{"id":10960,"date":"2022-08-31T13:33:08","date_gmt":"2022-08-31T10:33:08","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=10960"},"modified":"2022-08-31T13:34:34","modified_gmt":"2022-08-31T10:34:34","slug":"wannacry-history-lessons","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/wannacry-history-lessons\/10960\/","title":{"rendered":"WannaCry kronolojisi"},"content":{"rendered":"<p>WannaCry kripto solucan salg\u0131n\u0131 12 May\u0131s 2017\u2019de ba\u015flad\u0131. Kurbanlar birdenbire ekranlar\u0131nda \u015fu mesajla kar\u015f\u0131la\u015ft\u0131:<\/p>\n<div id=\"attachment_10961\" style=\"width: 1034px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-10961\" class=\"wp-image-10961 size-full\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2022\/08\/31133032\/wannacry-hsitory-lessons-ransom-note.jpg\" alt=\"\" width=\"1024\" height=\"774\"><p id=\"caption-attachment-10961\" class=\"wp-caption-text\">Vir\u00fcsl\u00fc bilgisayar ekran\u0131ndaki Wannacry fidye mesaj\u0131. <a href=\"https:\/\/securelist.com\/wannacry-ransomware-used-in-widespread-attacks-all-over-the-world\/78351\/\" target=\"_blank\" rel=\"noopener\">Kaynak<\/a>.<\/p><\/div>\n<p>\u00a0<\/p>\n<p>Hemen ard\u0131ndan t\u00fcm dosyalar\u0131n\u0131n \u015fifrelendi\u011fini ve .doc ya da .mp3 gibi t\u00fcm normal dosya uzant\u0131lar\u0131na .wnry uzant\u0131s\u0131n\u0131n eklendi\u011fini fark ettiler. K\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m, kurbanlar\u0131n mesaj\u0131 okumadan pencereyi kapatma ihtimaline kar\u015f\u0131 masa\u00fcst\u00fc duvar ka\u011f\u0131d\u0131n\u0131 da a\u015fa\u011f\u0131daki mesaj\u0131 i\u00e7eren bir g\u00f6rselle de\u011fi\u015ftirmi\u015fti:<\/p>\n<div id=\"attachment_10962\" style=\"width: 890px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-10962\" class=\"wp-image-10962 size-full\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2022\/08\/31133108\/wannacry-hsitory-lessons-wallpaper.jpg\" alt=\"\" width=\"880\" height=\"451\"><p id=\"caption-attachment-10962\" class=\"wp-caption-text\">Duvar ka\u011f\u0131d\u0131 uyar\u0131s\u0131. <a href=\"https:\/\/securelist.com\/wannacry-ransomware-used-in-widespread-attacks-all-over-the-world\/78351\/\" target=\"_blank\" rel=\"noopener\">Kaynak<\/a>.<\/p><\/div>\n<p>\u00a0<\/p>\n<p>Program, dosyalar\u0131n \u015fifresini \u00e7\u00f6zmek i\u00e7in sald\u0131rganlar\u0131n c\u00fczdan\u0131na Bitcoin cinsinden 300 USD g\u00f6nderilmesini istiyordu. Daha sonras\u0131nda bu miktar 600 USD\u2019ye \u00e7\u0131kt\u0131. H\u0131zla yay\u0131lan internet solucan\u0131 bir g\u00fcn i\u00e7inde d\u00fcnya \u00e7ap\u0131nda 200.000\u2019den fazla sisteme bula\u015ft\u0131. Etkilenenler aras\u0131nda hem ev bilgisayarlar\u0131 hem de hastaneler, ula\u015f\u0131m \u015firketleri, bankac\u0131l\u0131k hizmetleri ve cep telefonu operat\u00f6rleri gibi kurumsal a\u011flar bulunuyordu. Tayvanl\u0131 \u00e7ip \u00fcreticisi TSMC, kurumsal cihazlara kitlesel olarak vir\u00fcs bula\u015fmas\u0131 nedeniyle \u00fcretimi ask\u0131ya almak zorunda kald\u0131.<\/p>\n<h2>Nas\u0131l oldu?