{"id":4654,"date":"2015-09-22T11:25:38","date_gmt":"2015-09-22T11:25:38","guid":{"rendered":"https:\/\/ihs.com.tr\/blog\/?p=4654"},"modified":"2015-09-22T11:25:38","modified_gmt":"2015-09-22T11:25:38","slug":"apple-kotu-amacli-yazilim-bulasan-uygulamarini-kaldirdi","status":"publish","type":"post","link":"https:\/\/www.ihs.com.tr\/blog\/apple-kotu-amacli-yazilim-bulasan-uygulamarini-kaldirdi\/","title":{"rendered":"Apple k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m bula\u015fan uygulamar\u0131n\u0131 kald\u0131rd\u0131"},"content":{"rendered":"<p><span style=\"font-size: 14pt;\"><strong>Apple<\/strong> b\u00fcy\u00fck \u00e7apl\u0131 bir g\u00fcvenlik ihlalinin tespit edilmesi \u00fczerine k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m bula\u015fm\u0131\u015f uygulamalar\u0131n\u0131 App Store\u2019dan kald\u0131rd\u0131. <strong>XcodeGhost<\/strong> adl\u0131 k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m, uygulama geli\u015ftiricilerini iOS ve Mac yaz\u0131l\u0131mlar\u0131 olu\u015fturmak \u00fczere kullan\u0131lan yaz\u0131l\u0131m olan <strong>Xcode<\/strong>\u2019un de\u011fi\u015ftirilmi\u015f bir versiyonunu kullanmaya ikna ederek bir\u00e7ok uygulamaya bula\u015fm\u0131\u015ft\u0131.<\/span><\/p>\n<p><span style=\"font-size: 14pt;\">Apple bas\u0131n s\u00f6zc\u00fcs\u00fc <strong>Christine Monaghan<\/strong> 20 Eyl\u00fcl Pazar g\u00fcn\u00fc <a href=\"http:\/\/www.reuters.com\/article\/2015\/09\/20\/us-apple-china-malware-idUSKCN0RK0ZB20150920?#tt\" target=\"_blank\" rel=\"nofollow\">Reuters<\/a>\u2019a yollad\u0131\u011f\u0131 e-postada \u201cBu sahte yaz\u0131l\u0131mla olu\u015fturuldu\u011funu \u00f6\u011frendi\u011fimiz uygulamalar\u0131 App Store\u2019dan kald\u0131rd\u0131k. Geli\u015ftiricilerimizle g\u00f6r\u00fc\u015ferek uygulamalar\u0131n\u0131 yeniden olu\u015fturmalar\u0131 i\u00e7in Xcode\u2019un do\u011fru versiyonunu kullanmalar\u0131n\u0131 sa\u011fl\u0131yoruz,\u201d diyor.<\/span><\/p>\n<p><span style=\"font-size: 14pt;\"><a href=\"https:\/\/www.ihs.com.tr\/blog\/wp-content\/uploads\/2015\/09\/XCodeGhost-Code-Snippet.png\" data-rel=\"penci-gallery-image-content\" ><img decoding=\"async\" class=\"alignnone size-medium wp-image-4658\" src=\"https:\/\/www.ihs.com.tr\/blog\/wp-content\/uploads\/2015\/09\/XCodeGhost-Code-Snippet-300x248.png\" alt=\"XCodeGhost Code Snippet\" width=\"300\" height=\"248\" srcset=\"https:\/\/www.ihs.com.tr\/blog\/wp-content\/uploads\/2015\/09\/XCodeGhost-Code-Snippet-300x248.png 300w, https:\/\/www.ihs.com.tr\/blog\/wp-content\/uploads\/2015\/09\/XCodeGhost-Code-Snippet.png 849w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><\/span><\/p>\n<p><span style=\"font-size: 14pt;\">Bu k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m\u0131n bula\u015ft\u0131\u011f\u0131 di\u011fer \u00f6nemli uygulamalar aras\u0131nda \u00c7ince mesajla\u015fma uygulamas\u0131 <strong>WeChat<\/strong>, pop\u00fcler kartvizit taray\u0131c\u0131s\u0131 <strong>CamCard<\/strong> ve \u00c7inli Uber\u2019in rakibi <strong>Didi Chuxing<\/strong> de bulunuyor. 600 milyonun \u00fczerinde ayl\u0131k aktif kullan\u0131c\u0131s\u0131 olan WeChat 19 Eyl\u00fcl tarihli <a href=\"http:\/\/blog.wechat.com\/2015\/09\/19\/fixed-security-flaw-in-wechat-v6-2-5-for-ios\/\" target=\"_blank\" rel=\"nofollow\">blog yaz\u0131s\u0131nda<\/a> k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m\u0131n yaln\u0131zca uygulaman\u0131n 10 Eyl\u00fcl\u2019de piyasaya s\u00fcr\u00fclen bir \u00f6nceki versiyonunu etkiledi\u011fini, ondan iki g\u00fcn sonra \u00e7\u0131kan mevcut versiyonun temiz oldu\u011funu duyurdu.