{"id":8115,"date":"2022-06-03T15:46:20","date_gmt":"2022-06-03T12:46:20","guid":{"rendered":"https:\/\/www.inforte.com\/?p=8115"},"modified":"2022-06-03T15:46:20","modified_gmt":"2022-06-03T12:46:20","slug":"yeni-kesfedilen-microsoft-windows-fileless-log-acigi-neden-bir-gizlilik-harikasidir","status":"publish","type":"post","link":"https:\/\/www.inforte.com\/en\/yeni-kesfedilen-microsoft-windows-fileless-log-acigi-neden-bir-gizlilik-harikasidir\/","title":{"rendered":"Yeni ke\u015ffedilen Microsoft Windows &#8216;fileless&#8217; log a\u00e7\u0131\u011f\u0131 neden bir gizlilik harikas\u0131d\u0131r?"},"content":{"rendered":"<p>Vir\u00fcsten koruma yaz\u0131l\u0131m\u0131 ve izinsiz giri\u015f tespit sistemlerinden tespit edilmekten ka\u00e7an siber sald\u0131r\u0131lar\u0131n anahtar\u0131, genellikle i\u015fletim sistemi s\u00fcre\u00e7lerinden yararlanmakt\u0131r. Bu, Kaspersky ara\u015ft\u0131rmac\u0131lar\u0131 taraf\u0131ndan yak\u0131n zamanda ke\u015ffedilen dosyas\u0131z bir Windows a\u00e7\u0131\u011f\u0131n\u0131n bir \u00f6zelli\u011fidir.<\/p>\n<p>Dosyas\u0131z k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m, bilgisayar\u0131n veri deposuna yeni dosyalar yazmadan bilgisayar sistemlerine sald\u0131r\u0131r. Vir\u00fcsten koruma yaz\u0131l\u0131m\u0131 bir sabit s\u00fcr\u00fcc\u00fcde k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m taramas\u0131 yaparsa, dosyas\u0131z sald\u0131r\u0131yla ilgili herhangi bir dosya bulamaz. Siber tehdit akt\u00f6rleri aras\u0131nda pop\u00fcler bir \u015fa\u015f\u0131rtma tekni\u011fidir.Kaspersky, bu yeni istismara belirli bir isim vermedi. Kaspersky&#8217;den Denis Legezo, istismara dahil olan baz\u0131 DLL&#8217;lerin (Windows Dinamik Ba\u011flant\u0131 Kitapl\u0131klar\u0131) ticari s\u0131zma testi platformlar\u0131ndaki ara\u00e7lara benzedi\u011fini a\u00e7\u0131klad\u0131:<\/p>\n<p>\u201cTicari ara\u00e7larla ilgili olarak, bu kampanyada SilentBreak ve Cobalt Strike ara\u00e7 seti kullan\u0131m\u0131n\u0131n izleri olduk\u00e7a belirgin. ThrowbackDLL.dll ve SlingshotDLL.dll adl\u0131 truva atlar\u0131 bize SilentBreak&#8217;in \u00e7er\u00e7evesindeki ara\u00e7lar olan Throwback ve Slingshot&#8217;\u0131 hat\u0131rlat\u0131rken, dropper (sb.dll) ile ili\u015fkili &#8216;sb&#8217; \u00fcreticinin ad\u0131n\u0131n bir k\u0131saltmas\u0131 olabilir.<\/p>\n<p>Burada, ikili dosyalar i\u00e7indeki birka\u00e7 .pdb yolunun projenin C:\\Users\\admin\\source\\repos\\drx\\ dizinini ve drxDLL.dll gibi Throwback veya Slingshot&#8217;tan sonra adland\u0131r\u0131lmayan di\u011fer mod\u00fclleri i\u00e7erdi\u011finden<\/p>\n<p>Yeni istismar, k\u00f6t\u00fc ama\u00e7l\u0131 shellkodu Windows olay g\u00fcnl\u00fcklerine yerle\u015ftirir. \u201cLog4Shell\u201d ve \u201cSpring4Shell\u201d gibi temel kod kitapl\u0131klar\u0131n\u0131 kullanan siber sald\u0131r\u0131lar, siber g\u00fcvenlik camias\u0131n\u0131n son zamanlardaki endi\u015feleri. Bu y\u00fczden bu sald\u0131r\u0131ya &#8220;ThrowShell&#8221; ad\u0131n\u0131 verece\u011fiz.<\/p>\n<p>&#8220;ThrowShell&#8221; nas\u0131l \u00e7al\u0131\u015f\u0131r?