{"id":150449,"date":"2024-03-07T14:28:32","date_gmt":"2024-03-07T11:28:32","guid":{"rendered":"https:\/\/epochtimestr.com\/?p=150449"},"modified":"2024-03-07T14:28:33","modified_gmt":"2024-03-07T11:28:33","slug":"cinin-bilgisayar-korsanligi-yetenekleri-ortaya-cikti","status":"publish","type":"post","link":"https:\/\/epochtimestr.com\/index.php\/cinin-bilgisayar-korsanligi-yetenekleri-ortaya-cikti","title":{"rendered":"\u00c7in\u2019in Bilgisayar Korsanl\u0131\u011f\u0131 Yetenekleri Ortaya \u00c7\u0131kt\u0131"},"content":{"rendered":"\n<p>\u00c7in\u2019in bilgisayar korsanl\u0131\u011f\u0131 yetenekleri ve hedeflerini a\u00e7\u0131\u011fa \u00e7\u0131karan bir tak\u0131m belgeler s\u0131zd\u0131. Bir uzman, \u2018Barutsuz bir sava\u015f var ve siber uzayda oluyor\u2019 dedi.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"866\" height=\"482\" src=\"https:\/\/epochtimestr.com\/wp-content\/uploads\/2011y\/chinli-hackerlar-1.jpg\" alt=\"\" class=\"wp-image-150450\" srcset=\"https:\/\/epochtimestr.com\/wp-content\/uploads\/2011y\/chinli-hackerlar-1.jpg 866w, https:\/\/epochtimestr.com\/wp-content\/uploads\/2011y\/chinli-hackerlar-1-300x167.jpg 300w, https:\/\/epochtimestr.com\/wp-content\/uploads\/2011y\/chinli-hackerlar-1-150x83.jpg 150w, https:\/\/epochtimestr.com\/wp-content\/uploads\/2011y\/chinli-hackerlar-1-768x427.jpg 768w\" sizes=\"(max-width: 866px) 100vw, 866px\" \/><figcaption class=\"wp-element-caption\"><em>\u00c7in\u2019in bilgisayar korsanl\u0131\u011f\u0131 hangi boyutlara ula\u015ft\u0131? ABD D\u0131\u015fi\u015fleri Bakanl\u0131\u011f\u0131na ait 60.000 e-postan\u0131n \u00c7inli bilgisayar korsanlar\u0131 taraf\u0131ndan \u00e7al\u0131nd\u0131\u011f\u0131 haberi (Foto\u011fraf: NTD, China in Focus program\u0131, ekran g\u00f6r\u00fcnt\u00fcs\u00fc).<\/em><\/figcaption><\/figure><\/div>\n\n\n<p>\u00c7inli bir bilgisayar korsanl\u0131\u011f\u0131 y\u00fcklenicisinden \u00e7ok say\u0131da belge s\u0131zd\u0131r\u0131ld\u0131. Uzmanlar bu belgelerin, \u00c7in kom\u00fcnist rejiminin olu\u015fturdu\u011fu k\u00fcresel siber g\u00fcvenlik tehditlerini g\u00f6zler \u00f6n\u00fcne serdi\u011fini s\u00f6yl\u00fcyor.<\/p>\n\n\n\n<p>S\u0131zd\u0131r\u0131lan belgeler, 16 \u015eubat\u2019ta kimli\u011fi belirsiz ki\u015filer taraf\u0131ndan GitHub\u2019da yay\u0131nland\u0131. Ayr\u0131ca s\u00f6z konusu belgeler aras\u0131nda \u00fcr\u00fcn k\u0131lavuzlar\u0131, pazarlama materyalleri, \u00e7al\u0131\u015fan listeleri, sohbet kay\u0131tlar\u0131, mali bilgiler ve yabanc\u0131 s\u0131zmaya ili\u015fkin ayr\u0131nt\u0131lar yer al\u0131yor.<\/p>\n\n\n\n<p>Associated Press, 21 \u015eubat\u2019ta yay\u0131nlad\u0131\u011f\u0131 raporda, belgelerin \u00c7in merkezli siber g\u00fcvenlik tedarik\u00e7isi I-Soon\u2019dan geldi\u011fini <a href=\"https:\/\/apnews.com\/article\/china-cybersecurity-leak-document-dump-spying-aac38c75f268b72910a94881ccbb77cb\" target=\"_blank\" rel=\"noreferrer noopener\">do\u011frulad\u0131<\/a>. Bu bilgi Mandarin dilinde Anxun olarak bilinen \u015firketin iki \u00e7al\u0131\u015fan\u0131yla yap\u0131lan g\u00f6r\u00fc\u015fmenin ard\u0131ndan yay\u0131nland\u0131.<\/p>\n\n\n\n<p>Belgelere g\u00f6re I-Soon, sald\u0131rgan siber ara\u00e7lar\u0131 ve casus yaz\u0131l\u0131m sistemlerini i\u00e7eren bir \u00fcr\u00fcn yelpazesine sahip. Belgelerde ayr\u0131ca \u015firketin Temmuz 2016\u2019dan Haziran 2022\u2019ye kadar imzalad\u0131\u011f\u0131 s\u00f6zle\u015fmelerin bir listesi de yer al\u0131yor. Bu liste, m\u00fc\u015fterilerinin \u00e7o\u011funun \u00c7in\u2019in b\u00f6lgesel g\u00fcvenlik b\u00fcrolar\u0131 oldu\u011funu g\u00f6steriyor. Bu if\u015fa, \u015firketin ortaklar\u0131ndan biri olarak \u00c7KP\u2019nin Kamu G\u00fcvenli\u011fi Bakanl\u0131\u011f\u0131\u2019n\u0131 \u00f6ne \u00e7\u0131karan <a href=\"https:\/\/web.archive.org\/web\/20240219105947\/i-soon.net\/pc_partner.html\" target=\"_blank\" rel=\"noreferrer noopener\">websitesindeki<\/a> bilgilere, yenilerini ekliyor.