<\/span><\/p>\n<p><span style=\"font-size: 14pt;\">G\u00fcvenlik \u015firketi <strong>Palo Alto Networks<\/strong>, XcodeGhost \u00fczerinde yapt\u0131\u011f\u0131 inceleme sonucunda yaz\u0131l\u0131m\u0131n kimlik avc\u0131l\u0131\u011f\u0131 sorgulamalar\u0131na sahte cevaplar \u00fcretebildi\u011fini, URL\u2019ler a\u00e7abildi\u011fini ve clipboard verisini okuyup yazabildi\u011fini tespit etti. En az 39 uygulamay\u0131 etkileyen bu k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m Palo Alto Networks taraf\u0131ndan \u201c<strong>\u00e7ok zararl\u0131 ve tehlikeli<\/strong>\u201d olarak nitelendiriliyor.<\/span><\/p>\n<p><span style=\"font-size: 14pt;\">Hen\u00fcz herhangi bir veri h\u0131rs\u0131zl\u0131\u011f\u0131 oldu\u011fu y\u00f6n\u00fcnde bir bulgu yok ama XcodeGhost CIA\u2019in de kullanmay\u0131 d\u00fc\u015f\u00fcnd\u00fc\u011f\u00fc bir y\u00f6ntem olan Apple kod incelemesinin devre d\u0131\u015f\u0131 b\u0131rak\u0131larak yasal geli\u015ftiricilerin k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlar i\u00e7in bir vekt\u00f6r olarak nas\u0131l kullan\u0131ld\u0131\u011f\u0131n\u0131 g\u00f6stermesi bak\u0131m\u0131ndan endi\u015fe verici bulunuyor. Palo Alto\u2019dan <strong>Ryan Olson<\/strong> Xcode\u2019un zararl\u0131 versiyonunun <strong>\u00c7in<\/strong>\u2019deki bir sunucudan geldi\u011fini ve App Store\u2019daki yasal ve bedava versiyondan daha h\u0131zl\u0131 indirildi\u011fi i\u00e7in tercih edilmi\u015f olabilece\u011fini s\u00f6yl\u00fcyor.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Apple b\u00fcy\u00fck \u00e7apl\u0131 bir g\u00fcvenlik ihlalinin tespit edilmesi \u00fczerine k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m bula\u015fm\u0131\u015f uygulamalar\u0131n\u0131 App Store\u2019dan kald\u0131rd\u0131. XcodeGhost adl\u0131 k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m,&hellip;<\/p>\n","protected":false},"author":3,"featured_media":4657,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-4654","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-haberler"],"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/www.ihs.com.tr\/blog\/wp-json\/wp\/v2\/posts\/4654","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ihs.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ihs.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ihs.com.tr\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ihs.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=4654"}],"version-history":[{"count":4,"href":"https:\/\/www.ihs.com.tr\/blog\/wp-json\/wp\/v2\/posts\/4654\/revisions"}],"predecessor-version":[{"id":4683,"href":"https:\/\/www.ihs.com.tr\/blog\/wp-json\/wp\/v2\/posts\/4654\/revisions\/4683"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.ihs.com.tr\/blog\/wp-json\/wp\/v2\/media\/4657"}],"wp:attachment":[{"href":"https:\/\/www.ihs.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=4654"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ihs.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=4654"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ihs.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=4654"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}