<\/p>\n<p>ThrowShell sald\u0131r\u0131s\u0131, bir kullan\u0131c\u0131y\u0131 Cobalt Strike mod\u00fcl\u00fcne sahip bir dosya indirmeye ikna ederek ba\u015flar. Kaspersky ara\u015ft\u0131rmac\u0131lar\u0131 bunu, ara\u015ft\u0131rmac\u0131lar\u0131n me\u015fru oldu\u011funu d\u00fc\u015f\u00fcnd\u00fc\u011f\u00fc bir dosya payla\u015f\u0131m sitesi olan file.io arac\u0131l\u0131\u011f\u0131yla da\u011f\u0131t\u0131lan Cobalt Strike sertifikas\u0131na sahip bir RAR ar\u015fiv dosyas\u0131 olarak g\u00f6zlemledi. Evet, \u201cThrowShell\u201d bir Truva At\u0131 olarak ba\u015flar. Ancak ilgin\u00e7 bir \u015fekilde, Firefox&#8217;ta file.io&#8217;yu ziyaret etmeye \u00e7al\u0131\u015ft\u0131\u011f\u0131n\u0131zda Malwarebytes Browser Guard uzant\u0131s\u0131 siteyi \u015f\u00fcpheli bir kimlik av\u0131 alan\u0131 olarak engeller.<\/p>\n<p>Truva atlar\u0131yla birlikte alg\u0131lama \u00f6nleyici sarmalay\u0131c\u0131lar kullan\u0131l\u0131r. MSVC, Go derleyici 1.17.2 ve MinGW alt\u0131ndaki GCC, ara\u015ft\u0131rmac\u0131lar\u0131n g\u00f6rd\u00fc\u011f\u00fc derleyicilerdir.<\/p>\n<p>RAR dosyas\u0131 ay\u0131kland\u0131ktan ve i\u00e7eri\u011fi y\u00fcr\u00fct\u00fcld\u00fckten sonra, sald\u0131rgan\u0131n hedeflenen cihaza ek k\u00f6t\u00fc ama\u00e7l\u0131 DLL&#8217;ler g\u00f6ndermesi \u00e7ok daha kolayd\u0131r.<\/p>\n<p>Werfault.exe, ThrowShell taraf\u0131ndan kod enjeksiyonu i\u00e7in hedeflenen ilk Windows y\u00fcr\u00fct\u00fclebilir dosyas\u0131d\u0131r. Windows 10 ve Windows 11&#8217;de Microsoft Windows Hata Raporlama Hata Raporlay\u0131c\u0131s\u0131d\u0131r. S\u00fcrecin Windows&#8217;ta sundu\u011fu \u00f6nemli rol, dosyan\u0131n u\u00e7 nokta g\u00fcvenlik uygulamalar\u0131nda beyaz listeye al\u0131nmas\u0131n\u0131 sa\u011flar. Neredeyse svchost.exe&#8217;yi kullanmak kadar sinsi.<\/p>\n<p>K\u00f6t\u00fc ama\u00e7l\u0131 y\u00fcr\u00fct\u00fclen kod, ara\u015ft\u0131rmac\u0131lar\u0131n imzalanm\u0131\u015f herhangi bir me\u015fru kod g\u00f6rmedi\u011fi \u201cFast Invest\u201d adl\u0131 bir uygulama i\u00e7in bir sertifika ile imzaland\u0131. Ay\u0131kland\u0131ktan, \u015fifresi \u00e7\u00f6z\u00fcld\u00fc\u011f\u00fcnde ve imzaland\u0131ktan sonra ThrowShell&#8217;in k\u00f6t\u00fc niyetli kodu, Cobalt Strike pentesting yaz\u0131l\u0131m\u0131yla damlal\u0131k enjeksiyonu yoluyla Windows i\u00e7inde yay\u0131l\u0131r. Windows&#8217;un t\u00fcm desteklenen s\u00fcr\u00fcmleri i\u00e7in ana dosya y\u00f6neticisi olan Explorer.exe, ThrowShell&#8217;in kod enjeksiyonu i\u00e7in hedefledi\u011fi i\u015flemlerden biridir. Dosyas\u0131z k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m genellikle b\u00f6yle \u00e7al\u0131\u015f\u0131r; s\u0131radan i\u015fletim sistemi s\u00fcre\u00e7lerine k\u00f6t\u00fc ama\u00e7l\u0131 kod enjekte edin ve bu \u015fekilde y\u00fcr\u00fct\u00fcn.<\/p>\n<p>\u00c7e\u015fitli s\u0131radan Windows DLL&#8217;leri ve s\u00fcre\u00e7leri arac\u0131l\u0131\u011f\u0131yla yay\u0131l\u0131rken, kabuk kodu sonunda Windows olay g\u00fcnl\u00fcklerine eklenir. Ara\u015ft\u0131rmac\u0131lar, \u015fu anda bellekte \u00e7al\u0131\u015fan i\u015flemlerde MachineGUID, bilgisayar adlar\u0131, yerel IP adresleri, i\u015fletim sistemi s\u00fcr\u00fcm\u00fc, CPU mimarisi ve SeDebugPrivilege durumu i\u00e7in ThrowShell parmak izi Windows hedeflerini g\u00f6rd\u00fcler.