\" content=\"Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/uzmanposta\/\" \/>\n<meta property=\"article:published_time\" content=\"2023-03-20T06:58:50+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-05-18T18:01:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/03\/advanced-persistent-threat-apt-nedir-kisiler-ve-isletmeler-kendilerini-gelismis-kalici-tehdit-saldirilarindan-nasil-korumali.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Sibel Ho\u015f\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@uZmanPosta\" \/>\n<meta name=\"twitter:site\" content=\"@uZmanPosta\" \/>\n<meta name=\"twitter:label1\" content=\"Yazan:\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sibel Ho\u015f\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tahmini okuma s\u00fcresi\" \/>\n\t<meta name=\"twitter:data2\" content=\"11 dakika\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Advanced Persistent Threat (APT) Nedir? Ki\u015filer ve \u0130\u015fletmeler Kendilerini Geli\u015fmi\u015f Kal\u0131c\u0131 Tehdit Sald\u0131r\u0131lar\u0131ndan Nas\u0131l Korumal\u0131?\ufffc - Uzman Posta","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/uzmanposta.com\/blog\/advanced-persistent-threat-apt\/","og_locale":"tr_TR","og_type":"article","og_title":"Advanced Persistent Threat (APT) Nedir? Ki\u015filer ve \u0130\u015fletmeler Kendilerini Geli\u015fmi\u015f Kal\u0131c\u0131 Tehdit Sald\u0131r\u0131lar\u0131ndan Nas\u0131l Korumal\u0131?\ufffc - Uzman Posta","og_description":"Advanced persistent threat yani geli\u015fmi\u015f kal\u0131c\u0131 tehdit, bilgisayar korsanlar\u0131n\u0131n genellikle uzun bir s\u00fcre boyunca tespit edilemeyen sistemlere s\u0131zmak i\u00e7in birlikte \u00e7al\u0131\u015ft\u0131\u011f\u0131 ve verileri \u00e7ald\u0131\u011f\u0131 bir siber sald\u0131r\u0131 t\u00fcr\u00fcd\u00fcr. \u00c7o\u011fu durumda, bu siber sald\u0131r\u0131lar, ba\u015fka bir h\u00fck\u00fcmeti baltalamak isteyen ulus devletler taraf\u0131ndan ger\u00e7ekle\u015ftirilir. K\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m ve kimlik av\u0131 gibi di\u011fer siber sald\u0131r\u0131lar birka\u00e7 g\u00fcn i\u00e7inde [&hellip;]","og_url":"https:\/\/uzmanposta.com\/blog\/advanced-persistent-threat-apt\/","og_site_name":"Blog","article_publisher":"https:\/\/www.facebook.com\/uzmanposta\/","article_published_time":"2023-03-20T06:58:50+00:00","article_modified_time":"2023-05-18T18:01:09+00:00","og_image":[{"width":1000,"height":500,"url":"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/03\/advanced-persistent-threat-apt-nedir-kisiler-ve-isletmeler-kendilerini-gelismis-kalici-tehdit-saldirilarindan-nasil-korumali.jpeg","type":"image\/jpeg"}],"author":"Sibel Ho\u015f","twitter_card":"summary_large_image","twitter_creator":"@uZmanPosta","twitter_site":"@uZmanPosta","twitter_misc":{"Yazan:":"Sibel Ho\u015f","Tahmini okuma s\u00fcresi":"11 dakika"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/uzmanposta.com\/blog\/advanced-persistent-threat-apt\/#article","isPartOf":{"@id":"https:\/\/uzmanposta.com\/blog\/advanced-persistent-threat-apt\/"},"author":{"name":"Sibel Ho\u015f","@id":"https:\/\/uzmanposta.com\/blog\/#\/schema\/person\/ac85212a35ebcaaf56c92a7e051813d6"},"headline":"Advanced Persistent Threat (APT) Nedir? Ki\u015filer ve \u0130\u015fletmeler Kendilerini Geli\u015fmi\u015f Kal\u0131c\u0131 Tehdit Sald\u0131r\u0131lar\u0131ndan Nas\u0131l Korumal\u0131?\ufffc","datePublished":"2023-03-20T06:58:50+00:00","dateModified":"2023-05-18T18:01:09+00:00","mainEntityOfPage":{"@id":"https:\/\/uzmanposta.com\/blog\/advanced-persistent-threat-apt\/"},"wordCount":2545,"publisher":{"@id":"https:\/\/uzmanposta.com\/blog\/#organization"},"image":{"@id":"https:\/\/uzmanposta.com\/blog\/advanced-persistent-threat-apt\/#primaryimage"},"thumbnailUrl":"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/03\/advanced-persistent-threat-apt-nedir-kisiler-ve-isletmeler-kendilerini-gelismis-kalici-tehdit-saldirilarindan-nasil-korumali.jpeg","articleSection":["G\u00fcvenlik","Nedir? Nas\u0131l Yap\u0131l\u0131r?"],"inLanguage":"tr"},{"@type":"WebPage","@id":"https:\/\/uzmanposta.com\/blog\/advanced-persistent-threat-apt\/","url":"https:\/\/uzmanposta.com\/blog\/advanced-persistent-threat-apt\/","name":"Advanced Persistent Threat (APT) Nedir? Ki\u015filer ve \u0130\u015fletmeler Kendilerini Geli\u015fmi\u015f Kal\u0131c\u0131 Tehdit Sald\u0131r\u0131lar\u0131ndan Nas\u0131l Korumal\u0131?\ufffc - Uzman Posta","isPartOf":{"@id":"https:\/\/uzmanposta.