{"id":7622,"date":"2020-10-12T16:09:10","date_gmt":"2020-10-12T13:09:10","guid":{"rendered":"https:\/\/www.inforte.com\/?p=7622"},"modified":"2020-10-12T16:10:33","modified_gmt":"2020-10-12T13:10:33","slug":"cryptojacking-gorulmeyen-tehdit","status":"publish","type":"post","link":"https:\/\/www.inforte.com\/en\/cryptojacking-gorulmeyen-tehdit\/","title":{"rendered":"Cryptojacking: G\u00f6r\u00fclmeyen Tehdit"},"content":{"rendered":"<h4 data-renderer-start-pos=\"1\">Cryptojacking k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlar\u0131n etkisi kripto para birimlerinin fiyat\u0131 ve finansal ivmesini etkileyebilmesi ve tespit edilmesi olduk\u00e7a zor olan bir tehdit t\u00fcr\u00fcd\u00fcr.<\/h4>\n<div><br \/><\/div>\n<p data-renderer-start-pos=\"173\"><a class=\"sc-kafWEX erkets\" title=\"https:\/\/www.malwarebytes.com\/cryptojacking\/#:~:text=Cryptojacking%20%28also%20called%20malicious%20cryptomining%29%20is%20an%20emerging,%E2%80%9Cmine%E2%80%9D%20forms%20of%20online%20money%20known%20as%20cryptocurrencies.\" href=\"https:\/\/www.malwarebytes.com\/cryptojacking\/#:~:text=Cryptojacking%20%28also%20called%20malicious%20cryptomining%29%20is%20an%20emerging,%E2%80%9Cmine%E2%80%9D%20forms%20of%20online%20money%20known%20as%20cryptocurrencies.\" data-renderer-mark=\"true\">Cryptojacking<\/a> \u00e7ok yeni bir tehdit t\u00fcr\u00fc de\u011fil, ancak sald\u0131rganlar aras\u0131nda olduk\u00e7a pop\u00fcler bir y\u00f6ntem. Pandemi etkisi ile 2020&#8217;de yeniden bir ivme kazanarak tehdit akt\u00f6rlerinin \u00f6nemli ara\u00e7lar\u0131ndan biri haline geldi ve genellikle <span id=\"362894ee-3a48-48ae-ad05-1625c5577ac7\" data-renderer-mark=\"true\" data-mark-type=\"annotation\" data-mark-annotation-type=\"inlineComment\" data-id=\"362894ee-3a48-48ae-ad05-1625c5577ac7\">bitcoin<\/span> d\u00fc\u015f\u00fc\u015f zamanlar\u0131nda yo\u011funla\u015fan atak kampanyalar\u0131 ile kendisini g\u00f6stermektedir.<\/p>\n<p data-renderer-start-pos=\"173\"><br \/><\/p>\n<div class=\"rich-media-item mediaSingleView-content-wrap image-center sc-dNLxif hLuCvz sc-jbKcbu cARVir\" data-layout=\"center\" data-width=\"65\" data-node-type=\"mediaSingle\">\n<div class=\"sc-hqyNC LnDlA\">\n<div class=\"sc-hIVACf chhCkB\" data-context-id=\"6520833\" data-type=\"file\" data-node-type=\"media\" data-width=\"660\" data-height=\"450\" data-id=\"2b34c0c4-8f8d-47dc-aadb-596cb7dafb2f\" data-collection=\"contentId-6520833\" data-file-name=\"image-20201011-193208.png\" data-file-size=\"574813\" data-file-mime-type=\"image\/png\">\n<div class=\"sc-kEmuub frnJmB\" data-testid=\"media-card-view\">\n<div class=\"media-file-card-view sc-cqPOvA hPIqB sc-jMMfwr djbnSL\" data-testid=\"media-file-card-view\" data-test-status=\"complete\" data-test-media-name=\"image-20201011-193208.png\" data-test-progress=\"1\">\n<div class=\"wrapper\">\n<div class=\"img-wrapper\"><img fetchpriority=\"high\" decoding=\"async\" class=\"size-medium wp-image-7621 aligncenter\" src=\"https:\/\/www.inforte.com\/wp-content\/uploads\/2020\/10\/3ecc5cb1-53ff-4d77-b4f6-714ec95bc9b5-300x205.png\" alt=\"\" width=\"300\" height=\"205\" srcset=\"https:\/\/www.inforte.com\/wp-content\/uploads\/2020\/10\/3ecc5cb1-53ff-4d77-b4f6-714ec95bc9b5-300x205.png 