{"id":2210,"date":"2025-03-09T12:01:58","date_gmt":"2025-03-09T12:01:58","guid":{"rendered":"https:\/\/dijitalturk.com\/veysel\/?p=2210"},"modified":"2025-03-09T12:05:30","modified_gmt":"2025-03-09T12:05:30","slug":"polaredge-cisco-asus-qnap-ve-synology-cihazlar-botnet-tuzagina-dusuyor","status":"publish","type":"post","link":"https:\/\/dijitalturk.com\/veysel\/polaredge-cisco-asus-qnap-ve-synology-cihazlar-botnet-tuzagina-dusuyor\/","title":{"rendered":"PolarEdge: Cisco, ASUS, QNAP ve Synology Cihazlar Botnet Tuza\u011f\u0131na D\u00fc\u015f\u00fcyor!"},"content":{"rendered":"<h1>PolarEdge Alarm\u0131: Cisco, ASUS, QNAP ve Synology Cihazlar Botnet Tuza\u011f\u0131na D\u00fc\u015f\u00fcyor!<\/h1>\n<p>Siber g\u00fcvenlik d\u00fcnyas\u0131nda alarm zilleri \u00e7al\u0131yor! Yeni ke\u015ffedilen &#8220;PolarEdge&#8221; botneti, Cisco, ASUS, QNAP ve Synology gibi markalar\u0131n kenar cihazlar\u0131n\u0131 hedef alarak b\u00fcy\u00fck bir tehdit olu\u015fturuyor. Frans\u0131z siber g\u00fcvenlik \u015firketi Sekoia&#8217;n\u0131n yapt\u0131\u011f\u0131 a\u00e7\u0131klamaya g\u00f6re, kimli\u011fi belirsiz sald\u0131rganlar, 2023&#8217;\u00fcn sonlar\u0131ndan bu yana CVE-2023-20118 g\u00fcvenlik a\u00e7\u0131\u011f\u0131n\u0131 kullanarak cihazlara arka kap\u0131 yerle\u015ftiriyor.<\/p>\n<h2>PolarEdge Botneti Nedir? Neler Yapabilir?<\/h2>\n<p>The Hacker News&#8217;in haberine g\u00f6re, PolarEdge botneti, Cisco ve D-Link router&#8217;lardaki g\u00fcvenlik a\u00e7\u0131klar\u0131n\u0131 kullanarak cihazlar\u0131 ele ge\u00e7iriyor ve k\u00f6t\u00fc ama\u00e7l\u0131 faaliyetler i\u00e7in kullan\u0131yor. \u0130\u015fte dikkat \u00e7eken noktalar:<\/p>\n<h3>Hedeflenen G\u00fcvenlik A\u00e7\u0131klar\u0131<\/h3>\n<ul>\n<li><strong>Cisco Router&#8217;lar:<\/strong> Kritik uzaktan kod y\u00fcr\u00fctme (RCE) a\u00e7\u0131\u011f\u0131 CVE-2023-20024 \u00fczerinden hedef al\u0131n\u0131yor.<\/li>\n<li><strong>D-Link Router&#8217;lar:<\/strong> On y\u0131ll\u0131k bir D-Link router g\u00fcvenlik a\u00e7\u0131\u011f\u0131 (CVE-2014-100005) istismar ediliyor. Bu durum, g\u00fcncellenmemi\u015f eski cihazlar\u0131n olu\u015fturdu\u011fu riskleri g\u00f6zler \u00f6n\u00fcne seriyor.<\/li>\n<\/ul>\n<h3>Botnet&#8217;in Tehlikeli Davran\u0131\u015flar\u0131<\/h3>\n<ul>\n<li><strong>Router Kontrol\u00fc:<\/strong> Sald\u0131rganlar, router&#8217;lar\u0131n kontrol\u00fcn\u00fc ele ge\u00e7irerek hafif shell script&#8217;leri ve k\u00f6t\u00fc ama\u00e7l\u0131 y\u00fckler da\u011f\u0131t\u0131yor.<\/li>\n<li><strong>DDoS Sald\u0131r\u0131lar\u0131:<\/strong> Da\u011f\u0131t\u0131k hizmet reddi (DDoS) sald\u0131r\u0131lar\u0131 d\u00fczenleyebiliyor, kimlik bilgisi \u00e7alabiliyor ve a\u011flar aras\u0131nda yanal olarak yay\u0131l\u0131yor.<\/li>\n<li><strong>\u00c7oklu Mimari Deste\u011fi:<\/strong> ARM, x86 ve MIPS gibi \u00e7e\u015fitli donan\u0131mlar\u0131 enfekte etmek i\u00e7in \u00e7oklu mimari y\u00fckler kullan\u0131yor.