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/uzmanposta.com\/blog\/advanced-persistent-threat-apt\/#primaryimage"},"image":{"@id":"https:\/\/uzmanposta.com\/blog\/advanced-persistent-threat-apt\/#primaryimage"},"thumbnailUrl":"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/03\/advanced-persistent-threat-apt-nedir-kisiler-ve-isletmeler-kendilerini-gelismis-kalici-tehdit-saldirilarindan-nasil-korumali.jpeg","datePublished":"2023-03-20T06:58:50+00:00","dateModified":"2023-05-18T18:01:09+00:00","breadcrumb":{"@id":"https:\/\/uzmanposta.com\/blog\/advanced-persistent-threat-apt\/#breadcrumb"},"inLanguage":"tr","potentialAction":[{"@type":"ReadAction","target":["https:\/\/uzmanposta.com\/blog\/advanced-persistent-threat-apt\/"]}]},{"@type":"ImageObject","inLanguage":"tr","@id":"https:\/\/uzmanposta.com\/blog\/advanced-persistent-threat-apt\/#primaryimage","url":"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/03\/advanced-persistent-threat-apt-nedir-kisiler-ve-isletmeler-kendilerini-gelismis-kalici-tehdit-saldirilarindan-nasil-korumali.jpeg","contentUrl":"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/03\/advanced-persistent-threat-apt-nedir-kisiler-ve-isletmeler-kendilerini-gelismis-kalici-tehdit-saldirilarindan-nasil-korumali.jpeg","width":1000,"height":500},{"@type":"BreadcrumbList","@id":"https:\/\/uzmanposta.com\/blog\/advanced-persistent-threat-apt\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/uzmanposta.com\/blog\/"},{"@type":"ListItem","position":2,"name":"G\u00fcvenlik","item":"https:\/\/uzmanposta.com\/blog\/guvenlik\/"},{"@type":"ListItem","position":3,"name":"Advanced Persistent Threat (APT) Nedir? Ki\u015filer ve \u0130\u015fletmeler Kendilerini Geli\u015fmi\u015f Kal\u0131c\u0131 Tehdit Sald\u0131r\u0131lar\u0131ndan Nas\u0131l Korumal\u0131?\ufffc"}]},{"@type":"WebSite","@id":"https:\/\/uzmanposta.com\/blog\/#website","url":"https:\/\/uzmanposta.com\/blog\/","name":"Blog","description":"","publisher":{"@id":"https:\/\/uzmanposta.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/uzmanposta.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"tr"},{"@type":"Organization","@id":"https:\/\/uzmanposta.com\/blog\/#organization","name":"Uzman Posta","url":"https:\/\/uzmanposta.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"tr","@id":"https:\/\/uzmanposta.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2020\/05\/logo.png","contentUrl":"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2020\/05\/logo.png","width":131,"height":60,"caption":"Uzman Posta"},"image":{"@id":"https:\/\/uzmanposta.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/uzmanposta\/","https:\/\/x.com\/uZmanPosta","https:\/\/www.instagram.com\/uzmanposta\/","https:\/\/www.linkedin.com\/company\/uzmanposta\/","https:\/\/www.youtube.com\/channel\/UCk2n1vp1YJ0n3XaDRWBi88Q"]},{"@type":"Person","@id":"https:\/\/uzmanposta.com\/blog\/#\/schema\/person\/ac85212a35ebcaaf56c92a7e051813d6","name":"Sibel Ho\u015f","image":{"@type":"ImageObject","inLanguage":"tr","@id":"https:\/\/secure.gravatar.com\/avatar\/f925f03d20ff0803ddb37c96d39d3793c085014ce56421050f24823c23db1c2a?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/f925f03d20ff0803ddb37c96d39d3793c085014ce56421050f24823c23db1c2a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f925f03d20ff0803ddb37c96d39d3793c085014ce56421050f24823c23db1c2a?s=96&d=mm&r=g","caption":"Sibel Ho\u015f"},"sameAs":["https:\/\/sibelhos.com\/","https:\/\/www.instagram.com\/bismoothie\/","https:\/\/www.linkedin.com\/in\/sibelhos\/"]}]}},"_links":{"self":[{"href":"https:\/\/uzmanposta.com\/blog\/wp-json\/wp\/v2\/posts\/3009","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/uzmanposta.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/uzmanposta.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/uzmanposta.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/uzmanposta.com\/blog\/wp-json\/wp\/v2\/comments?post=3009"}],"version-history":[{"count":0,"href":"https:\/\/uzmanposta.com\/blog\/wp-json\/wp\/v2\/posts\/3009\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/uzmanposta.com\/blog\/wp-json\/wp\/v2\/media\/3151"}],"wp:attachment":[{"href":"https:\/\/uzmanposta.com\/blog\/wp-json\/wp\/v2\/media?parent=3009"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/uzmanposta.com\/blog\/wp-json\/wp\/v2\/categories?post=3009"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/uzmanposta.com\/blog\/wp-json\/wp\/v2\/tags?post=3009"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}