300w, https:\/\/www.inforte.com\/wp-content\/uploads\/2020\/10\/3ecc5cb1-53ff-4d77-b4f6-714ec95bc9b5.png 660w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/div>\n<div><br \/><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p data-renderer-start-pos=\"491\">Cryptojacking ataklar\u0131n\u0131n di\u011fer bir etkisi di\u011fer tehdit t\u00fcrlerinden farkl\u0131l\u0131\u011f\u0131 nedeni ile g\u00fcvenlik end\u00fcstrisi taraf\u0131ndan en fazla eksik raporlanan tehdit t\u00fcr\u00fcd\u00fcr olmas\u0131ndan kaynaklanmaktad\u0131r, ek olarak zararl\u0131 kodlar\u0131n teknik a\u00e7\u0131dan \u00e7ok sofistike olmas\u0131 ve di\u011fer tehdit t\u00fcrlerinin geleneksel etkilerini g\u00f6stermemesi nedeniyle b\u00fcy\u00fck \u00f6l\u00e7\u00fcde <span id=\"8f0d82b8-9541-4d27-927f-99ea2345b987\" data-renderer-mark=\"true\" data-mark-type=\"annotation\" data-mark-annotation-type=\"inlineComment\" data-id=\"8f0d82b8-9541-4d27-927f-99ea2345b987\">g\u00f6z ard\u0131<\/span> edilmi\u015ftir. Cryptojacking k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m\u0131 incelendi\u011finde, inan\u0131lmaz derecede hafif ve <a class=\"sc-kafWEX erkets\" title=\"https:\/\/www.techopedia.com\/definition\/13674\/polymorphic-malware\" href=\"https:\/\/www.techopedia.com\/definition\/13674\/polymorphic-malware\" data-renderer-mark=\"true\">polimorfik <\/a>yap\u0131da oldu\u011fu ilk g\u00f6ze \u00e7arpan \u00f6zellikler aras\u0131nda, tek amac\u0131 CPU kullanarak crypto hash hesaplamalar\u0131 daha h\u0131zl\u0131 yapmak olmas\u0131 ve standart komut sat\u0131r\u0131 ile cryptojacking zararl\u0131s\u0131 komutlar\u0131 aras\u0131ndaki farklar\u0131n zor anla\u015f\u0131labilir olmas\u0131 ilgili tehditin tespiti ve \u00f6nlenmesini b\u00fcy\u00fck \u00f6l\u00e7\u00fcde zorla\u015ft\u0131rmaktad\u0131r. \u0130lgili zararl\u0131 kodlar\u0131 genellikle o kadar \u00e7ok iyi \u00f6zelle\u015ftirilmi\u015f ve standart yasal komut sat\u0131rlar\u0131 gibi g\u00f6z\u00fckt\u00fc\u011f\u00fcnden <span id=\"57c10d3b-7dcf-41e4-b38b-37450502ff30\" data-renderer-mark=\"true\" data-mark-type=\"annotation\" data-mark-annotation-type=\"inlineComment\" data-id=\"57c10d3b-7dcf-41e4-b38b-37450502ff30\">bir\u00e7ok<\/span> g\u00fcvenlik katman\u0131ndan kolayca ka\u00e7abilmektedir. Geleneksel siber zararl\u0131 etkileri de g\u00f6stermedi\u011finden etkilere dayal\u0131 bir g\u00fcvelik modeli geli\u015ftirmek olduk\u00e7a g\u00fc\u00e7 olmaktad\u0131r.<\/p>\n<p data-renderer-start-pos=\"491\"><br \/><\/p>\n<p data-renderer-start-pos=\"1546\">Kripto para birimlerinin \u00f6zellikle 2017&#8217;den bu yana art\u0131\u015f\u0131 ve \u00f6zellikle cep telefonlar\u0131ndan kullan\u0131lan web taray\u0131c\u0131lar\u0131ndaki zafiyetlerin \u00fc\u00e7 kat\u0131na \u00e7\u0131kt\u0131\u011f\u0131 g\u00f6z \u00f6n\u00fcne al\u0131nd\u0131\u011f\u0131nda, tehdit akt\u00f6rleri i\u00e7in \u00e7ok iyi bir f\u0131rsat olarak kullan\u0131lmaktad\u0131r. \u00d6zellikle android ve \u00e7e\u015fitli mobil cihazlar\u0131ndaki g\u00fcvenlik teknolojilerin siber g\u00fcvenlik alan\u0131nda yeterince olgunla\u015fmamas\u0131 ve eksik yap\u0131land\u0131rmalar bu ataklara davetiye \u00e7\u0131karmaktad\u0131r.