<\/p>\n\n\n\n<p>Teknoloji uzman\u0131 Chiang Ya-chi, 21 \u015eubat\u2019ta The Epoch Times\u2019a konu ile ilgili bir a\u00e7\u0131klama yapt\u0131. \u201cI-Soon olay\u0131 bir kez daha herkese a\u011f g\u00fcvenli\u011finin bir ulusal g\u00fcvenlik meselesi oldu\u011funu hat\u0131rlatmal\u0131. Barutsuz bir sava\u015f var ve siber uzayda oluyor\u201d dedi.<\/p>\n\n\n\n<p>Chiang, Tayvan Hukuk ve Teknoloji Derne\u011fi\u2019nin ba\u015fkan\u0131d\u0131r. Ayn\u0131 zamanda Ulusal Tayvan Okyanus \u00dcniversitesi\u2019nde internet teknolojisi ve fikri m\u00fclkiyet hukuku alan\u0131nda uzman profes\u00f6rd\u00fcr.<\/p>\n\n\n\n<p>Chiang, s\u0131zan belgelerin I-Soon\u2019un \u00c7in Kom\u00fcnist Partisi (\u00c7KP) taraf\u0131ndan finanse edildi\u011fini g\u00f6sterdi\u011fini s\u00f6yledi. Pekin\u2019in yabanc\u0131 h\u00fck\u00fcmetlere ve kurulu\u015flara s\u0131zmak i\u00e7in I-Soon gibi firmalar taraf\u0131ndan geli\u015ftirilen ara\u00e7lar\u0131 kulland\u0131\u011f\u0131n\u0131 belirtti.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Casus Yaz\u0131l\u0131m<\/strong><\/h3>\n\n\n\n<p>S\u0131zd\u0131r\u0131lan belgelerde yer alan kurban listesi, I-Soon\u2019un bir\u00e7ok \u00fclkedeki kurumlar\u0131 hedef ald\u0131\u011f\u0131n\u0131 g\u00f6steriyor. Bu kurumlar aras\u0131nda telekom\u00fcnikasyon \u015firketleri, hastaneler, \u00fcniversiteler, \u00f6zel \u015firketler ve devlet kurumlar\u0131 var. Ayr\u0131ca \u00fclkeler aras\u0131nda Fransa, M\u0131s\u0131r, Hindistan, Endonezya, Kazakistan, Malezya, Mo\u011folistan, Nepal, G\u00fcney Kore, Tayvan, Tayland, Filipinler ve Vietnam yer al\u0131yor.<\/p>\n\n\n\n<p>Bir belgeye g\u00f6re, I-Soon Vietnam Ekonomi Bakanl\u0131\u011f\u0131\u2019n\u0131 hacklemek i\u00e7in di\u011fer iki Vietnam h\u00fck\u00fcmeti bakanl\u0131\u011f\u0131n\u0131 hacklemek i\u00e7in ald\u0131\u011f\u0131ndan daha fazla para talep etmi\u015f.<\/p>\n\n\n\n<p>Belge s\u0131z\u0131nt\u0131s\u0131n\u0131n ard\u0131ndan bir\u00e7ok ara\u015ft\u0131rmac\u0131 ve uzman, basitle\u015ftirilmi\u015f \u00c7ince ile yaz\u0131lm\u0131\u015f belgelere ili\u015fkin analizlerini yay\u0131nlad\u0131.<\/p>\n\n\n\n<p>Ger\u00e7ek zamanl\u0131 siber koruma sa\u011flayan Kaliforniya merkezli Malwarebytes, 21 \u015eubat\u2019ta s\u0131zd\u0131r\u0131lan verilerin <a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2024\/02\/a-first-analysis-of-the-i-soon-data-leak\" target=\"_blank\" rel=\"noreferrer noopener\">bir analizini yay\u0131nlad\u0131<\/a>. Belgelerin \u201c\u00f6nde gelen casus yaz\u0131l\u0131m sat\u0131c\u0131s\u0131 APT\u2019de devam eden operasyonlara i\u00e7eriden bir bak\u0131\u015f sa\u011flad\u0131\u011f\u0131n\u0131\u201d s\u00f6yledi. APT, geli\u015fmi\u015f kal\u0131c\u0131 tehdit anlam\u0131na gelir.<\/p>\n\n\n\n<p>Analiz, belgelerin ortaya \u00e7\u0131kard\u0131\u011f\u0131 baz\u0131 I-Soon \u00fcr\u00fcnlerini vurguluyor. Bunlar aras\u0131nda \u201cTwitter h\u0131rs\u0131z\u0131\u201d olarak adland\u0131r\u0131lan bir \u00fcr\u00fcn de var.<\/p>\n\n\n\n<p>Ayr\u0131ca analizde \u015fu ifadelere yer veriliyor: \u201cTwitter h\u0131rs\u0131z\u0131n\u0131n \u00f6zellikleri aras\u0131nda kullan\u0131c\u0131n\u0131n Twitter e-posta ve telefon numaras\u0131n\u0131 ele ge\u00e7irme, ger\u00e7ek zamanl\u0131 izleme, ki\u015fisel mesajlar\u0131 okuma ve kullan\u0131c\u0131 ad\u0131na tweet yay\u0131nlama yer al\u0131yor\u201d.<\/p>\n\n\n\n<p>Belgenin bir sayfas\u0131nda I-Soon, Twitter\u2019\u0131n g\u00fcvenlik mekanizmas\u0131 \u00fczerinde y\u0131llarca \u00e7al\u0131\u015fm\u0131\u015f olmakla \u00f6v\u00fcn\u00fcyor. Bu nedenle \u00fcr\u00fcn\u00fcn, bir Twitter kullan\u0131c\u0131s\u0131n\u0131n hesab\u0131n\u0131 hedeflemek i\u00e7in g\u00fcvenlik \u00f6zelliklerini atlayabilece\u011fi iddia ediliyor.