<\/li>\n<\/ul>\n<h3>Gizlilik ve Kal\u0131c\u0131l\u0131k<\/h3>\n<p>PolarEdge, tespit edilmekten ka\u00e7\u0131nmak i\u00e7in karma\u015f\u0131k gizleme teknikleri kullan\u0131yor ve router yap\u0131land\u0131rmalar\u0131n\u0131 de\u011fi\u015ftirerek kal\u0131c\u0131l\u0131\u011f\u0131n\u0131 sa\u011fl\u0131yor.<\/p>\n<h3>Ke\u015fif ve \u0130li\u015fkilendirme<\/h3>\n<p>Palo Alto Networks&#8217;\u00fcn Unit 42 ekibi taraf\u0131ndan ke\u015ffedilen botnetin, ge\u00e7mi\u015fte &#8220;AndoryuBotnet&#8221; gibi kampanyalarla ba\u011flant\u0131l\u0131 oldu\u011fu d\u00fc\u015f\u00fcn\u00fcl\u00fcyor.<\/p>\n<h2>Uzmanlardan Acil Uyar\u0131lar ve \u00d6neriler<\/h2>\n<p>Siber g\u00fcvenlik uzmanlar\u0131, PolarEdge botnetine kar\u015f\u0131 al\u0131nmas\u0131 gereken \u00f6nlemler konusunda uyar\u0131yor:<\/p>\n<ul>\n<li><strong>Yama Uygulamas\u0131:<\/strong> G\u00fcvenlik a\u00e7\u0131\u011f\u0131 bulunan cihazlar\u0131n derhal g\u00fcncellenmesi gerekiyor.<\/li>\n<li><strong>A\u011f Trafi\u011fi \u0130zleme:<\/strong> \u015e\u00fcpheli trafik kal\u0131plar\u0131 i\u00e7in a\u011f trafi\u011fi s\u00fcrekli olarak izlenmeli.<\/li>\n<li><strong>Uzaktan Y\u00f6netim K\u0131s\u0131tlamas\u0131:<\/strong> Router&#8217;lara uzaktan y\u00f6netim eri\u015fimi k\u0131s\u0131tlanmal\u0131.<\/li>\n<\/ul>\n<p>PolarEdge botneti, g\u00fcncellenmemi\u015f router&#8217;lar\u0131n olu\u015fturdu\u011fu s\u00fcrekli tehdidi ve IoT ekosistemlerindeki geni\u015fleyen sald\u0131r\u0131 y\u00fczeylerinin risklerini bir kez daha vurguluyor. Kendinizi ve a\u011f\u0131n\u0131z\u0131 korumak i\u00e7in gerekli \u00f6nlemleri almay\u0131 ihmal etmeyin!<\/p>\n<p>Detayl\u0131 bilgi i\u00e7in <a href=\"https:\/\/thehackernews.com\/2025\/02\/polaredge-botnet-exploits-cisco-and.html\" target=\"_blank\" rel=\"noopener noreferrer\">The Hacker News&#8217;teki makaleyi<\/a> okuyabilirsiniz.<\/p>\n<h2>S\u0131k\u00e7a Sorulan Sorular<\/h2>\n<h3>CVE-2023-20024 Nedir?<\/h3>\n<p>CVE-2023-20024, Cisco K\u00fc\u00e7\u00fck \u0130\u015fletme RV016, RV042, RV042G ve RV082 serisi y\u00f6nlendiricilerde bulunan kritik bir uzaktan kod y\u00fcr\u00fctme (RCE) a\u00e7\u0131\u011f\u0131d\u0131r. CVSS puan\u0131 6.5 olan bu g\u00fcvenlik a\u00e7\u0131\u011f\u0131, sald\u0131rganlar\u0131n yetkisiz bir \u015fekilde kod \u00e7al\u0131\u015ft\u0131rmas\u0131na ve cihazlar\u0131n kontrol\u00fcn\u00fc ele ge\u00e7irmesine olanak tan\u0131r.<\/p>\n<h3>Palo Alto Networks Kimdir?<\/h3>\n<p><strong>Palo Alto Networks:<\/strong> D\u00fcnya genelinde faaliyet g\u00f6steren, merkezi Santa Clara, Kaliforniya&#8217;da bulunan bir siber g\u00fcvenlik \u015firketidir. A\u011f g\u00fcvenli\u011fi, bulut g\u00fcvenli\u011fi, u\u00e7 nokta g\u00fcvenli\u011fi ve tehdit istihbarat\u0131 gibi alanlarda \u00e7\u00f6z\u00fcmler sunmaktad\u0131r. Unit 42, Palo Alto Networks&#8217;\u00fcn global tehdit istihbarat ekibidir.