<\/p>\n<p data-renderer-start-pos=\"1546\"><br \/><\/p>\n<p data-renderer-start-pos=\"1976\">Cryptojacking ataklar\u0131nda mobil cihazlarla birlikte IoT cihazlar\u0131 da potansiyel bir hedeftir. Basit hesapla normal tekil bir cep telefonu CPU\u2019su kullan\u0131larak yap\u0131lan mining i\u015fleminde saniyede \u00fcretilecek 500 hash ile \u2018Monero\u2019 kripto para biriminde haftal\u0131k <span id=\"3d83281d-5dd1-4a0a-97c0-ae777df1466a\" data-renderer-mark=\"true\" data-mark-type=\"annotation\" data-mark-annotation-type=\"inlineComment\" data-id=\"3d83281d-5dd1-4a0a-97c0-ae777df1466a\">0.21$&#8217;lik<\/span> kazanc\u0131 kolayl\u0131kla elde edebilir. Bu basit g\u00f6z\u00fcksede \u00f6rnek olarak <a class=\"sc-kafWEX erkets\" title=\"https:\/\/en.wikipedia.org\/wiki\/Mirai_(malware)\" href=\"https:\/\/en.wikipedia.org\/wiki\/Mirai_(malware)\" data-renderer-mark=\"true\">MIRAI <\/a>sald\u0131r\u0131s\u0131 benzeri bir botnet ata\u011f\u0131nda kullan\u0131lacak olaran milyonlarca cihazdan elde edilecek CPU kapasitesi ile elde edilecek gelir inanilmaz olabilir. (Mirai sald\u0131r\u0131s\u0131nda ortalama 20 Milyar cihaz infekte olmu\u015ftu), 30K-200K aral\u0131\u011f\u0131nda kullan\u0131lacak bir botnet yap\u0131s\u0131 olduk\u00e7a verimli olarak \u00e7al\u0131\u015faibilir.<\/p>\n<p data-renderer-start-pos=\"1976\"><br \/><\/p>\n<p data-renderer-start-pos=\"2618\">Cryptojacking ataklar\u0131nda yo\u011fun olarak <a class=\"sc-kafWEX erkets\" title=\"https:\/\/owasp.org\/www-community\/attacks\/xss\/\" href=\"https:\/\/owasp.org\/www-community\/attacks\/xss\/\" data-renderer-mark=\"true\">(XSS)-Cross Site Scrpiting<\/a> ataklar\u0131 en yo\u011fun olarak kullan\u0131lan y\u00f6ntemlerin ba\u015f\u0131nda gelmektedir. Cryptojacking bu denli ba\u015far\u0131l\u0131 olmas\u0131n\u0131n baz\u0131 nedenlerini \u015fu \u015fekilde s\u0131ral\u0131yabiliriz;<\/p>\n<p data-renderer-start-pos=\"2618\"><br \/><\/p>\n<ul>\n<li data-renderer-start-pos=\"2618\">\u00c7ok fazla \u00f6zel izin gerektirmemesi(elevated permissions)<\/li>\n<li data-renderer-start-pos=\"2618\">Genellikle platform ba\u011f\u0131ms\u0131z olmas\u0131<\/li>\n<li data-renderer-start-pos=\"2618\">Di\u011fer zararl\u0131 teknikler gibi \u00e7al\u0131\u015fmad\u0131klar\u0131ndan \u00f6zellikle AV\/EDR taraf\u0131ndan tespit edilmeleri g\u00fc\u00e7 olmas\u0131.<\/li>\n<li data-renderer-start-pos=\"2618\">Zararl\u0131 kodlar\u0131 genellikle a\u00e7\u0131k kaynak kodlu yaz\u0131l\u0131m k\u00fct\u00fcphanelerine kolayca eklenecek yasal komut gibi g\u00f6r\u00fcnebilir ve \u015fifrelenmi\u015f DNS kullanarak kendilerini yap\u0131land\u0131rabilirler. Bu nedenle \u00e7ok net bir zay\u0131fl\u0131k analizi yap\u0131lmad\u0131\u011f\u0131 s\u00fcrece ortaya \u00e7\u0131kmalar\u0131 zor olmaktad\u0131r.