<\/p>\n\n\n\n<p>Ayn\u0131 zamanda, s\u0131zd\u0131r\u0131lan belgeler \u2018Twitter h\u0131rs\u0131z\u0131\u2019 \u00fcr\u00fcn\u00fcn\u00fcn maliyetini de ortaya koyuyor. \u00dcr\u00fcn\u00fcn bir y\u0131ll\u0131k kullan\u0131m\u0131n\u0131n maliyeti 700.000 yuan (yakla\u015f\u0131k 97.000 $). \u00dc\u00e7 y\u0131ll\u0131k kullan\u0131m\u0131n maliyeti ise 1,5 milyon yuan (yakla\u015f\u0131k 208.000 $).<\/p>\n\n\n\n<p>Malwarebytes analizine g\u00f6re \u00fcr\u00fcn a\u00e7\u0131klamalar\u0131 \u015fu \u015fekilde: \u201cWindows x64\/x86 i\u00e7in \u00d6zel Uzaktan Eri\u015fim Truva Atlar\u0131 (RAT\u2019lar). Ayr\u0131ca \u00f6zellikler aras\u0131nda; i\u015flem\/hizmet\/kay\u0131t defteri y\u00f6netimi, uzak kalkan, tu\u015f kayd\u0131, dosya eri\u015fimi kayd\u0131, sistem bilgileri alma, uzaktan ba\u011flant\u0131 kesme ve yaz\u0131l\u0131m\u0131 kald\u0131rma yer al\u0131yor.\u201d<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Tehditler<\/strong><\/h3>\n\n\n\n<p>RAT\u2019lar\u0131n iOS ve Android versiyonlar\u0131 bulunmaktad\u0131r. Analize g\u00f6re iOS modeli, cihaz yaz\u0131l\u0131m\u0131n\u0131 k\u0131rmadan t\u00fcm iOS cihaz s\u00fcr\u00fcmlerini destekledi\u011fini iddia ediyor. Donan\u0131m bilgileri, GPS verileri, ki\u015filer, medya dosyalar\u0131 ve ger\u00e7ek zamanl\u0131 ses kay\u0131tlar\u0131 gibi \u00f6zelliklere sahip.<\/p>\n\n\n\n<p>Ayr\u0131ca I-Soon\u2019un \u201ca\u011flara i\u00e7eriden sald\u0131rmak\u201d i\u00e7in ta\u015f\u0131nabilir cihazlara sahip oldu\u011fu belirtiliyor.<\/p>\n\n\n\n<p>S\u0131zan belgelere g\u00f6re, ta\u015f\u0131nabilir cihazlar iki farkl\u0131 boyutta geliyor. Standart versiyonu cep telefonu pili, anahtarl\u0131 uzatma kablosu veya g\u00fc\u00e7 adapt\u00f6r\u00fc olarak gizlenebiliyor. Bunun yan\u0131 s\u0131ra, mini versiyon da bask\u0131l\u0131 devre kart\u0131 olarak gizlenebiliyor.<\/p>\n\n\n\n<p>Malwarebytes analizine g\u00f6re, kullan\u0131c\u0131 arama veri-tabanlar\u0131 sosyal medya hesaplar\u0131yla ili\u015fkilendirilebiliyor. Bu veri-tabanlar\u0131nda kullan\u0131c\u0131lar\u0131n telefon numaralar\u0131, adlar\u0131 ve e-posta adresleri saklanabiliyor.<\/p>\n\n\n\n<p>Ayr\u0131ca \u00c7KP, kullan\u0131c\u0131 arama veri-tabanlar\u0131n\u0131 \u00c7in\u2019deki muhaliflerini takip etmek ve bulmak i\u00e7in kullanabilme potansiyeline de sahip. <a href=\"https:\/\/twitter.com\/AzakaSekai_\/status\/1759333465642934579\" target=\"_blank\" rel=\"noreferrer noopener\">S\u0131zan belgelere<\/a> g\u00f6re Weibo, Baidu ve WeChat d\u00e2hil olmak \u00fczere farkl\u0131 \u00c7in platformlar\u0131 i\u00e7in veri-tabanlar\u0131 olu\u015fturuldu.<\/p>\n\n\n\n<p>Su Tzu-yun, Tayvan merkezli Ulusal Savunma ve G\u00fcvenlik Ara\u015ft\u0131rmalar\u0131 Enstit\u00fcs\u00fc m\u00fcd\u00fcr\u00fcd\u00fcr. 21 \u015eubat\u2019ta The Epoch Times\u2019a konu hakk\u0131nda bir deme\u00e7 verdi. ABD ve NATO\u2019nun \u00c7in rejiminin siber g\u00fcvenliklerine y\u00f6nelik bir tehdit oldu\u011fu y\u00f6n\u00fcndeki iddialar\u0131n\u0131 hat\u0131rlatt\u0131. Ayr\u0131ca I-Soon belgelerinin \u00c7in\u2019in k\u00f6t\u00fc niyetli oldu\u011funu g\u00f6steren ve iddialar\u0131 destekleyen son kan\u0131t oldu\u011funu s\u00f6yledi.<\/p>\n\n\n\n<p>2022\u2019de NATO taraf\u0131ndan haz\u0131rlanan <a href=\"https:\/\/www.theepochtimes.com\/china\/taiwan-officer-reveals-details-of-rare-interaction-with-nato-4978092\" target=\"_blank\" rel=\"noreferrer noopener\">stratejik kavram<\/a> \u00fczerinde mutabakata var\u0131lm\u0131\u015ft\u0131. Burada, rejimin \u201ck\u00f6t\u00fc niyetli hibrit ve siber operasyonlar\u0131n\u0131n, \u00e7at\u0131\u015fmac\u0131 s\u00f6yleminin ve yanl\u0131\u015f bilgilendirmesinin, m\u00fcttefikleri hedef ald\u0131\u011f\u0131 ve ittifak g\u00fcvenli\u011fine zarar verdi\u011fi\u201d <a href=\"https:\/\/www.nato.int\/nato_static_fl2014\/assets\/pdf\/2022\/6\/pdf\/290622-strategic-concept.