<\/h2>\n<p>Wannacry\u2019\u0131n \u015fim\u015fek h\u0131z\u0131nda yay\u0131l\u0131m\u0131, Windows\u2019un Sunucu \u0130leti Blo\u011fu (SMB) protokol\u00fcndeki g\u00fcvenlik a\u00e7\u0131klar\u0131 sayesinde m\u00fcmk\u00fcn oldu. Bu protokol yerel bir a\u011f \u00fczerinden dosya al\u0131\u015fveri\u015fi yapmaya yar\u0131yordu. G\u00fcvenlik a\u00e7\u0131klar\u0131, yama uygulanmam\u0131\u015f bilgisayarlarda SMBv1 protokol\u00fc arac\u0131l\u0131\u011f\u0131yla bir istek kullan\u0131larak rastgele kod y\u00fcr\u00fctmeye olanak sa\u011flad\u0131. SMBv1, SMB\u2019nin 1990\u2019lar\u0131n ba\u015f\u0131ndan beri kullan\u0131lan \u00e7ok eski bir s\u00fcr\u00fcm\u00fcyd\u00fc. 2006\u2019dan itibaren Windows\u2019ta varsay\u0131lan olarak kullan\u0131lan protokol s\u00fcr\u00fcm\u00fc SMBv2 ya da \u00fczeriydi, fakat eski yaz\u0131l\u0131m \u00e7al\u0131\u015ft\u0131ran bilgisayarla uyumluluk ad\u0131na eski protokol deste\u011fi de s\u00fcrd\u00fcr\u00fclm\u00fc\u015ft\u00fc.<\/p>\n<p>Mart 2017\u2019de (WannaCry salg\u0131n\u0131ndan neredeyse iki ay \u00f6nce) bu sorun ke\u015ffedilip <a href=\"https:\/\/docs.microsoft.com\/en-us\/security-updates\/securitybulletins\/2017\/ms17-010\" target=\"_blank\" rel=\"noopener nofollow\">g\u00fcncellemeler yay\u0131nland\u0131\u011f\u0131nda<\/a> SMBv1 g\u00fcvenlik a\u00e7\u0131klar\u0131 Vista\u2019dan o s\u0131rada yeni olan Windows 10\u2019a kadar t\u00fcm yama uygulanmam\u0131\u015f i\u015fletim sistemi s\u00fcr\u00fcmlerini etkiliyordu. Eski Windows XP ve Windows 8 de risk alt\u0131ndayd\u0131. Windows, 2014\u2019de desteklemeyi b\u0131rakm\u0131\u015f olmas\u0131na ra\u011fmen Windows XP i\u00e7in yama yay\u0131nlad\u0131. SMBv1\u2019deki g\u00fcvenlik a\u00e7\u0131klar\u0131n\u0131 hedef alan k\u00f6t\u00fcye kullan\u0131ma yayg\u0131n olarak EternalBlue kod ad\u0131 verilmi\u015fti, bunun sebeplerinden ayr\u0131ca bahsederiz.<\/p>\n<p>Ancak \u00f6ncelikle bir ba\u015fka kod ad\u0131na de\u011finmeliyiz: <a href=\"https:\/\/en.wikipedia.org\/wiki\/DoublePulsar\" target=\"_blank\" rel=\"noopener nofollow\">DoublePulsar<\/a>. Bu, sald\u0131r\u0131lan sistemlerde arka kap\u0131 yaratmak i\u00e7in kullan\u0131lan k\u00f6t\u00fc ama\u00e7l\u0131 kodun ad\u0131yd\u0131. Hem EternalBlue k\u00f6t\u00fcye kullan\u0131m\u0131 hem de DoublePulsar arka kap\u0131s\u0131, s\u0131rayla 2017\u2019nin Mart ve Nisan aylar\u0131nda anonim ShadowBrokers grubu taraf\u0131ndan <a href=\"https:\/\/arstechnica.com\/information-technology\/2017\/04\/nsa-leaking-shadow-brokers-just-dumped-its-most-damaging-release-yet\/\" target=\"_blank\" rel=\"noopener nofollow\">halka duyuruldu<\/a>. Bunlar\u0131n, ba\u015fka k\u00f6t\u00fc ama\u00e7l\u0131 ara\u00e7larla birlikte ABD Ulusal G\u00fcvenlik Te\u015fkilat\u0131\u2019n\u0131n bir biriminden \u00e7al\u0131nd\u0131\u011f\u0131 iddia ediliyordu. WannaCry solucan\u0131 iki bile\u015feni de kulland\u0131: \u00d6nce EternalBlue k\u00f6t\u00fcye kullan\u0131m\u0131yla k\u00f6t\u00fc ama\u00e7l\u0131 kod y\u00fcr\u00fctme becerisini sa\u011fl\u0131yor, ard\u0131ndan y\u00fck\u00fc devreye sokmak i\u00e7in \u00f6zelle\u015ftirilmi\u015f bir DoublePulsar arac\u0131 kullanarak dosyalar\u0131 \u015fifreliyor ve fidye notunu g\u00f6r\u00fcnt\u00fcl\u00fcyordu.