<\/li>\n<\/ul>\n<br \/>\n<p data-renderer-start-pos=\"3326\">Cryptojacking hemen her platformda \u00e7al\u0131\u015fan JavaScript, Go, Ruby, Shell, Python, PowerShell, vb. \u00e7e\u015fitli dillerde kodlamas\u0131 yap\u0131labilir. Zararl\u0131 yaz\u0131l\u0131m lokal komutlar\u0131 \u00e7al\u0131\u015ft\u0131rabildi\u011fi s\u00fcrece(genellikle \u00f6zel bir yetki gerektirmeden) CPU i\u015flem g\u00fcc\u00fcn\u00fc kullanabilir ve kripto para birimi madencili\u011fi ba\u015flatabilir, bunlara ek olarak \u00f6zellikle cloud altyap\u0131lar\u0131nda kullan\u0131lan docker, kubernetes k\u00fcmeleri gibi \u00e7e\u015fitli mikroservisleri istismar ederek kendisini kolayca gizleyebilir. Cryptojacking sald\u0131r\u0131lar\u0131 hedef sistemlerden data-exfil veya destructive yap\u0131da de\u011fildir, bu nedenle \u00f6zellikle tehdit avc\u0131l\u0131\u011f\u0131 yapan ki\u015filerin s\u0131kl\u0131kla g\u00f6z\u00fcnden kacan bir tehdit t\u00fcr\u00fc olarak kar\u015f\u0131m\u0131za \u00e7\u0131kmaktad\u0131r.<\/p>\n<p data-renderer-start-pos=\"3326\"><br \/><\/p>\n<h4 data-renderer-start-pos=\"4016\">Tespit Y\u00f6ntemleri<\/h4>\n<br \/>\n<ul>\n<li data-renderer-start-pos=\"4037\">A\u011fa ba\u011fl\u0131 cihazlar \u00fczerinden Full DNS denetimi ger\u00e7ekle\u015ftirmek salt querying de\u011fil.<\/li>\n<li data-renderer-start-pos=\"4037\">SOAR\/SIEM sistemleri \u00fczerinde bilinen mining pool yap\u0131lar\u0131 i\u00e7in etkili tespit ve alarm kurallar\u0131 olu\u015fturmak.<\/li>\n<li data-renderer-start-pos=\"4037\">Y\u00fcksek CPU\/GPU kullan\u0131mlar\u0131n\u0131 analiz etmek.<\/li>\n<li data-renderer-start-pos=\"4037\">Fiziksel cihazlar i\u00e7in s\u0131cakl\u0131k tespiti i\u00e7in denetim ve alarm politikalar\u0131 <span id=\"04227868-28e4-4e9b-af0a-047f80918784\" data-renderer-mark=\"true\" data-mark-type=\"annotation\" data-mark-annotation-type=\"inlineComment\" data-id=\"04227868-28e4-4e9b-af0a-047f80918784\">olu\u015fturmak<\/span>.<\/li>\n<li data-renderer-start-pos=\"4037\">Potansiyel olarak boot <span id=\"289423ed-5406-4e7b-aee1-7dec3972900a\" data-renderer-mark=\"true\" data-mark-type=\"annotation\" data-mark-annotation-type=\"inlineComment\" data-id=\"289423ed-5406-4e7b-aee1-7dec3972900a\">ya da <\/span>startup olarak \u00e7al\u0131\u015fabilecek komut sat\u0131rlar\u0131n\u0131 detayl\u0131 \u015fekilde analiz etmek.<\/li>\n<li data-renderer-start-pos=\"4037\">VM(Vulnerability Management) ara\u00e7lar\u0131 \u00fczerinden bu tipdeki sald\u0131r\u0131lar i\u00e7in zay\u0131fl\u0131k bilgileri ve istirmar ara\u00e7lar\u0131 konusunda kapsaml\u0131 ara\u015ft\u0131rma yapmak.<\/li>\n<\/ul>\n<br \/>\n<p data-renderer-start-pos=\"4637\">T\u00fcm bunlara ek olarak ek olarak, IT\/IoT cihazlar\u0131n\u0131za daha fazla g\u00f6r\u00fcn\u00fcrl\u00fck katmak ve a\u011f ve istemci sistemler \u00fczerindeki konfig\u00fcrasyon ve de\u011fi\u015fiklikleri s\u00fcrekli izleyebilmek farkl\u0131l\u0131k yaratabilir.<\/p>\n<p data-renderer-start-pos=\"4637\"><br \/><\/p>\n<p data-renderer-start-pos=\"4637\">Detaylar ve daha fazla g\u00f6r\u00fcn\u00fcrl\u00fck \u00e7\u00f6z\u00fcmleri i\u00e7in <a class=\"sc-kafWEX erkets\" title=\"mailto:sales@inforte.com.tr\" href=\"mailto:sales@inforte.com.tr\" data-renderer-mark=\"true\">sales@inforte.com.tr<\/a> \u00fczerinden temasa ge\u00e7ebilirsiniz.