<\/p>\n<p>Bunlar\u0131n hepsi, istemci Windows hedeflerine bula\u015fman\u0131n, do\u011frudan belle\u011fe girmenin, alg\u0131lamadan ka\u00e7\u0131nman\u0131n, kal\u0131c\u0131l\u0131k olu\u015fturman\u0131n ve do\u011frudan Windows kabu\u011funa bir arka kap\u0131 sa\u011flaman\u0131n ger\u00e7ekten gizli bir yoludur. Bu g\u00fcvenlik a\u00e7\u0131\u011f\u0131, sald\u0131rgan\u0131n y\u00f6netici ayr\u0131cal\u0131klar\u0131yla her t\u00fcrl\u00fc k\u00f6t\u00fc ama\u00e7l\u0131 etkinli\u011fi ger\u00e7ekle\u015ftirmesinin kolay bir yolu ile bir Windows istemcisinde aylarca veya daha uzun s\u00fcre kalabilir.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>","protected":false},"excerpt":{"rendered":"<p>Vir\u00fcsten koruma yaz\u0131l\u0131m\u0131 ve izinsiz giri\u015f tespit sistemlerinden tespit edilmekten ka\u00e7an siber sald\u0131r\u0131lar\u0131n anahtar\u0131, genellikle i\u015fletim sistemi s\u00fcre\u00e7lerinden yararlanmakt\u0131r. Bu, Kaspersky ara\u015ft\u0131rmac\u0131lar\u0131 taraf\u0131ndan yak\u0131n zamanda ke\u015ffedilen dosyas\u0131z bir Windows a\u00e7\u0131\u011f\u0131n\u0131n bir \u00f6zelli\u011fidir. Dosyas\u0131z k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m, bilgisayar\u0131n veri deposuna yeni dosyalar yazmadan bilgisayar sistemlerine sald\u0131r\u0131r&#8230;.<\/p>","protected":false},"author":2,"featured_media":8116,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[257],"tags":[],"class_list":["post-8115","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Yeni ke\u015ffedilen Microsoft Windows &#039;fileless&#039; log a\u00e7\u0131\u011f\u0131 neden bir gizlilik harikas\u0131d\u0131r? - Inforte Bili\u015fim A.\u015e.<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.inforte.com\/en\/yeni-kesfedilen-microsoft-windows-fileless-log-acigi-neden-bir-gizlilik-harikasidir\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Yeni ke\u015ffedilen Microsoft Windows &#039;fileless&#039; log a\u00e7\u0131\u011f\u0131 neden bir gizlilik harikas\u0131d\u0131r? - Inforte Bili\u015fim A.\u015e.\" \/>\n<meta property=\"og:description\" content=\"Vir\u00fcsten koruma yaz\u0131l\u0131m\u0131 ve izinsiz giri\u015f tespit sistemlerinden tespit edilmekten ka\u00e7an siber sald\u0131r\u0131lar\u0131n anahtar\u0131, genellikle i\u015fletim sistemi s\u00fcre\u00e7lerinden yararlanmakt\u0131r. Bu, Kaspersky ara\u015ft\u0131rmac\u0131lar\u0131 taraf\u0131ndan yak\u0131n zamanda ke\u015ffedilen dosyas\u0131z bir Windows a\u00e7\u0131\u011f\u0131n\u0131n bir \u00f6zelli\u011fidir. Dosyas\u0131z k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m, bilgisayar\u0131n veri deposuna yeni dosyalar yazmadan bilgisayar sistemlerine sald\u0131r\u0131r....\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.inforte.com\/en\/yeni-kesfedilen-microsoft-windows-fileless-log-acigi-neden-bir-gizlilik-harikasidir\/\" \/>\n<meta property=\"og:site_name\" content=\"Inforte Bili\u015fim A.\u015e.