{"id":11542,"date":"2023-07-12T15:05:03","date_gmt":"2023-07-12T12:05:03","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=11542"},"modified":"2023-07-12T15:05:03","modified_gmt":"2023-07-12T12:05:03","slug":"doublefinger-crypto-stealer-2","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/doublefinger-crypto-stealer-2\/11542\/","title":{"rendered":"\u00c7ifte tehlike: kripto h\u0131rs\u0131z\u0131 DoubleFinger"},"content":{"rendered":"<p>Kripto para birimleri, s\u0131radan <a href=\"https:\/\/www.kaspersky.com\/blog\/bitcoin-cloud-mining-scam\/47616\/\" target=\"_blank\" rel=\"noopener nofollow\">Bitcoin madencilik doland\u0131r\u0131c\u0131l\u0131klar\u0131ndan<\/a> <a href=\"https:\/\/www.kaspersky.com\/blog\/top-5-cryptocurrency-heists\/45945\/\" target=\"_blank\" rel=\"noopener nofollow\">y\u00fcz milyonlarca dolarl\u0131k \u015fa\u015f\u0131las\u0131 kripto para soygunlar\u0131na<\/a> kadar her t\u00fcrden su\u00e7 planlar\u0131n\u0131n sald\u0131r\u0131lar\u0131 alt\u0131nda.<\/p>\n<p>\u00a0<\/p>\n<p>Kripto para birimi sahipleri i\u00e7in neredeyse her k\u00f6\u015fe ba\u015f\u0131nda tehlikeler var. Yak\u0131n zamanda, ger\u00e7ek kripto c\u00fczdanlar\u0131 gibi g\u00f6r\u00fcn\u00fcp \u00e7al\u0131\u015ft\u0131\u011f\u0131 halde nihayetinde t\u00fcm paran\u0131z\u0131 \u00e7alan <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/fake-trezor-hardware-crypto-wallet\/11437\/\" target=\"_blank\" rel=\"noopener\">sahte kripto c\u00fczdanlar\u0131ndan<\/a> s\u00f6z etmi\u015ftik. \u015eimdi <a href=\"https:\/\/securelist.com\/doublefinger-loader-delivering-greetingghoul-cryptocurrency-stealer\/109982\/\" target=\"_blank\" rel=\"noopener\">uzmanlar\u0131m\u0131z ke\u015ffetti<\/a> kar\u015f\u0131m\u0131zda tamamen yeni bir tehdit var: kripto h\u0131rs\u0131z\u0131 GreetingGhoul ve uzaktan eri\u015fim Truva At\u0131 Remcos adl\u0131 arkada\u015flar\u0131n\u0131 da yan\u0131nda getiren DoubleFinger adl\u0131 y\u00fckleyiciyi kullanan geli\u015fmi\u015f bir sald\u0131r\u0131. Ama \u00f6nce s\u0131rayla gidelim.<\/p>\n<p>\u00a0<\/p>\n<h2>DoubleFinger nas\u0131l GreetingGhoul adl\u0131 h\u0131rs\u0131z\u0131 y\u00fckl\u00fcyor<\/h2>\n<p>Uzmanlar\u0131m\u0131z, sald\u0131r\u0131n\u0131n y\u00fcksek teknik seviyesine ve <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/apt-advanced-persistent-threats\/\" target=\"_blank\" rel=\"noopener\">geli\u015fmi\u015f bir kal\u0131c\u0131 tehdit (APT)<\/a> sald\u0131r\u0131s\u0131n\u0131 and\u0131ran \u00e7ok a\u015famal\u0131 yap\u0131s\u0131na dikkat \u00e7ekti. Bir DoubleFinger vir\u00fcs\u00fc k\u00f6t\u00fc ama\u00e7l\u0131 bir PIF dosyas\u0131 i\u00e7eren bir e-posta ile geliyor. Al\u0131c\u0131 eki a\u00e7\u0131nca olaylar \u015fu \u015fekilde