<\/p>","protected":false},"excerpt":{"rendered":"<p>Cryptojacking k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlar\u0131n etkisi kripto para birimlerinin fiyat\u0131 ve finansal ivmesini etkileyebilmesi ve tespit edilmesi olduk\u00e7a zor olan bir tehdit t\u00fcr\u00fcd\u00fcr. Cryptojacking \u00e7ok yeni bir tehdit t\u00fcr\u00fc de\u011fil, ancak sald\u0131rganlar aras\u0131nda olduk\u00e7a pop\u00fcler bir y\u00f6ntem. Pandemi etkisi ile 2020&#8217;de yeniden bir ivme kazanarak tehdit&#8230;<\/p>","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[257],"tags":[264],"class_list":["post-7622","post","type-post","status-publish","format-standard","hentry","category-blog","tag-cryptojacking"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cryptojacking: G\u00f6r\u00fclmeyen Tehdit - Inforte Bili\u015fim A.\u015e.<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.inforte.com\/en\/cryptojacking-gorulmeyen-tehdit\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cryptojacking: G\u00f6r\u00fclmeyen Tehdit - Inforte Bili\u015fim A.\u015e.\" \/>\n<meta property=\"og:description\" content=\"Cryptojacking k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlar\u0131n etkisi kripto para birimlerinin fiyat\u0131 ve finansal ivmesini etkileyebilmesi ve tespit edilmesi olduk\u00e7a zor olan bir tehdit t\u00fcr\u00fcd\u00fcr. Cryptojacking \u00e7ok yeni bir tehdit t\u00fcr\u00fc de\u011fil, ancak sald\u0131rganlar aras\u0131nda olduk\u00e7a pop\u00fcler bir y\u00f6ntem. Pandemi etkisi ile 2020&#8217;de yeniden bir ivme kazanarak tehdit...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.inforte.com\/en\/cryptojacking-gorulmeyen-tehdit\/\" \/>\n<meta property=\"og:site_name\" content=\"Inforte Bili\u015fim A.\u015e.\" \/>\n<meta property=\"article:published_time\" content=\"2020-10-12T13:09:10+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-10-12T13:10:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.inforte.com\/wp-content\/uploads\/2020\/10\/3ecc5cb1-53ff-4d77-b4f6-714ec95bc9b5-300x205.png\" \/>\n<meta name=\"author\" content=\"Inforte\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Inforte\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.inforte.com\/cryptojacking-gorulmeyen-tehdit\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.inforte.com\/cryptojacking-gorulmeyen-tehdit\/\"},\"author\":{\"name\":\"Inforte\",\"@id\":\"https:\/\/www.inforte.com\/#\/schema\/person\/b0b38e387df23b9b7aa2d8448cebbeb6\"},\"headline\":\"Cryptojacking: G\u00f6r\u00fclmeyen Tehdit\",\"datePublished\":\"2020-10-12T13:09:10+00:00\",\"dateModified\":\"2020-10-12T13:10:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.inforte.com\/cryptojacking-gorulmeyen-tehdit\/\"},\"wordCount\":863,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.inforte.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.inforte.com\/cryptojacking-gorulmeyen-tehdit\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.inforte.com\/wp-content\/uploads\/2020\/10\/3ecc5cb1-53ff-4d77-b4f6-714ec95bc9b5-300x205.png\",\"keywords\":[\"#cryptojacking\"],\"articleSection\":[\"Inforte Blog\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.inforte.com\/cryptojacking-gorulmeyen-tehdit\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.inforte.com\/cryptojacking-gorulmeyen-tehdit\/\",\"url\":\"https:\/\/www.inforte.com\/cryptojacking-gorulmeyen-tehdit\/\",\"name\":\"Cryptojacking: G\u00f6r\u00fclmeyen Tehdit - Inforte Bili\u015fim A.