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">ifade edildi<\/a>.<\/p>\n\n\n\n<p>Bu ay\u0131n ba\u015flar\u0131nda Siber G\u00fcvenlik ve Altyap\u0131 G\u00fcvenli\u011fi Ajans\u0131, \u00c7in\u2019in bilgisayar korsanl\u0131\u011f\u0131 hakk\u0131nda bir uyar\u0131 yay\u0131nlad\u0131. \u00c7KP\u2019nin bir \u00e7at\u0131\u015fmaya haz\u0131rl\u0131k amac\u0131yla ABD sistemlerine k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlar\u0131 \u00f6nceden konumland\u0131rd\u0131\u011f\u0131n\u0131 bildirdi. Uyar\u0131dan birka\u00e7 g\u00fcn \u00f6nce FBI y\u00f6neticisi Christopher Wray, milletvekillerine, <a href=\"https:\/\/www.theepochtimes.com\/us\/us-dismantles-ccp-malware-that-threatened-physical-safety-of-americans-5577737\" target=\"_blank\" rel=\"noreferrer noopener\">\u201cVolt Typhoon\u201dun \u00e7\u00f6kertildi\u011fini<\/a> s\u00f6ylemi\u015fti. \u00c7in merkezli ve devlet destekli b\u00fcy\u00fck bilgisayar korsanl\u0131\u011f\u0131 grubu, \u00e7ok kurumlu bir operasyonla \u00e7\u00f6kertildi. Grup, ABD\u2019nin kritik altyap\u0131s\u0131ndaki \u00e7ok \u00e7e\u015fitli a\u011flar\u0131 hedeflemeye 2021\u2019de ba\u015flam\u0131\u015ft\u0131.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>APT41 Olay\u0131<\/strong><\/h3>\n\n\n\n<p>Ge\u00e7ti\u011fimiz y\u0131l Wray, \u00c7inli bilgisayar korsanlar\u0131n\u0131n say\u0131s\u0131n\u0131n, ABD\u2019li siber uzmanlar\u0131n en az 50 kat\u0131 oldu\u011fu konusunda uyar\u0131da bulundu.<\/p>\n\n\n\n<p>Baz\u0131 ara\u015ft\u0131rmac\u0131lar, s\u0131zd\u0131r\u0131lan belgeler \u00fczerinde yapt\u0131klar\u0131 analize dayanarak I-Soon\u2019un <a href=\"https:\/\/twitter.com\/Byron_Wan\/status\/1759667463430807762\" target=\"_blank\" rel=\"noreferrer noopener\">APT41 ile<\/a> ba\u011flant\u0131s\u0131 olabilece\u011fini <a href=\"https:\/\/twitter.com\/BushidoToken\/status\/1759877511549268357\" target=\"_blank\" rel=\"noreferrer noopener\">\u00f6ne s\u00fcrd\u00fc<\/a>. Ayr\u0131ca APT41, \u00c7in\u2019in devlet destekli bir bilgisayar korsanl\u0131\u011f\u0131 grubudur.<\/p>\n\n\n\n<p>2020 y\u0131l\u0131nda APT41\u2019de \u00e7al\u0131\u015fan be\u015f \u00c7in vatanda\u015f\u0131 hakk\u0131nda, bilgisayar korsanl\u0131\u011f\u0131 su\u00e7lamalar\u0131yla dava a\u00e7\u0131ld\u0131. Su\u00e7lamalar aras\u0131nda, d\u00fcnya \u00e7ap\u0131nda 100\u2019den fazla kurulu\u015ftan ticari s\u0131rlar\u0131 ve hassas bilgileri \u00e7almak vard\u0131. Be\u015f ki\u015fi \u015fu anda <a href=\"https:\/\/www.fbi.gov\/wanted\/cyber\/apt-41-group\" target=\"_blank\" rel=\"noreferrer noopener\">FBI\u2019\u0131n arananlar<\/a> listesinde.<\/p>\n\n\n\n<p>Siber g\u00fcvenlik firmas\u0131 Mandiant, 2022 tarihli bir raporunda, APT41\u2019in bu a\u011flara eri\u015fim sa\u011flamak i\u00e7in en az alt\u0131 ABD eyalet h\u00fck\u00fcmetinin \u00e7evrimi\u00e7i sistemlerindeki g\u00fcvenlik a\u00e7\u0131klar\u0131ndan <a href=\"https:\/\/www.theepochtimes.com\/china\/chinese-hackers-penetrated-at-least-6-us-state-governments-cybersecurity-firm-says-4324385\" target=\"_blank\" rel=\"noreferrer noopener\">yararland\u0131\u011f\u0131n\u0131 belirtti<\/a>.<\/p>\n\n\n\n<p>Kaliforniya merkezli siber g\u00fcvenlik \u015firketi SentinelLabs, I-Soon\u2019un 21 \u015eubat\u2019ta s\u0131zd\u0131r\u0131lan verilerine ili\u015fkin bir <a href=\"https:\/\/www.sentinelone.com\/labs\/unmasking-i-soon-the-leak-that-revealed-chinas-cyber-operations\/\" target=\"_blank\" rel=\"noreferrer noopener\">analiz<\/a> yay\u0131nlad\u0131. \u201cS\u0131z\u0131nt\u0131, \u00c7in\u2019in bilgisayar korsanl\u0131\u011f\u0131 ekosisteminin ne kadar olgunla\u015fm\u0131\u015f oldu\u011funu ortaya koyuyor. \u00dcstelik bunun i\u00e7in, bug\u00fcne kadar kamuya a\u00e7\u0131k olan en somut ayr\u0131nt\u0131lardan baz\u0131lar\u0131n\u0131 sunuyor\u201d dedi.