\" \/>\n<meta property=\"article:published_time\" content=\"2022-06-03T12:46:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.inforte.com\/wp-content\/uploads\/2022\/06\/Digital-Forensics-for-Cyber-Professionals-MF-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"960\" \/>\n\t<meta property=\"og:image:height\" content=\"540\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Inforte\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Inforte\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.inforte.com\/yeni-kesfedilen-microsoft-windows-fileless-log-acigi-neden-bir-gizlilik-harikasidir\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.inforte.com\/yeni-kesfedilen-microsoft-windows-fileless-log-acigi-neden-bir-gizlilik-harikasidir\/\"},\"author\":{\"name\":\"Inforte\",\"@id\":\"https:\/\/www.inforte.com\/#\/schema\/person\/b0b38e387df23b9b7aa2d8448cebbeb6\"},\"headline\":\"Yeni ke\u015ffedilen Microsoft Windows &#8216;fileless&#8217; log a\u00e7\u0131\u011f\u0131 neden bir gizlilik harikas\u0131d\u0131r?\",\"datePublished\":\"2022-06-03T12:46:20+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.inforte.com\/yeni-kesfedilen-microsoft-windows-fileless-log-acigi-neden-bir-gizlilik-harikasidir\/\"},\"wordCount\":811,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.inforte.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.inforte.com\/yeni-kesfedilen-microsoft-windows-fileless-log-acigi-neden-bir-gizlilik-harikasidir\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.inforte.com\/wp-content\/uploads\/2022\/06\/Digital-Forensics-for-Cyber-Professionals-MF-1.png\",\"articleSection\":[\"Inforte Blog\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.inforte.com\/yeni-kesfedilen-microsoft-windows-fileless-log-acigi-neden-bir-gizlilik-harikasidir\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.inforte.com\/yeni-kesfedilen-microsoft-windows-fileless-log-acigi-neden-bir-gizlilik-harikasidir\/\",\"url\":\"https:\/\/www.inforte.com\/yeni-kesfedilen-microsoft-windows-fileless-log-acigi-neden-bir-gizlilik-harikasidir\/\",\"name\":\"Yeni ke\u015ffedilen Microsoft Windows 'fileless' log a\u00e7\u0131\u011f\u0131 neden bir gizlilik harikas\u0131d\u0131r? - Inforte Bili\u015fim A.\u015e.\",\"isPartOf\":{\"@id\":\"https:\/\/www.inforte.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.inforte.com\/yeni-kesfedilen-microsoft-windows-fileless-log-acigi-neden-bir-gizlilik-harikasidir\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.inforte.com\/yeni-kesfedilen-microsoft-windows-fileless-log-acigi-neden-bir-gizlilik-harikasidir\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.inforte.com\/wp-content\/uploads\/2022\/06\/Digital-Forensics-for-Cyber-Professionals-MF-1.png\",\"datePublished\":\"2022-06-03T12:46:20+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.inforte.com\/yeni-kesfedilen-microsoft-windows-fileless-log-acigi-neden-bir-gizlilik-harikasidir\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.inforte.com\/yeni-kesfedilen-microsoft-windows-fileless-log-acigi-neden-bir-gizlilik-harikasidir\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.inforte.com\/yeni-kesfedilen-microsoft-windows-fileless-log-acigi-neden-bir-gizlilik-harikasidir\/#primaryimage\",\"url\":\"https:\/\/www.inforte.com\/wp-content\/uploads\/2022\/06\/Digital-Forensics-for-Cyber-Professionals-MF-1.png\",\"contentUrl\":\"https:\/\/www.inforte.com\/wp-content\/uploads\/2022\/06\/Digital-Forensics-for-Cyber-Professionals-MF-1.png\",\"width\":960,\"height\":540},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.inforte.com\/yeni-kesfedilen-microsoft-windows-fileless-log-acigi-neden-bir-gizlilik-harikasidir\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Ana sayfa\",\"item\":\"https:\/\/www.inforte.