\u015e.\",\"isPartOf\":{\"@id\":\"https:\/\/www.inforte.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.inforte.com\/cryptojacking-gorulmeyen-tehdit\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.inforte.com\/cryptojacking-gorulmeyen-tehdit\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.inforte.com\/wp-content\/uploads\/2020\/10\/3ecc5cb1-53ff-4d77-b4f6-714ec95bc9b5-300x205.png\",\"datePublished\":\"2020-10-12T13:09:10+00:00\",\"dateModified\":\"2020-10-12T13:10:33+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.inforte.com\/cryptojacking-gorulmeyen-tehdit\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.inforte.com\/cryptojacking-gorulmeyen-tehdit\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.inforte.com\/cryptojacking-gorulmeyen-tehdit\/#primaryimage\",\"url\":\"https:\/\/www.inforte.com\/wp-content\/uploads\/2020\/10\/3ecc5cb1-53ff-4d77-b4f6-714ec95bc9b5-300x205.png\",\"contentUrl\":\"https:\/\/www.inforte.com\/wp-content\/uploads\/2020\/10\/3ecc5cb1-53ff-4d77-b4f6-714ec95bc9b5-300x205.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.inforte.com\/cryptojacking-gorulmeyen-tehdit\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Ana sayfa\",\"item\":\"https:\/\/www.inforte.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cryptojacking: G\u00f6r\u00fclmeyen Tehdit\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.inforte.com\/#website\",\"url\":\"https:\/\/www.inforte.com\/\",\"name\":\"Inforte Bili\u015fim A.\u015e.\",\"description\":\"arbor, DDOS, spectrum, visibility, availability, forescout, nac, orchestration, network control, iot security, netscout, performans monitor, packet broker, tap, services assurance, centrify, privilage, access management, password vault, idendity access management, session recording\",\"publisher\":{\"@id\":\"https:\/\/www.inforte.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.inforte.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.inforte.com\/#organization\",\"name\":\"Inforte Bili\u015fim A.\u015e.\",\"url\":\"https:\/\/www.inforte.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.inforte.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.inforte.com\/wp-content\/uploads\/2018\/06\/logo.png\",\"contentUrl\":\"https:\/\/www.inforte.com\/wp-content\/uploads\/2018\/06\/logo.png\",\"width\":286,\"height\":180,\"caption\":\"Inforte Bili\u015fim A.\u015e.\"},\"image\":{\"@id\":\"https:\/\/www.inforte.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.inforte.com\/#\/schema\/person\/b0b38e387df23b9b7aa2d8448cebbeb6\",\"name\":\"Inforte\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.inforte.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/28531e22b7b30f1c736d4741e45027bf?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/28531e22b7b30f1c736d4741e45027bf?s=96&d=mm&r=g\",\"caption\":\"Inforte\"},\"url\":\"https:\/\/www.inforte.com\/en\/author\/content\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cryptojacking: G\u00f6r\u00fclmeyen Tehdit - Inforte Bili\u015fim A.