<\/p>\n\n\n\n<p>\u201c\u00c7in h\u00fck\u00fcmetinin gerek duydu\u011fu hedefler do\u011frultusunda, kiral\u0131k bilgisayar korsanlar\u0131ndan olu\u015fan rekabet\u00e7i bir pazar\u0131n nas\u0131l geli\u015fti\u011fini a\u00e7\u0131k\u00e7a g\u00f6steriyor.\u201d<\/p>\n\n\n\n<p><em>Chung Yuan bu rapora katk\u0131da bulunmu\u015ftur.<\/em><\/p>\n\n\n\n<p><em>Yazan: <\/em>Frank Fang, The Epoch Times Taiwan <br \/><em>\u00c7eviren<\/em>: Hatice Atmaca, The Epoch Times T\u00fcrkiye<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u00c7in\u2019in bilgisayar korsanl\u0131\u011f\u0131 yetenekleri ve hedeflerini a\u00e7\u0131\u011fa \u00e7\u0131karan bir tak\u0131m belgeler s\u0131zd\u0131. Bir uzman, \u2018Barutsuz bir sava\u015f var ve siber uzayda oluyor\u2019 dedi. \u00c7inli bir bilgisayar korsanl\u0131\u011f\u0131 y\u00fcklenicisinden \u00e7ok say\u0131da belge s\u0131zd\u0131r\u0131ld\u0131. Uzmanlar bu belgelerin, \u00c7in kom\u00fcnist rejiminin olu\u015fturdu\u011fu k\u00fcresel siber g\u00fcvenlik tehditlerini g\u00f6zler \u00f6n\u00fcne serdi\u011fini s\u00f6yl\u00fcyor. S\u0131zd\u0131r\u0131lan belgeler, 16 \u015eubat\u2019ta kimli\u011fi belirsiz ki\u015filer taraf\u0131ndan [&hellip;]<\/p>\n","protected":false},"author":12379,"featured_media":150450,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_yoast_wpseo_focuskw":"\u00c7in\u2019in bilgisayar korsanl\u0131\u011f\u0131","_yoast_wpseo_title":"%%title%% %%page%%","_yoast_wpseo_metadesc":"\u00c7in\u2019in bilgisayar korsanl\u0131\u011f\u0131 yetenekleri ve hedeflerini a\u00e7\u0131\u011fa \u00e7\u0131karan bir tak\u0131m belgeler s\u0131zd\u0131. Barutsuz bir sava\u015f var ve siber uzayda oluyor.","_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"footnotes":"","_yoast_wpseo_focuskw_text_input":""},"categories":[8,519,8138],"tags":[8360,2304,8361],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>\u00c7in\u2019in Bilgisayar Korsanl\u0131\u011f\u0131 Yetenekleri Ortaya \u00c7\u0131kt\u0131<\/title>\n<meta name=\"description\" content=\"\u00c7in\u2019in bilgisayar korsanl\u0131\u011f\u0131 yetenekleri ve hedeflerini a\u00e7\u0131\u011fa \u00e7\u0131karan bir tak\u0131m belgeler s\u0131zd\u0131. Barutsuz bir sava\u015f var ve siber uzayda oluyor.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/epochtimestr.com\/index.php\/cinin-bilgisayar-korsanligi-yetenekleri-ortaya-cikti\" \/>\n<meta property=\"og:locale\" content=\"tr_TR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\u00c7in\u2019in Bilgisayar Korsanl\u0131\u011f\u0131 Yetenekleri Ortaya \u00c7\u0131kt\u0131\" \/>\n<meta property=\"og:description\" content=\"\u00c7in\u2019in bilgisayar korsanl\u0131\u011f\u0131 yetenekleri ve hedeflerini a\u00e7\u0131\u011fa \u00e7\u0131karan bir tak\u0131m belgeler s\u0131zd\u0131. Barutsuz bir sava\u015f var ve siber uzayda oluyor.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/epochtimestr.com\/index.php\/cinin-bilgisayar-korsanligi-yetenekleri-ortaya-cikti\" \/>\n<meta property=\"og:site_name\" content=\"The Epoch Times TR\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/theepochtimestr\" \/>\n<meta property=\"article:published_time\" content=\"2024-03-07T11:28:32+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-03-07T11:28:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/epochtimestr.com\/wp-content\/uploads\/2011y\/chinli-hackerlar-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"866\" \/>\n\t<meta property=\"og:image:height\" content=\"482\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Hatice Atmaca\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@TheEpochTimesTR\" \/>\n<meta name=\"twitter:site\" content=\"@TheEpochTimesTR\" \/>\n<meta name=\"twitter:label1\" content=\"Yazan:\" \/>\n\t<meta name=\"twitter:data1\" content=\"Hatice Atmaca\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tahmini okuma s\u00fcresi\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 