<\/p>\n<p>WannaCry dosya \u015fifrelemenin yan\u0131 s\u0131ra, anonim Tor a\u011f\u0131 \u00fczerinden sald\u0131rganlar\u0131n C2 sunucusuyla ileti\u015fim kuruyor ve rastgele IP adreslerine k\u00f6t\u00fc ama\u00e7l\u0131 istekler g\u00f6ndererek kendi kendini yay\u0131yordu. Solucan\u0131n inan\u0131lmaz yay\u0131lma h\u0131z\u0131na da bu yol a\u00e7t\u0131. Saatte on binlerce sistem enfekte oldu!<\/p>\n<h2>Acil durdurma anahtar\u0131<\/h2>\n<p>Ayn\u0131 g\u00fcn, 12 May\u0131s\u2019ta, o s\u0131rada tan\u0131nmayan bir siber g\u00fcvenlik blogger\u2019\u0131 olan MalwareTech, WannaCry kodunu derinlemesine inceledi. Kodun i\u00e7erisinde &lt;\u00e7ok_uzun_ve_anlams\u0131z_bir_karakter_dizisi&gt;.com \u015feklinde bir adres ke\u015ffetti. Alan ad\u0131 kay\u0131tl\u0131 de\u011fildi. Bunun \u00fczerine MalwareTech, vir\u00fcsl\u00fc bilgisayarlar\u0131n C2 sunucular\u0131yla daha fazla ileti\u015fim kurmak i\u00e7in bu adresi kullanaca\u011f\u0131n\u0131 d\u00fc\u015f\u00fcnerek adresi kendine kaydetti. Ancak bunun yerine, bu hamleyle istemeden WannaCry salg\u0131n\u0131n\u0131 durdurmu\u015f oldu.<\/p>\n<p>12 May\u0131s ak\u015fam\u0131 itibar\u0131yla, alan ad\u0131 kaydedildikten sonra WannaCry\u2019\u0131n hala bilgisayarlara bula\u015fmay\u0131 s\u00fcrd\u00fcrd\u00fc\u011f\u00fc <a href=\"https:\/\/www.malwaretech.com\/2017\/05\/how-to-accidentally-stop-a-global-cyber-attacks.html\" target=\"_blank\" rel=\"noopener nofollow\">ortaya \u00e7\u0131ksa da<\/a> art\u0131k bu bilgisayarlardaki verileri \u015fifrelemiyordu. K\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m bu noktaya kadar esas\u0131nda alan ad\u0131na eri\u015fmeye \u00e7al\u0131\u015f\u0131yor, alan ad\u0131 mevcut de\u011filse dosyalar\u0131 \u015fifreliyordu. Art\u0131k alan ad\u0131 mevcut oldu\u011fu i\u00e7in t\u00fcm k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m kopyalar\u0131 bir sebeple \u00e7al\u0131\u015fmay\u0131 durdurmu\u015ftu. Peki yarat\u0131c\u0131lar\u0131 bu fidye yaz\u0131l\u0131m\u0131n\u0131 durdurmay\u0131 neden bu kadar kolay yapm\u0131\u015flard\u0131? MalwareTech\u2019e g\u00f6re bu, ba\u015far\u0131s\u0131z bir otomatik korumal\u0131 alan analizi yan\u0131ltma giri\u015fimiydi.<\/p>\n<p>Korumal\u0131 alanlar \u015fu \u015fekilde i\u015fler: K\u00f6t\u00fc ama\u00e7l\u0131 bir program, davran\u0131\u015f\u0131n\u0131n ger\u00e7ek zamanl\u0131 olarak analiz edilebilmesi i\u00e7in izole edilmi\u015f sanal bir ortamda y\u00fcr\u00fct\u00fcl\u00fcr. Bu ya vir\u00fcs analistleri taraf\u0131ndan manuel olarak ya da otomatik \u015fekilde ger\u00e7ekle\u015ftirilen yayg\u0131n bir prosed\u00fcrd\u00fcr. Sanal ortam, k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m\u0131n eksiksiz \u015fekilde y\u00fcr\u00fct\u00fclmesi ve ara\u015ft\u0131rmac\u0131lara t\u00fcm s\u0131rlar\u0131n\u0131 g\u00f6stermesi i\u00e7in tasarlanm\u0131\u015ft\u0131r. K\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m bir dosya isterse