\u015e.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.inforte.com\/en\/cryptojacking-gorulmeyen-tehdit\/","og_locale":"en_GB","og_type":"article","og_title":"Cryptojacking: G\u00f6r\u00fclmeyen Tehdit - Inforte Bili\u015fim A.\u015e.","og_description":"Cryptojacking k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlar\u0131n etkisi kripto para birimlerinin fiyat\u0131 ve finansal ivmesini etkileyebilmesi ve tespit edilmesi olduk\u00e7a zor olan bir tehdit t\u00fcr\u00fcd\u00fcr. Cryptojacking \u00e7ok yeni bir tehdit t\u00fcr\u00fc de\u011fil, ancak sald\u0131rganlar aras\u0131nda olduk\u00e7a pop\u00fcler bir y\u00f6ntem. Pandemi etkisi ile 2020&#8217;de yeniden bir ivme kazanarak tehdit...","og_url":"https:\/\/www.inforte.com\/en\/cryptojacking-gorulmeyen-tehdit\/","og_site_name":"Inforte Bili\u015fim A.\u015e.","article_published_time":"2020-10-12T13:09:10+00:00","article_modified_time":"2020-10-12T13:10:33+00:00","og_image":[{"url":"https:\/\/www.inforte.com\/wp-content\/uploads\/2020\/10\/3ecc5cb1-53ff-4d77-b4f6-714ec95bc9b5-300x205.png","type":"","width":"","height":""}],"author":"Inforte","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Inforte","Estimated reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.inforte.com\/cryptojacking-gorulmeyen-tehdit\/#article","isPartOf":{"@id":"https:\/\/www.inforte.com\/cryptojacking-gorulmeyen-tehdit\/"},"author":{"name":"Inforte","@id":"https:\/\/www.inforte.com\/#\/schema\/person\/b0b38e387df23b9b7aa2d8448cebbeb6"},"headline":"Cryptojacking: G\u00f6r\u00fclmeyen Tehdit","datePublished":"2020-10-12T13:09:10+00:00","dateModified":"2020-10-12T13:10:33+00:00","mainEntityOfPage":{"@id":"https:\/\/www.inforte.com\/cryptojacking-gorulmeyen-tehdit\/"},"wordCount":863,"commentCount":0,"publisher":{"@id":"https:\/\/www.inforte.com\/#organization"},"image":{"@id":"https:\/\/www.inforte.com\/cryptojacking-gorulmeyen-tehdit\/#primaryimage"},"thumbnailUrl":"https:\/\/www.inforte.com\/wp-content\/uploads\/2020\/10\/3ecc5cb1-53ff-4d77-b4f6-714ec95bc9b5-300x205.png","keywords":["#cryptojacking"],"articleSection":["Inforte Blog"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.inforte.com\/cryptojacking-gorulmeyen-tehdit\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.inforte.com\/cryptojacking-gorulmeyen-tehdit\/","url":"https:\/\/www.inforte.com\/cryptojacking-gorulmeyen-tehdit\/","name":"Cryptojacking: G\u00f6r\u00fclmeyen Tehdit - Inforte Bili\u015fim A.\u015e.","isPartOf":{"@id":"https:\/\/www.inforte.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.inforte.com\/cryptojacking-gorulmeyen-tehdit\/#primaryimage"},"image":{"@id":"https:\/\/www.inforte.com\/cryptojacking-gorulmeyen-tehdit\/#primaryimage"},"thumbnailUrl":"https:\/\/www.inforte.com\/wp-content\/uploads\/2020\/10\/3ecc5cb1-53ff-4d77-b4f6-714ec95bc9b5-300x205.png","datePublished":"2020-10-12T13:09:10+00:00","dateModified":"2020-10-12T13:10:33+00:00","breadcrumb":{"@id":"https:\/\/www.inforte.com\/cryptojacking-gorulmeyen-tehdit\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.inforte.com\/cryptojacking-gorulmeyen-tehdit\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.inforte.com\/cryptojacking-gorulmeyen-tehdit\/#primaryimage","url":"https:\/\/www.inforte.com\/wp-content\/uploads\/2020\/10\/3ecc5cb1-53ff-4d77-b4f6-714ec95bc9b5-300x205.png","contentUrl":"https:\/\/www.inforte.com\/wp-content\/uploads\/2020\/10\/3ecc5cb1-53ff-4d77-b4f6-714ec95bc9b5-300x205.