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Yeni ke\u015ffedilen Microsoft Windows &#8216;fileless&#8217; log a\u00e7\u0131\u011f\u0131 neden bir gizlilik harikas\u0131d\u0131r?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.inforte.com\/#website\",\"url\":\"https:\/\/www.inforte.com\/\",\"name\":\"Inforte Bili\u015fim A.\u015e.\",\"description\":\"arbor, DDOS, spectrum, visibility, availability, forescout, nac, orchestration, network control, iot security, netscout, performans monitor, packet broker, tap, services assurance, centrify, privilage, access management, password vault, idendity access management, session recording\",\"publisher\":{\"@id\":\"https:\/\/www.inforte.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.inforte.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.inforte.com\/#organization\",\"name\":\"Inforte Bili\u015fim A.\u015e.\",\"url\":\"https:\/\/www.inforte.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.inforte.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.inforte.com\/wp-content\/uploads\/2018\/06\/logo.png\",\"contentUrl\":\"https:\/\/www.inforte.com\/wp-content\/uploads\/2018\/06\/logo.png\",\"width\":286,\"height\":180,\"caption\":\"Inforte Bili\u015fim A.\u015e.\"},\"image\":{\"@id\":\"https:\/\/www.inforte.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.inforte.com\/#\/schema\/person\/b0b38e387df23b9b7aa2d8448cebbeb6\",\"name\":\"Inforte\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.inforte.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/28531e22b7b30f1c736d4741e45027bf?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/28531e22b7b30f1c736d4741e45027bf?s=96&d=mm&r=g\",\"caption\":\"Inforte\"},\"url\":\"https:\/\/www.inforte.com\/en\/author\/content\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Yeni ke\u015ffedilen Microsoft Windows 'fileless' log a\u00e7\u0131\u011f\u0131 neden bir gizlilik harikas\u0131d\u0131r? - Inforte Bili\u015fim A.\u015e.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.inforte.com\/en\/yeni-kesfedilen-microsoft-windows-fileless-log-acigi-neden-bir-gizlilik-harikasidir\/","og_locale":"en_GB","og_type":"article","og_title":"Yeni ke\u015ffedilen Microsoft Windows 'fileless' log a\u00e7\u0131\u011f\u0131 neden bir gizlilik harikas\u0131d\u0131r? - Inforte Bili\u015fim A.\u015e.","og_description":"Vir\u00fcsten koruma yaz\u0131l\u0131m\u0131 ve izinsiz giri\u015f tespit sistemlerinden tespit edilmekten ka\u00e7an siber sald\u0131r\u0131lar\u0131n anahtar\u0131, genellikle i\u015fletim sistemi s\u00fcre\u00e7lerinden yararlanmakt\u0131r. Bu, Kaspersky ara\u015ft\u0131rmac\u0131lar\u0131 taraf\u0131ndan yak\u0131n zamanda ke\u015ffedilen dosyas\u0131z bir Windows a\u00e7\u0131\u011f\u0131n\u0131n bir \u00f6zelli\u011fidir. Dosyas\u0131z k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m, bilgisayar\u0131n veri deposuna yeni dosyalar yazmadan bilgisayar sistemlerine sald\u0131r\u0131r....","og_url":"https:\/\/www.inforte.com\/en\/yeni-kesfedilen-microsoft-windows-fileless-log-acigi-neden-bir-gizlilik-harikasidir\/","og_site_name":"Inforte Bili\u015fim A.