korumal\u0131 alan bu dosya varm\u0131\u015f gibi davran\u0131r. K\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m \u00e7evrimi\u00e7i olarak bir siteye eri\u015firse sanal ortam bu siteden bir yan\u0131t verilmi\u015f gibi davran\u0131r. Belki de WannaCry\u2019\u0131n yazarlar\u0131 korumal\u0131 alan analizini kand\u0131rabileceklerini d\u00fc\u015f\u00fcnm\u00fc\u015ft\u00fc: Solucan, varolmad\u0131\u011f\u0131 bilinen bir alan ad\u0131na eri\u015fmeye \u00e7al\u0131\u015f\u0131r ve bir yan\u0131t al\u0131rsa bu, kurban\u0131n ger\u00e7ek olmad\u0131\u011f\u0131 ve k\u00f6t\u00fc ama\u00e7l\u0131 aktivitenin gizlenmesi gerekti\u011fi anlam\u0131na gelecekti.<\/p>\n<p>B\u00fcy\u00fck olas\u0131l\u0131kla ak\u0131l edemedikleri \u015fey ise solucan\u0131n yaln\u0131zca \u00fc\u00e7 saat i\u00e7erisinde par\u00e7alar\u0131na ayr\u0131l\u0131p \u201cgizli\u201d alan ad\u0131n\u0131n bulunaca\u011f\u0131 ve kaydedilece\u011fiydi.<\/p>\n<h2>MalwareTech: \u201c\u0130nterneti kurtaran hacker\u201d<\/h2>\n<p>MalwareTech\u2019in ger\u00e7ek kimli\u011fini gizlemek i\u00e7in ge\u00e7erli nedenleri vard\u0131. Ger\u00e7ek ad\u0131 Marcus Hutchins\u2019ti. WannaCry salg\u0131n\u0131 s\u0131ras\u0131nda yaln\u0131zca 23 ya\u015f\u0131ndayd\u0131. Hen\u00fcz lisedeyken \u201ck\u00f6t\u00fc arkada\u015flar edinmi\u015f\u201d ve adi siber su\u00e7larla ilgili forumlarda tak\u0131lmaya ba\u015flam\u0131\u015ft\u0131. Kabahatleri aras\u0131nda taray\u0131c\u0131 parolalar\u0131n\u0131 \u00e7almaya yarayan bir program yazmak vard\u0131. Torrent\u2019ler \u00fcst\u00fcnden kullan\u0131c\u0131lara bula\u015fan bir program da yazm\u0131\u015f ve bunu kullanarak 8000 tane g\u00fc\u00e7l\u00fc botnet olu\u015fturmu\u015ftu.<\/p>\n<p>2000\u2019lerin ba\u015f\u0131nda daha b\u00fcy\u00fck bir hacker taraf\u0131ndan fark edilerek Kronos k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m\u0131n\u0131n bir par\u00e7as\u0131n\u0131 yazmaya davet edilmi\u015fti. Marcus yapt\u0131\u011f\u0131 i\u015f kar\u015f\u0131l\u0131\u011f\u0131nda gri borsadaki her sat\u0131\u015f \u00fcst\u00fcnden komisyon almaya ba\u015flad\u0131. Ba\u015fka siber su\u00e7lular k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m\u0131 sat\u0131n alarak kendi sald\u0131r\u0131lar\u0131n\u0131 ger\u00e7ekle\u015ftiriyorlard\u0131. Hutchins en az iki defa su\u00e7 ortaklar\u0131na ger\u00e7ek ad\u0131n\u0131 ve \u0130ngiltere\u2019deki ev adresini verdi\u011fini s\u00f6yledi. Bu bilgi daha sonra ABD kolluk kuvvetlerinin eline ge\u00e7ti.<\/p>\n<p>\u201c\u0130nterneti kurtaran adam\u201d art\u0131k anonim de\u011fildi. \u0130ki g\u00fcn sonra gazeteciler kap\u0131s\u0131na dayanmaya ba\u015flad\u0131. Gazetecilerden birinin k\u0131z\u0131 Marcus\u2019la ayn\u0131 okula gidiyordu ve Marcus\u2019un MalwareTech takma ad\u0131n\u0131 kulland\u0131\u011f\u0131n\u0131 biliyordu. \u0130lk ba\u015fta bas\u0131nla konu\u015fmaktan ka\u00e7\u0131nsa da sonunda Associated Press\u2019e bir r\u00f6portaj verdi. A\u011fustos 2017\u2019de Las Vegas\u2019taki me\u015fhur DEF CON hacker konferans\u0131na onur konu\u011fu olarak davet edildi.