dakika\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/epochtimestr.com\/index.php\/cinin-bilgisayar-korsanligi-yetenekleri-ortaya-cikti#article\",\"isPartOf\":{\"@id\":\"https:\/\/epochtimestr.com\/index.php\/cinin-bilgisayar-korsanligi-yetenekleri-ortaya-cikti\"},\"author\":{\"name\":\"Hatice Atmaca\",\"@id\":\"https:\/\/epochtimestr.com\/#\/schema\/person\/a515b4166e91977b7e9f483ceb142459\"},\"headline\":\"\u00c7in\u2019in Bilgisayar Korsanl\u0131\u011f\u0131 Yetenekleri Ortaya \u00c7\u0131kt\u0131\",\"datePublished\":\"2024-03-07T11:28:32+00:00\",\"dateModified\":\"2024-03-07T11:28:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/epochtimestr.com\/index.php\/cinin-bilgisayar-korsanligi-yetenekleri-ortaya-cikti\"},\"wordCount\":1482,\"publisher\":{\"@id\":\"https:\/\/epochtimestr.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/epochtimestr.com\/index.php\/cinin-bilgisayar-korsanligi-yetenekleri-ortaya-cikti#primaryimage\"},\"thumbnailUrl\":\"https:\/\/epochtimestr.com\/wp-content\/uploads\/2011y\/chinli-hackerlar-1.jpg\",\"keywords\":[\"\u00c7in\u2019in Bilgisayar Korsanl\u0131\u011f\u0131\",\"Hacker\",\"I-Soon\"],\"articleSection\":[\"\u00c7\u0130N\",\"ED\u0130T\u00d6R\u00dcN SE\u00c7\u0130M\u0130\",\"Man\u015fet\"],\"inLanguage\":\"tr\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/epochtimestr.com\/index.php\/cinin-bilgisayar-korsanligi-yetenekleri-ortaya-cikti\",\"url\":\"https:\/\/epochtimestr.com\/index.php\/cinin-bilgisayar-korsanligi-yetenekleri-ortaya-cikti\",\"name\":\"\u00c7in\u2019in Bilgisayar Korsanl\u0131\u011f\u0131 Yetenekleri Ortaya \u00c7\u0131kt\u0131\",\"isPartOf\":{\"@id\":\"https:\/\/epochtimestr.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/epochtimestr.com\/index.php\/cinin-bilgisayar-korsanligi-yetenekleri-ortaya-cikti#primaryimage\"},\"image\":{\"@id\":\"https:\/\/epochtimestr.com\/index.php\/cinin-bilgisayar-korsanligi-yetenekleri-ortaya-cikti#primaryimage\"},\"thumbnailUrl\":\"https:\/\/epochtimestr.com\/wp-content\/uploads\/2011y\/chinli-hackerlar-1.jpg\",\"datePublished\":\"2024-03-07T11:28:32+00:00\",\"dateModified\":\"2024-03-07T11:28:33+00:00\",\"description\":\"\u00c7in\u2019in bilgisayar korsanl\u0131\u011f\u0131 yetenekleri ve hedeflerini a\u00e7\u0131\u011fa \u00e7\u0131karan bir tak\u0131m belgeler s\u0131zd\u0131. Barutsuz bir sava\u015f var ve siber uzayda oluyor.\",\"inLanguage\":\"tr\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/epochtimestr.com\/index.php\/cinin-bilgisayar-korsanligi-yetenekleri-ortaya-cikti\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"tr\",\"@id\":\"https:\/\/epochtimestr.com\/index.php\/cinin-bilgisayar-korsanligi-yetenekleri-ortaya-cikti#primaryimage\",\"url\":\"https:\/\/epochtimestr.com\/wp-content\/uploads\/2011y\/chinli-hackerlar-1.jpg\",\"contentUrl\":\"https:\/\/epochtimestr.com\/wp-content\/uploads\/2011y\/chinli-hackerlar-1.jpg\",\"width\":866,\"height\":482},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/epochtimestr.com\/#website\",\"url\":\"https:\/\/epochtimestr.com\/\",\"name\":\"The Epoch Times TR\",\"description\":\"De\u011fi\u015fen D\u00fcnyam\u0131za Taze Bir Bak\u0131\u015f\",\"publisher\":{\"@id\":\"https:\/\/epochtimestr.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/epochtimestr.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"tr\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/epochtimestr.com\/#organization\",\"name\":\"The EpochTimes T\u00fcrkiye\",\"url\":\"https:\/\/epochtimestr.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"tr\",\"@id\":\"https:\/\/epochtimestr.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/epochtimestr.com\/wp-content\/uploads\/2011y\/ET-Logo-YG.jpg\",\"contentUrl\":\"https:\/\/epochtimestr.com\/wp-content\/uploads\/2011y\/ET-Logo-YG.jpg\",\"width\":346,\"height\":29,\"caption\":\"The EpochTimes T\u00fcrkiye\"},\"image\":{\"@id\":\"https:\/\/epochtimestr.