{"id":16412,"date":"2026-05-11T08:20:14","date_gmt":"2026-05-11T08:20:14","guid":{"rendered":"https:\/\/akdenizolay.com.tr\/index.php\/2026\/05\/11\/kaspersky-ele-gecirilmis-amazon-simple-email-service-hesaplari-uzerinden-gerceklestirilen-oltalama-saldirilarina-karsi-uyardi\/"},"modified":"2026-05-11T08:20:15","modified_gmt":"2026-05-11T08:20:15","slug":"kaspersky-ele-gecirilmis-amazon-simple-email-service-hesaplari-uzerinden-gerceklestirilen-oltalama-saldirilarina-karsi-uyardi","status":"publish","type":"post","link":"https:\/\/akdenizolay.com.tr\/index.php\/2026\/05\/11\/kaspersky-ele-gecirilmis-amazon-simple-email-service-hesaplari-uzerinden-gerceklestirilen-oltalama-saldirilarina-karsi-uyardi\/","title":{"rendered":"Kaspersky, ele ge\u00e7irilmi\u015f Amazon Simple Email Service hesaplar\u0131 \u00fczerinden ger\u00e7ekle\u015ftirilen oltalama sald\u0131r\u0131lar\u0131na kar\u015f\u0131 uyard\u0131"},"content":{"rendered":"<p> Kaspersky, i\u015fletmelerin ve geli\u015ftiricilerin y\u00fcksek hacimli pazarlama, bildirim ve i\u015flem e-postalar\u0131 g\u00f6nderip almas\u0131na olanak tan\u0131yan bulut tabanl\u0131 bir e-posta hizmeti olan Amazon Simple Email Service\u2019in (SES), oltalama (phishing) ve kurumsal e-posta doland\u0131r\u0131c\u0131l\u0131\u011f\u0131 (BEC) sald\u0131r\u0131lar\u0131nda k\u00f6t\u00fcye kullan\u0131ld\u0131\u011f\u0131n\u0131 tespit etti. G\u00fcvenilir bir servis \u00fczerinden g\u00f6nderilen bu e-postalar, sayg\u0131n IP adreslerinden iletiliyor ve \u00e7o\u011fu zaman me\u015fru \u201c.amazonses.com\u201d ibarelerini i\u00e7eriyor. Bu durum, s\u00f6z konusu oltalama mesajlar\u0131n\u0131 teknik a\u00e7\u0131dan ger\u00e7ek kurumsal yaz\u0131\u015fmalardan ay\u0131rt etmeyi son derece zorla\u015ft\u0131r\u0131yor. Kaspersky, kullan\u0131c\u0131lar\u0131n beklenmedik e-postalara kar\u015f\u0131 son derece temkinli yakla\u015fmas\u0131 gerekti\u011fini vurguluyor.<\/p>\n<p>Sald\u0131r\u0131lar\u0131n temelinde, Amazon Web Services\u2019e (AWS) ait kimlik bilgilerinin \u00e7al\u0131nmas\u0131 ve a\u00e7\u0131\u011fa \u00e7\u0131kmas\u0131 yer al\u0131yor. Sald\u0131rganlar, \u00e7o\u011funlukla herkese a\u00e7\u0131k kod depolar\u0131nda, yanl\u0131\u015f yap\u0131land\u0131r\u0131lm\u0131\u015f bulut depolama alanlar\u0131nda ve if\u015fa edilmi\u015f yap\u0131land\u0131rma dosyalar\u0131nda bulunan AWS Identity and Access Management (IAM) anahtarlar\u0131n\u0131 kullan\u0131yor. Tehdit akt\u00f6rleri, otomatik ara\u00e7lar yard\u0131m\u0131yla ge\u00e7erli anahtarlar\u0131 tespit ederek Amazon\u2019un me\u015fru altyap\u0131s\u0131 \u00fczerinden y\u00fcksek hacimli zararl\u0131 e-postalar g\u00f6nderiyor.<\/p>\n<p>Sald\u0131rganlar ayr\u0131ca, amazonaws.com gibi g\u00fcvenilir alan adlar\u0131n\u0131 y\u00f6nlendirmeler arac\u0131l\u0131\u011f\u0131yla k\u00f6t\u00fcye kullan\u0131yor ve son derece ikna edici HTML e-posta \u015fablonlar\u0131 olu\u015fturuyor. Pek \u00e7ok vakada oltalama sayfalar\u0131, me\u015fru g\u00f6r\u00fcn\u00fcml\u00fc altyap\u0131lar \u00fczerinde bar\u0131nd\u0131r\u0131l\u0131yor. Bu da kullan\u0131c\u0131 kimlik bilgilerinin ele ge\u00e7irilme riskini \u00f6nemli \u00f6l\u00e7\u00fcde art\u0131r\u0131yor.