<\/p>\n<p>Burada tutukland\u0131. Birka\u00e7 ayl\u0131k ev hapsinden ve Kronos\u2019la ilgili su\u00e7lamalar\u0131 k\u0131smen kabul ettikten sonra cezas\u0131 ertelenerek ucuz atlatt\u0131. <em>Wired<\/em> dergisine verdi\u011fi b\u00fcy\u00fck bir <a href=\"https:\/\/www.wired.com\/story\/confessions-marcus-hutchins-hacker-who-saved-the-internet\/\" target=\"_blank\" rel=\"noopener nofollow\">r\u00f6portajda<\/a> su\u00e7 ge\u00e7mi\u015finden pi\u015fman oldu\u011fu bir hata olarak bahsetti. S\u00f6yledi\u011fine g\u00f6re t\u00fcm bunlar\u0131 paradan \u00e7ok becerileriyle g\u00f6steri\u015f yapmak ve yeralt\u0131 d\u00fcnyas\u0131nda tan\u0131nmak i\u00e7in yapm\u0131\u015ft\u0131. WannaCry s\u0131ras\u0131nda iki y\u0131ld\u0131r siber su\u00e7lularla hi\u00e7bir temas\u0131 olmam\u0131\u015ft\u0131, MalwareTech blogu uzmanlar taraf\u0131ndan okunuyor ve be\u011feniliyordu.<\/p>\n<h2>Bu son salg\u0131n m\u0131yd\u0131?<\/h2>\n<p>K\u0131sa s\u00fcre \u00f6nce 2000\u2019lerin ba\u015f\u0131nda b\u00fcy\u00fck bir salg\u0131na yol a\u00e7an ILOVEYOU solucan\u0131 hakk\u0131nda <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/cybersecurity-history-iloveyou\/10916\/\" target=\"_blank\" rel=\"noopener\">yazm\u0131\u015ft\u0131k<\/a>. ILOVEYOU\u2019n\u0131n WannaCry ile \u00e7ok fazla ortak y\u00f6n\u00fc vard\u0131. Her iki solucan da Windows\u2019ta halihaz\u0131rda yamas\u0131 bulunan bir g\u00fcvenlik a\u00e7\u0131\u011f\u0131 ile yay\u0131lm\u0131\u015ft\u0131. Ancak salg\u0131nlar ortaya \u00e7\u0131kt\u0131\u011f\u0131nda t\u00fcm bilgisayarlar hen\u00fcz g\u00fcncellenmemi\u015fti. Sonu\u00e7lar\u0131, d\u00fcnya \u00e7ap\u0131nda y\u00fcz binlerce kurban, \u015firketlerin milyonlarca dolar zarar etmesi ve kullan\u0131c\u0131 verilerinin kaybolmas\u0131 oldu.<\/p>\n<p>Aralar\u0131nda farkl\u0131l\u0131klar da vard\u0131. WannaCry\u2019\u0131n yarat\u0131c\u0131lar\u0131 (Kuzey Koreli oldu\u011fu tahmin edilen bir grup) herkese a\u00e7\u0131k haz\u0131r hackleme ara\u00e7lar\u0131n\u0131 kullanm\u0131\u015ft\u0131. ILOVEYOU yaln\u0131zca birka\u00e7 dosya silmi\u015fken WannaCry t\u00fcm belgelerini kaybeden kullan\u0131c\u0131lardan fidye talep etmi\u015fti. Neyse ki WannaCry\u2019\u0131n yazarlar\u0131 kodun i\u00e7ine kendilerine kar\u015f\u0131 i\u015fleyecek bir acil durdurma anahtar\u0131 ekleyecek kadar nazikti. Bu salg\u0131n\u0131n hikayesi ayn\u0131 zamanda bir ba\u015fkas\u0131n\u0131n i\u015fini \u00e7ok k\u0131sa s\u00fcrede analiz ederek bir savunma mekanizmas\u0131 geli\u015ftirebilen k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m avc\u0131lar\u0131n\u0131n dehas\u0131yla da ilgili bir hikaye.