\u015e.","article_published_time":"2022-06-03T12:46:20+00:00","og_image":[{"width":960,"height":540,"url":"https:\/\/www.inforte.com\/wp-content\/uploads\/2022\/06\/Digital-Forensics-for-Cyber-Professionals-MF-1.png","type":"image\/png"}],"author":"Inforte","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Inforte","Estimated reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.inforte.com\/yeni-kesfedilen-microsoft-windows-fileless-log-acigi-neden-bir-gizlilik-harikasidir\/#article","isPartOf":{"@id":"https:\/\/www.inforte.com\/yeni-kesfedilen-microsoft-windows-fileless-log-acigi-neden-bir-gizlilik-harikasidir\/"},"author":{"name":"Inforte","@id":"https:\/\/www.inforte.com\/#\/schema\/person\/b0b38e387df23b9b7aa2d8448cebbeb6"},"headline":"Yeni ke\u015ffedilen Microsoft Windows &#8216;fileless&#8217; log a\u00e7\u0131\u011f\u0131 neden bir gizlilik harikas\u0131d\u0131r?","datePublished":"2022-06-03T12:46:20+00:00","mainEntityOfPage":{"@id":"https:\/\/www.inforte.com\/yeni-kesfedilen-microsoft-windows-fileless-log-acigi-neden-bir-gizlilik-harikasidir\/"},"wordCount":811,"commentCount":0,"publisher":{"@id":"https:\/\/www.inforte.com\/#organization"},"image":{"@id":"https:\/\/www.inforte.com\/yeni-kesfedilen-microsoft-windows-fileless-log-acigi-neden-bir-gizlilik-harikasidir\/#primaryimage"},"thumbnailUrl":"https:\/\/www.inforte.com\/wp-content\/uploads\/2022\/06\/Digital-Forensics-for-Cyber-Professionals-MF-1.png","articleSection":["Inforte Blog"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.inforte.com\/yeni-kesfedilen-microsoft-windows-fileless-log-acigi-neden-bir-gizlilik-harikasidir\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.inforte.com\/yeni-kesfedilen-microsoft-windows-fileless-log-acigi-neden-bir-gizlilik-harikasidir\/","url":"https:\/\/www.inforte.com\/yeni-kesfedilen-microsoft-windows-fileless-log-acigi-neden-bir-gizlilik-harikasidir\/","name":"Yeni ke\u015ffedilen Microsoft Windows 'fileless' log a\u00e7\u0131\u011f\u0131 neden bir gizlilik harikas\u0131d\u0131r? - Inforte Bili\u015fim A.\u015e.","isPartOf":{"@id":"https:\/\/www.inforte.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.inforte.com\/yeni-kesfedilen-microsoft-windows-fileless-log-acigi-neden-bir-gizlilik-harikasidir\/#primaryimage"},"image":{"@id":"https:\/\/www.inforte.com\/yeni-kesfedilen-microsoft-windows-fileless-log-acigi-neden-bir-gizlilik-harikasidir\/#primaryimage"},"thumbnailUrl":"https:\/\/www.inforte.com\/wp-content\/uploads\/2022\/06\/Digital-Forensics-for-Cyber-Professionals-MF-1.png","datePublished":"2022-06-03T12:46:20+00:00","breadcrumb":{"@id":"https:\/\/www.inforte.com\/yeni-kesfedilen-microsoft-windows-fileless-log-acigi-neden-bir-gizlilik-harikasidir\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.inforte.com\/yeni-kesfedilen-microsoft-windows-fileless-log-acigi-neden-bir-gizlilik-harikasidir\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.inforte.com\/yeni-kesfedilen-microsoft-windows-fileless-log-acigi-neden-bir-gizlilik-harikasidir\/#primaryimage","url":"https:\/\/www.inforte.com\/wp-content\/uploads\/2022\/06\/Digital-Forensics-for-Cyber-Professionals-MF-1.png","contentUrl":"https:\/\/www.inforte.com\/wp-content\/uploads\/2022\/06\/Digital-Forensics-for-Cyber-Professionals-MF-1.png","width":960,"height":540},{"@type":"BreadcrumbList","@id":"https:\/\/www.inforte.com\/yeni-kesfedilen-microsoft-windows-fileless-log-acigi-neden-bir-gizlilik-harikasidir\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Ana