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>PolarEdge Alarm\u0131: Cisco, ASUS, QNAP ve Synology Cihazlar Botnet Tuza\u011f\u0131na D\u00fc\u015f\u00fcyor! Siber g\u00fcvenlik d\u00fcnyas\u0131nda alarm zilleri \u00e7al\u0131yor! Yeni ke\u015ffedilen &#8220;PolarEdge&#8221; [&hellip;]<\/p>\n","protected":false},"author":512,"featured_media":2209,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_uag_custom_page_level_css":"","site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[36],"tags":[87,155,370],"class_list":["post-2210","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-haber","tag-guvenlik","tag-hack","tag-security"],"uagb_featured_image_src":{"full":["https:\/\/dijitalturk.com\/veysel\/wp-content\/uploads\/2025\/03\/2025-02-27T092000.000Z_1741498536_cyberattack.png",728,380,false],"thumbnail":["https:\/\/dijitalturk.com\/veysel\/wp-content\/uploads\/2025\/03\/2025-02-27T092000.000Z_1741498536_cyberattack-150x150.png",150,150,true],"medium":["https:\/\/dijitalturk.com\/veysel\/wp-content\/uploads\/2025\/03\/2025-02-27T092000.000Z_1741498536_cyberattack-300x157.png",300,157,true],"medium_large":["https:\/\/dijitalturk.com\/veysel\/wp-content\/uploads\/2025\/03\/2025-02-27T092000.000Z_1741498536_cyberattack.png",728,380,false],"large":["https:\/\/dijitalturk.com\/veysel\/wp-content\/uploads\/2025\/03\/2025-02-27T092000.000Z_1741498536_cyberattack-600x313.png",600,313,true],"1536x1536":["https:\/\/dijitalturk.com\/veysel\/wp-content\/uploads\/2025\/03\/2025-02-27T092000.000Z_1741498536_cyberattack.png",728,380,false],"2048x2048":["https:\/\/dijitalturk.com\/veysel\/wp-content\/uploads\/2025\/03\/2025-02-27T092000.000Z_1741498536_cyberattack.png",728,380,false]},"uagb_author_info":{"display_name":"Dragon DT","author_link":"https:\/\/dijitalturk.com\/veysel\/author\/dragon\/"},"uagb_comment_info":0,"uagb_excerpt":"PolarEdge Alarm\u0131: Cisco, ASUS, QNAP ve Synology Cihazlar Botnet Tuza\u011f\u0131na D\u00fc\u015f\u00fcyor! Siber g\u00fcvenlik d\u00fcnyas\u0131nda alarm zilleri \u00e7al\u0131yor! Yeni ke\u015ffedilen &#8220;PolarEdge&#8221; [&hellip;]","_links":{"self":[{"href":"https:\/\/dijitalturk.com\/veysel\/wp-json\/wp\/v2\/posts\/2210","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dijitalturk.com\/veysel\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dijitalturk.com\/veysel\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dijitalturk.com\/veysel\/wp-json\/wp\/v2\/users\/512"}],"replies":[{"embeddable":true,"href":"https:\/\/dijitalturk.com\/veysel\/wp-json\/wp\/v2\/comments?post=2210"}],"version-history":[{"count":0,"href":"https:\/\/dijitalturk.com\/veysel\/wp-json\/wp\/v2\/posts\/2210\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/dijitalturk.com\/veysel\/wp-json\/wp\/v2\/media\/2209"}],"wp:attachment":[{"href":"https:\/\/dijitalturk.com\/veysel\/wp-json\/wp\/v2\/media?parent=2210"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dijitalturk.com\/veysel\/wp-json\/wp\/v2\/categories?post=2210"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dijitalturk.com\/veysel\/wp-json\/wp\/v2\/tags?post=2210"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}