<\/p>\n<p>WannaCry salg\u0131n\u0131 onlarca \u015firket taraf\u0131ndan incelendi ve medyan\u0131n oda\u011f\u0131nda yer ald\u0131, bu a\u00e7\u0131dan bir istisna say\u0131l\u0131r. G\u00fcn\u00fcm\u00fczde belirli bir i\u015fletmeye y\u00f6nelik fidye yaz\u0131l\u0131m\u0131 sald\u0131r\u0131s\u0131n\u0131n \u00f6n sayfalarda kendine yer bulmas\u0131 pek olas\u0131 de\u011fil. Ger\u00e7e\u011fi konu\u015fmak gerekirse b\u00f6yle bir durumda sald\u0131rganla yaln\u0131z ba\u015f\u0131na m\u00fccadele etmeniz gerekecek. Bu y\u00fczden \u015fantaja boyun e\u011fmeyip hasar kontrol\u00fc s\u0131ras\u0131nda <a href=\"https:\/\/www.kaspersky.com\/enterprise-security\/managed-detection-and-response?icid=tr_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener nofollow\">en iyi uzmanlarla<\/a> \u00e7al\u0131\u015fmak \u00e7ok \u00f6nemli. WannaCry \u00f6rne\u011finin de g\u00f6sterdi\u011fi gibi, son derece karma\u015f\u0131k ve etkili sald\u0131r\u0131lar\u0131n bile zay\u0131f bir noktas\u0131 vard\u0131r.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kesb-ransomware\">\n","protected":false},"excerpt":{"rendered":"<p>G\u00fcvenik devrimi: 2017&#8217;nin geni\u015f \u00f6l\u00e7ekli fakat k\u0131sa \u00f6m\u00fcrl\u00fc fidye yaz\u0131l\u0131m\u0131 salg\u0131n\u0131<\/p>\n","protected":false},"author":665,"featured_media":10965,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1726,1194],"tags":[591,2545,2578,2362,1227],"class_list":{"0":"post-10960","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-enterprise","8":"category-business","9":"tag-fidye-yazilimi","10":"tag-kripto-kotu-amacli-yazilim","11":"tag-kronoloji","12":"tag-para-sizdirma","13":"tag-wannacry"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/wannacry-history-lessons\/10960\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/wannacry-history-lessons\/24498\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/wannacry-history-lessons\/19964\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/wannacry-history-lessons\/26942\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/wannacry-history-lessons\/24858\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/wannacry-history-lessons\/27547\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/wannacry-history-lessons\/45234\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/wannacry-history-lessons\/19342\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/wannacry-history-lessons\/19960\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/wannacry-history-lessons\/29192\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/wannacry-history-lessons\/32662\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/wannacry-history-lessons\/30903\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/wannacry-history-lessons\/30611\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/kronoloji\/","name":"kronoloji"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/10960","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/665"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=10960"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/10960\/revisions"}],"predecessor-version":[{"id":10964,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/10960\/revisions\/10964"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/10965"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=10960"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=10960"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=10960"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}