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/theepochtimestr\",\"https:\/\/x.com\/TheEpochTimesTR\",\"https:\/\/www.instagram.com\/epochtimestr\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/epochtimestr.com\/#\/schema\/person\/a515b4166e91977b7e9f483ceb142459\",\"name\":\"Hatice Atmaca\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"tr\",\"@id\":\"https:\/\/epochtimestr.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/dd49aabd0aeaecbc0ecbce954119ae42?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/dd49aabd0aeaecbc0ecbce954119ae42?s=96&d=mm&r=g\",\"caption\":\"Hatice Atmaca\"},\"url\":\"https:\/\/epochtimestr.com\/index.php\/author\/hatice\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\u00c7in\u2019in Bilgisayar Korsanl\u0131\u011f\u0131 Yetenekleri Ortaya \u00c7\u0131kt\u0131","description":"\u00c7in\u2019in bilgisayar korsanl\u0131\u011f\u0131 yetenekleri ve hedeflerini a\u00e7\u0131\u011fa \u00e7\u0131karan bir tak\u0131m belgeler s\u0131zd\u0131. Barutsuz bir sava\u015f var ve siber uzayda oluyor.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/epochtimestr.com\/index.php\/cinin-bilgisayar-korsanligi-yetenekleri-ortaya-cikti","og_locale":"tr_TR","og_type":"article","og_title":"\u00c7in\u2019in Bilgisayar Korsanl\u0131\u011f\u0131 Yetenekleri Ortaya \u00c7\u0131kt\u0131","og_description":"\u00c7in\u2019in bilgisayar korsanl\u0131\u011f\u0131 yetenekleri ve hedeflerini a\u00e7\u0131\u011fa \u00e7\u0131karan bir tak\u0131m belgeler s\u0131zd\u0131. Barutsuz bir sava\u015f var ve siber uzayda oluyor.","og_url":"https:\/\/epochtimestr.com\/index.php\/cinin-bilgisayar-korsanligi-yetenekleri-ortaya-cikti","og_site_name":"The Epoch Times TR","article_publisher":"https:\/\/www.facebook.com\/theepochtimestr","article_published_time":"2024-03-07T11:28:32+00:00","article_modified_time":"2024-03-07T11:28:33+00:00","og_image":[{"width":866,"height":482,"url":"https:\/\/epochtimestr.com\/wp-content\/uploads\/2011y\/chinli-hackerlar-1.jpg","type":"image\/jpeg"}],"author":"Hatice Atmaca","twitter_card":"summary_large_image","twitter_creator":"@TheEpochTimesTR","twitter_site":"@TheEpochTimesTR","twitter_misc":{"Yazan:":"Hatice Atmaca","Tahmini okuma s\u00fcresi":"7 dakika"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/epochtimestr.com\/index.php\/cinin-bilgisayar-korsanligi-yetenekleri-ortaya-cikti#article","isPartOf":{"@id":"https:\/\/epochtimestr.com\/index.php\/cinin-bilgisayar-korsanligi-yetenekleri-ortaya-cikti"},"author":{"name":"Hatice Atmaca","@id":"https:\/\/epochtimestr.com\/#\/schema\/person\/a515b4166e91977b7e9f483ceb142459"},"headline":"\u00c7in\u2019in Bilgisayar Korsanl\u0131\u011f\u0131 Yetenekleri Ortaya \u00c7\u0131kt\u0131","datePublished":"2024-03-07T11:28:32+00:00","dateModified":"2024-03-07T11:28:33+00:00","mainEntityOfPage":{"@id":"https:\/\/epochtimestr.com\/index.php\/cinin-bilgisayar-korsanligi-yetenekleri-ortaya-cikti"},"wordCount":1482,"publisher":{"@id":"https:\/\/epochtimestr.com\/#organization"},"image":{"@id":"https:\/\/epochtimestr.com\/index.php\/cinin-bilgisayar-korsanligi-yetenekleri-ortaya-cikti#primaryimage"},"thumbnailUrl":"https:\/\/epochtimestr.com\/wp-content\/uploads\/2011y\/chinli-hackerlar-1.jpg","keywords":["\u00c7in\u2019in Bilgisayar Korsanl\u0131\u011f\u0131","Hacker","I-Soon"],"articleSection":["\u00c7\u0130N","ED\u0130T\u00d6R\u00dcN SE\u00c7\u0130M\u0130","Man\u015fet"],"inLanguage":"tr"},{"@type":"WebPage","@id":"https:\/\/epochtimestr.com\/index.php\/cinin-bilgisayar-korsanligi-yetenekleri-ortaya-cikti","url":"https:\/\/epochtimestr.com\/index.php\/cinin-bilgisayar-korsanligi-yetenekleri-ortaya-cikti","name":"\u00c7in\u2019in Bilgisayar Korsanl\u0131\u011f\u0131 Yetenekleri Ortaya \u00c7\u0131kt\u0131","isPartOf":{"@id":"https:\/\/epochtimestr.