<\/p>\n<p>Kaspersky\u2019nin 2026\u2019n\u0131n ba\u015flar\u0131nda g\u00f6zlemledi\u011fi kampanyalardan birinde sald\u0131rganlar, DocuSign benzeri dijital dok\u00fcman imzalama platformlar\u0131n\u0131 taklit eden e-postalar g\u00f6nderdi. Kullan\u0131c\u0131lardan belgeleri inceleyip imzalamalar\u0131 istenirken, asl\u0131nda kimlik bilgilerini ele ge\u00e7irmek amac\u0131yla haz\u0131rlanm\u0131\u015f sahte giri\u015f sayfalar\u0131na y\u00f6nlendirildikleri g\u00f6r\u00fcld\u00fc. Bu sahte sayfalar Amazon Web Services \u00fczerinde bar\u0131nd\u0131r\u0131lan sahte giri\u015f sayfalar\u0131na y\u00f6nlendirildikleri g\u00f6r\u00fcld\u00fc.<\/p>\n<p><em><img decoding=\"async\" src=\"https:\/\/resize.yandex.net\/mailservice?url=https%3A%2F%2Fimg.faselis.com%2Ffaselis_tr%2Fbrands%2F12586%2Finline%2F1778479876_260511_Kaspersky_bb_g__rsel_2.png.jpg&amp;proxy=yes&amp;key=04cfaddb9ce8f7b652627a091dd812af\" \/>\u00a0<\/em><\/p>\n<p><em>DocuSign bildirimini taklit eden bir oltalama e-postas\u0131<\/em><\/p>\n<p>Ara\u015ft\u0131rmac\u0131lar ayr\u0131ca, Amazon SES \u00fczerinden ger\u00e7ekle\u015ftirilen ve sald\u0131rganlar\u0131n \u00e7al\u0131\u015fan k\u0131l\u0131\u011f\u0131na girerek tedarik\u00e7ilerle sahte e-posta zincirleri olu\u015fturdu\u011fu BEC (Business Email Compromise) sald\u0131r\u0131lar\u0131n\u0131 da belirledi. Genellikle finans departmanlar\u0131n\u0131 hedef alan bu mesajlar, acil \u00f6deme talebi i\u00e7eriyor ve i\u00e7inde yaln\u0131zca banka detaylar\u0131n\u0131n bulundu\u011fu PDF ekleriyle iletiliyor. Herhangi bir zararl\u0131 ba\u011flant\u0131 bar\u0131nd\u0131rmayan bu y\u00f6ntem, sald\u0131r\u0131lar\u0131n g\u00fcvenlik yaz\u0131l\u0131mlar\u0131 taraf\u0131ndan tespit edilmesini olduk\u00e7a zorla\u015ft\u0131r\u0131yor.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/resize.yandex.net\/mailservice?url=https%3A%2F%2Fimg.faselis.com%2Ffaselis_tr%2Fbrands%2F12586%2Finline%2F1778479885_260511_Kaspersky_bb_g__rsel_1.png.jpg&amp;proxy=yes&amp;key=89b8a30de881ebf6dbfe0823c2820688\" \/><\/p>\n<p><em>Amazon SES \u00fczerinden g\u00f6nderilen kurumsal e-posta doland\u0131r\u0131c\u0131l\u0131\u011f\u0131 zinciri \u00f6rne\u011fi<\/em><\/p>\n<p><strong>Kaspersky Spam Kar\u015f\u0131t\u0131 Uzman\u0131 Roman Dedenok<\/strong>\u00a0konuyla ilgili \u015fu de\u011ferlendirmede bulundu: \u201c<em>Daha \u00f6nce de sald\u0131rganlar\u0131n g\u00fcvenilir platformlar\u0131 k\u00f6t\u00fcye kulland\u0131\u011f\u0131 \u00f6rneklerle kar\u015f\u0131la\u015ft\u0131k.\u00a0Google Tasks\u00a0ve\u00a0Google Forms<\/em>\u00a0<em>\u00a0vakalar\u0131nda doland\u0131r\u0131c\u0131lar, yerle\u015fik bildirim mekanizmalar\u0131n\u0131 kullanarak @google.com gibi me\u015fru alan adlar\u0131 \u00fczerinden oltalama ba\u011flant\u0131lar\u0131 g\u00f6nderiyor, b\u00f6ylece hem e-posta filtrelerini a\u015fmay\u0131 hem de kullan\u0131c\u0131 g\u00fcvenini istismar etmeyi ba\u015far\u0131yordu. Ancak Amazon SES\u2019in k\u00f6t\u00fcye kullan\u0131lmas\u0131, bu e\u011filimin \u00e7ok daha geli\u015fmi\u015f bir a\u015famas\u0131n\u0131 temsil ediyor. Sald\u0131rganlar art\u0131k yaln\u0131zca platformlar\u0131n bildirim \u00f6zelliklerinden yararlanmakla kalm\u0131yor; bulut kimlik bilgilerini ele ge\u00e7irerek g\u00fcvenilir bir e-posta g\u00f6nderim altyap\u0131s\u0131 \u00fczerinde do\u011frudan kontrol sa\u011fl\u0131yor. Bu da sald\u0131r\u0131lar\u0131 b\u00fcy\u00fck \u00f6l\u00e7ekte y\u00fcr\u00fctmelerine, mesajlar\u0131 tamamen \u00f6zelle\u015ftirmelerine ve ger\u00e7ek kurumsal ileti\u015fimlerden ay\u0131rt edilmesi olduk\u00e7a g\u00fc\u00e7 oltalama e-postalar\u0131 g\u00f6ndermelerine imkan tan\u0131yor.