geli\u015fiyor:<\/p>\n<p>\u00a0<\/p>\n<ol>\n<li><strong> A\u015fama<\/strong>. DoubleFinger, resim payla\u015f\u0131m platformu Imgur.com \u00fczerinden PNG bi\u00e7iminde bir dosya indiren bir <a href=\"https:\/\/en.wikipedia.org\/wiki\/Shellcode\" target=\"_blank\" rel=\"noopener nofollow\">shellcode<\/a> y\u00fcr\u00fct\u00fcyor. Ama bu asl\u0131nda bir resim de\u011fil: Dosyada sald\u0131r\u0131n\u0131n sonraki a\u015famalar\u0131nda kullan\u0131lacak olan DoubleFinger bile\u015fenleri \u015fifreli bir \u015fekilde bulunuyor. Bunlar aras\u0131nda sald\u0131r\u0131n\u0131n ikinci a\u015famas\u0131nda kullan\u0131lan bir y\u00fcklenici, me\u015fru bir java.exe dosyas\u0131 ve d\u00f6rd\u00fcnc\u00fc a\u015fama i\u00e7in kullan\u0131lacak bir di\u011fer PNG dosyas\u0131 mevcut.<\/li>\n<\/ol>\n<p>\u00a0<\/p>\n<ol start=\"2\">\n<li><strong> A\u015fama<\/strong>. DoubleFinger ikinci a\u015fama y\u00fckleyicisi yukar\u0131da bahsedilen me\u015fru java.exe dosyas\u0131 kullan\u0131larak \u00e7al\u0131\u015ft\u0131r\u0131l\u0131yor, ard\u0131ndan bu y\u00fckleyici DoubleFinger\u2019\u0131n \u00fc\u00e7\u00fcnc\u00fc a\u015famas\u0131n\u0131 indiren, \u015fifresini \u00e7\u00f6zen ve ba\u015flatan ba\u015fka bir shellcode y\u00fcr\u00fct\u00fcyor.<\/li>\n<\/ol>\n<p>\u00a0<\/p>\n<ol start=\"3\">\n<li><strong> A\u015fama<\/strong>. Bu a\u015famada, DoubleFinger bilgisayar\u0131n\u0131zda y\u00fckl\u00fc g\u00fcvenlik yaz\u0131l\u0131mlar\u0131n\u0131 a\u015fmak i\u00e7in bir dizi eylem sergiliyor. Daha sonra, y\u00fckleyici a\u00e7\u0131l\u0131yor ve ilk a\u015famada s\u00f6z\u00fc edilen PNG dosyas\u0131nda bulunan d\u00f6rd\u00fcnc\u00fc a\u015famay\u0131 ba\u015flat\u0131yor. Bu arada, bu PNG dosyas\u0131nda sadece k\u00f6t\u00fc ama\u00e7l\u0131 kod de\u011fil, ayn\u0131 zamanda k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131ma ad\u0131n\u0131 veren resim de bulunuyor:<\/li>\n<\/ol>\n<div id=\"attachment_11543\" style=\"width: 713px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-11543\" class=\"wp-image-11543 size-full\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2023\/07\/12145304\/doublefinger-crypto-stealer-01.png\" alt=\"DoubleFinger taraf\u0131ndan d\u00f6rd\u00fcnc\u00fc a\u015fama k\u00f6t\u00fc ama\u00e7l\u0131 koduyla birlikte kullan\u0131lan PNG dosyas\u0131\" width=\"703\" height=\"698\"><p id=\"caption-attachment-11543\" class=\"wp-caption-text\">DoubleFinger\u2019\u0131n ad\u0131n\u0131 ald\u0131\u011f\u0131 iki parmak<\/p>\n<p><\/p><\/div>\n<ol start=\"4\">\n<li><strong> A\u015fama<\/strong>. Bu ad\u0131mda DoubleFinger, <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/process-doppelganging\/\" target=\"_blank\" rel=\"noopener\">Process Doppelg\u00e4nging<\/a> ad\u0131 verilen bir teknik kullanarak be\u015finci a\u015famay\u0131 ba\u015flat\u0131yor, b\u00f6ylece me\u015fru s\u00fcreci be\u015finci a\u015fama g\u00f6rev y\u00fck\u00fcn\u00fc i\u00e7eren de\u011fi\u015ftirilmi\u015f bir s\u00fcre\u00e7le de\u011fi\u015ftiriyor.