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/epochtimestr.com\/index.php\/cinin-bilgisayar-korsanligi-yetenekleri-ortaya-cikti#primaryimage"},"image":{"@id":"https:\/\/epochtimestr.com\/index.php\/cinin-bilgisayar-korsanligi-yetenekleri-ortaya-cikti#primaryimage"},"thumbnailUrl":"https:\/\/epochtimestr.com\/wp-content\/uploads\/2011y\/chinli-hackerlar-1.jpg","datePublished":"2024-03-07T11:28:32+00:00","dateModified":"2024-03-07T11:28:33+00:00","description":"\u00c7in\u2019in bilgisayar korsanl\u0131\u011f\u0131 yetenekleri ve hedeflerini a\u00e7\u0131\u011fa \u00e7\u0131karan bir tak\u0131m belgeler s\u0131zd\u0131. Barutsuz bir sava\u015f var ve siber uzayda oluyor.","inLanguage":"tr","potentialAction":[{"@type":"ReadAction","target":["https:\/\/epochtimestr.com\/index.php\/cinin-bilgisayar-korsanligi-yetenekleri-ortaya-cikti"]}]},{"@type":"ImageObject","inLanguage":"tr","@id":"https:\/\/epochtimestr.com\/index.php\/cinin-bilgisayar-korsanligi-yetenekleri-ortaya-cikti#primaryimage","url":"https:\/\/epochtimestr.com\/wp-content\/uploads\/2011y\/chinli-hackerlar-1.jpg","contentUrl":"https:\/\/epochtimestr.com\/wp-content\/uploads\/2011y\/chinli-hackerlar-1.jpg","width":866,"height":482},{"@type":"WebSite","@id":"https:\/\/epochtimestr.com\/#website","url":"https:\/\/epochtimestr.com\/","name":"The Epoch Times TR","description":"De\u011fi\u015fen D\u00fcnyam\u0131za Taze Bir Bak\u0131\u015f","publisher":{"@id":"https:\/\/epochtimestr.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/epochtimestr.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"tr"},{"@type":"Organization","@id":"https:\/\/epochtimestr.com\/#organization","name":"The EpochTimes T\u00fcrkiye","url":"https:\/\/epochtimestr.com\/","logo":{"@type":"ImageObject","inLanguage":"tr","@id":"https:\/\/epochtimestr.com\/#\/schema\/logo\/image\/","url":"https:\/\/epochtimestr.com\/wp-content\/uploads\/2011y\/ET-Logo-YG.jpg","contentUrl":"https:\/\/epochtimestr.com\/wp-content\/uploads\/2011y\/ET-Logo-YG.jpg","width":346,"height":29,"caption":"The EpochTimes T\u00fcrkiye"},"image":{"@id":"https:\/\/epochtimestr.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/theepochtimestr","https:\/\/x.com\/TheEpochTimesTR","https:\/\/www.instagram.com\/epochtimestr"]},{"@type":"Person","@id":"https:\/\/epochtimestr.com\/#\/schema\/person\/a515b4166e91977b7e9f483ceb142459","name":"Hatice Atmaca","image":{"@type":"ImageObject","inLanguage":"tr","@id":"https:\/\/epochtimestr.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/dd49aabd0aeaecbc0ecbce954119ae42?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/dd49aabd0aeaecbc0ecbce954119ae42?s=96&d=mm&r=g","caption":"Hatice Atmaca"},"url":"https:\/\/epochtimestr.com\/index.php\/author\/hatice"}]}},"_links":{"self":[{"href":"https:\/\/epochtimestr.com\/index.php\/wp-json\/wp\/v2\/posts\/150449"}],"collection":[{"href":"https:\/\/epochtimestr.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/epochtimestr.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/epochtimestr.com\/index.php\/wp-json\/wp\/v2\/users\/12379"}],"replies":[{"embeddable":true,"href":"https:\/\/epochtimestr.com\/index.php\/wp-json\/wp\/v2\/comments?post=150449"}],"version-history":[{"count":1,"href":"https:\/\/epochtimestr.com\/index.php\/wp-json\/wp\/v2\/posts\/150449\/revisions"}],"predecessor-version":[{"id":150451,"href":"https:\/\/epochtimestr.com\/index.php\/wp-json\/wp\/v2\/posts\/150449\/revisions\/150451"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/epochtimestr.com\/index.php\/wp-json\/wp\/v2\/media\/150450"}],"wp:attachment":[{"href":"https:\/\/epochtimestr.com\/index.php\/wp-json\/wp\/v2\/media?parent=150449"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/epochtimestr.com\/index.php\/wp-json\/wp\/v2\/categories?post=150449"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/epochtimestr.com\/index.php\/wp-json\/wp\/v2\/tags?post=150449"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}