\u201d<\/em><\/p>\n<p>Kaspersky, bu t\u00fcr sald\u0131r\u0131lardan korunmak i\u00e7in \u015fu \u00f6nerilerde bulunuyor:<\/p>\n<ul>\n<li>Kurumlar, AWS eri\u015fimlerini minimum yetki prensibiyle s\u0131n\u0131rland\u0131rmal\u0131, statik IAM anahtarlar\u0131 yerine rol tabanl\u0131 eri\u015fim y\u00f6ntemlerini tercih etmeli, \u00e7ok fakt\u00f6rl\u00fc kimlik do\u011frulamay\u0131 (MFA) etkinle\u015ftirmeli, eri\u015fimleri IP baz\u0131nda k\u0131s\u0131tlamal\u0131 ve kimlik bilgilerini d\u00fczenli olarak yenileyip denetlemeli.<\/li>\n<li>Bireysel kullan\u0131c\u0131lar ise yaln\u0131zca g\u00f6nderen ad\u0131 ya da alan ad\u0131na g\u00fcvenerek e-postalar\u0131 me\u015fru kabul etmemeli. Beklenmedik mesajlara kar\u015f\u0131 dikkatli yakla\u015fmal\u0131, talepleri farkl\u0131 bir ileti\u015fim kanal\u0131 \u00fczerinden do\u011frulamal\u0131 ve ba\u011flant\u0131lar g\u00fcvenilir g\u00f6r\u00fcnse bile t\u0131klamadan \u00f6nce dikkatlice kontrol etmeli.<\/li>\n<\/ul>\n<p>\u00a0<\/p>\n<p>Kaynak: (BYZHA) Beyaz Haber Ajans\u0131<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Kaspersky, i\u015fletmelerin ve geli\u015ftiricilerin y\u00fcksek hacimli pazarlama, bildirim ve i\u015flem e-postalar\u0131 g\u00f6nderip almas\u0131na olanak tan\u0131yan bulut tabanl\u0131 bir e-posta hizmeti olan Amazon Simple Email Service\u2019in (SES), oltalama (phishing) ve kurumsal e-posta doland\u0131r\u0131c\u0131l\u0131\u011f\u0131 (BEC) sald\u0131r\u0131lar\u0131nda k\u00f6t\u00fcye kullan\u0131ld\u0131\u011f\u0131n\u0131 tespit etti.<\/p>\n","protected":false},"author":1,"featured_media":16413,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[26],"tags":[],"class_list":["post-16412","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-teknoloji"],"_links":{"self":[{"href":"https:\/\/akdenizolay.com.tr\/index.php\/wp-json\/wp\/v2\/posts\/16412","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/akdenizolay.com.tr\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/akdenizolay.com.tr\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/akdenizolay.com.tr\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/akdenizolay.com.tr\/index.php\/wp-json\/wp\/v2\/comments?post=16412"}],"version-history":[{"count":1,"href":"https:\/\/akdenizolay.com.tr\/index.php\/wp-json\/wp\/v2\/posts\/16412\/revisions"}],"predecessor-version":[{"id":16414,"href":"https:\/\/akdenizolay.com.tr\/index.php\/wp-json\/wp\/v2\/posts\/16412\/revisions\/16414"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/akdenizolay.com.tr\/index.php\/wp-json\/wp\/v2\/media\/16413"}],"wp:attachment":[{"href":"https:\/\/akdenizolay.com.tr\/index.php\/wp-json\/wp\/v2\/media?parent=16412"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/akdenizolay.com.tr\/index.php\/wp-json\/wp\/v2\/categories?post=16412"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/akdenizolay.com.tr\/index.php\/wp-json\/wp\/v2\/tags?post=16412"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}