sayfa","item":"https:\/\/www.inforte.com\/"},{"@type":"ListItem","position":2,"name":"Yeni ke\u015ffedilen Microsoft Windows &#8216;fileless&#8217; log a\u00e7\u0131\u011f\u0131 neden bir gizlilik harikas\u0131d\u0131r?"}]},{"@type":"WebSite","@id":"https:\/\/www.inforte.com\/#website","url":"https:\/\/www.inforte.com\/","name":"Inforte Bili\u015fim A.\u015e.","description":"arbor, DDOS, spectrum, visibility, availability, forescout, nac, orchestration, network control, iot security, netscout, performans monitor, packet broker, tap, services assurance, centrify, privilage, access management, password vault, idendity access management, session recording","publisher":{"@id":"https:\/\/www.inforte.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.inforte.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.inforte.com\/#organization","name":"Inforte Bili\u015fim A.\u015e.","url":"https:\/\/www.inforte.com\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.inforte.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.inforte.com\/wp-content\/uploads\/2018\/06\/logo.png","contentUrl":"https:\/\/www.inforte.com\/wp-content\/uploads\/2018\/06\/logo.png","width":286,"height":180,"caption":"Inforte Bili\u015fim A.\u015e."},"image":{"@id":"https:\/\/www.inforte.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.inforte.com\/#\/schema\/person\/b0b38e387df23b9b7aa2d8448cebbeb6","name":"Inforte","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.inforte.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/28531e22b7b30f1c736d4741e45027bf?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/28531e22b7b30f1c736d4741e45027bf?s=96&d=mm&r=g","caption":"Inforte"},"url":"https:\/\/www.inforte.com\/en\/author\/content\/"}]}},"_links":{"self":[{"href":"https:\/\/www.inforte.com\/en\/wp-json\/wp\/v2\/posts\/8115"}],"collection":[{"href":"https:\/\/www.inforte.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.inforte.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.inforte.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.inforte.com\/en\/wp-json\/wp\/v2\/comments?post=8115"}],"version-history":[{"count":1,"href":"https:\/\/www.inforte.com\/en\/wp-json\/wp\/v2\/posts\/8115\/revisions"}],"predecessor-version":[{"id":8117,"href":"https:\/\/www.inforte.com\/en\/wp-json\/wp\/v2\/posts\/8115\/revisions\/8117"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.inforte.com\/en\/wp-json\/wp\/v2\/media\/8116"}],"wp:attachment":[{"href":"https:\/\/www.inforte.com\/en\/wp-json\/wp\/v2\/media?parent=8115"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.inforte.com\/en\/wp-json\/wp\/v2\/categories?post=8115"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.inforte.com\/en\/wp-json\/wp\/v2\/tags?post=8115"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}