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.inforte.com\/cryptojacking-gorulmeyen-tehdit\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Ana sayfa","item":"https:\/\/www.inforte.com\/"},{"@type":"ListItem","position":2,"name":"Cryptojacking: G\u00f6r\u00fclmeyen Tehdit"}]},{"@type":"WebSite","@id":"https:\/\/www.inforte.com\/#website","url":"https:\/\/www.inforte.com\/","name":"Inforte Bili\u015fim A.\u015e.","description":"arbor, DDOS, spectrum, visibility, availability, forescout, nac, orchestration, network control, iot security, netscout, performans monitor, packet broker, tap, services assurance, centrify, privilage, access management, password vault, idendity access management, session recording","publisher":{"@id":"https:\/\/www.inforte.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.inforte.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.inforte.com\/#organization","name":"Inforte Bili\u015fim A.\u015e.","url":"https:\/\/www.inforte.com\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.inforte.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.inforte.com\/wp-content\/uploads\/2018\/06\/logo.png","contentUrl":"https:\/\/www.inforte.com\/wp-content\/uploads\/2018\/06\/logo.png","width":286,"height":180,"caption":"Inforte Bili\u015fim A.\u015e."},"image":{"@id":"https:\/\/www.inforte.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.inforte.com\/#\/schema\/person\/b0b38e387df23b9b7aa2d8448cebbeb6","name":"Inforte","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.inforte.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/28531e22b7b30f1c736d4741e45027bf?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/28531e22b7b30f1c736d4741e45027bf?s=96&d=mm&r=g","caption":"Inforte"},"url":"https:\/\/www.inforte.com\/en\/author\/content\/"}]}},"_links":{"self":[{"href":"https:\/\/www.inforte.com\/en\/wp-json\/wp\/v2\/posts\/7622"}],"collection":[{"href":"https:\/\/www.inforte.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.inforte.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.inforte.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.inforte.com\/en\/wp-json\/wp\/v2\/comments?post=7622"}],"version-history":[{"count":5,"href":"https:\/\/www.inforte.com\/en\/wp-json\/wp\/v2\/posts\/7622\/revisions"}],"predecessor-version":[{"id":7627,"href":"https:\/\/www.inforte.com\/en\/wp-json\/wp\/v2\/posts\/7622\/revisions\/7627"}],"wp:attachment":[{"href":"https:\/\/www.inforte.com\/en\/wp-json\/wp\/v2\/media?parent=7622"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.inforte.com\/en\/wp-json\/wp\/v2\/categories?post=7622"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.inforte.com\/en\/wp-json\/wp\/v2\/tags?post=7622"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}