<\/li>\n<\/ol>\n<p>\u00a0<\/p>\n<ol start=\"5\">\n<li><strong> A\u015fama<\/strong>. Yukar\u0131daki t\u00fcm manip\u00fclasyonlar\u0131n ard\u0131ndan DoubleFinger as\u0131l tasar\u0131m amac\u0131n\u0131 yerine getirmeye ba\u015fl\u0131yor: ba\u015fka bir PNG dosyas\u0131 y\u00fckleyip a\u00e7\u0131yor. Bu dosyada nihai g\u00f6rev y\u00fck\u00fc bulunuyor. Bu, kendisini sisteme y\u00fckleyen ve G\u00f6rev Planlay\u0131c\u0131da her g\u00fcn belli bir saatte \u00e7al\u0131\u015fmak \u00fczere i\u015faretlenen GreetingGhoul adl\u0131 kripto h\u0131rs\u0131z\u0131.<\/li>\n<\/ol>\n<p>\u00a0<\/p>\n<h2>GreetingGhoul kripto c\u00fczdanlar\u0131 nas\u0131l \u00e7al\u0131yor<\/h2>\n<p>DoubleFinger adl\u0131 y\u00fckleyici i\u015fini bitirdikten sonra GreetingGhoul oyuna giriyor. Bu k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m\u0131n iki tamamlay\u0131c\u0131 bile\u015feni var:<\/p>\n<ol>\n<li>sistemdeki kripto c\u00fczdan uygulamalar\u0131n\u0131 alg\u0131layan ve ki\u015fisel verileri (\u00f6zel anahtarlar ve kurtarma terimleri) sald\u0131rganlara aktara bir bile\u015fen;<\/li>\n<li>kripto para birimi uygulamalar\u0131n\u0131n aray\u00fcz\u00fcn\u00fcn \u00fczerine binip kullan\u0131c\u0131 girdilerinin \u00f6n\u00fcn\u00fc kesen bir bile\u015fen.<\/li>\n<\/ol>\n<div id=\"attachment_11544\" style=\"width: 708px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-11544\" class=\"wp-image-11544 size-full\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2023\/07\/12145521\/doublefinger-crypto-stealer-02.png\" alt=\"GreetingGhoul kripto para birimi uygulamalar\u0131n\u0131n aray\u00fcz\u00fcn\u00fc ge\u00e7ersiz k\u0131l\u0131yor\" width=\"698\" height=\"1000\"><p id=\"caption-attachment-11544\" class=\"wp-caption-text\">GreetingGhoul\u2019un kripto c\u00fczdan uygulamalar\u0131n\u0131n aray\u00fcz\u00fc \u00fczerine binmesinin bir \u00f6rne\u011fi<\/p><\/div>\n<p>\u00a0<\/p>\n<p>Sonu\u00e7 olarak, DoubleFinger\u2019\u0131n ard\u0131ndaki siber su\u00e7lular kurban\u0131n kripto c\u00fczdanlar\u0131n\u0131n kontrol\u00fcn ele al\u0131p paralar\u0131n\u0131 \u00e7ekebiliyorlar.<\/p>\n<p>Uzmanlar\u0131m\u0131z DoubleFinger\u2019\u0131n yapt\u0131\u011f\u0131 baz\u0131 de\u011fi\u015fiklikleri ke\u015ffettiler. Bunlardan baz\u0131lar\u0131, ek bir y\u00f6ntem olarak, (siber su\u00e7lu \u00e7evrelerinde) olduk\u00e7a yayg\u0131n olan <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/remote-access-trojan-rat\/\" target=\"_blank\" rel=\"noopener\">uzaktan eri\u015fim Truva At\u0131<\/a> Remcos\u2019u vir\u00fcs bula\u015fan sisteme y\u00fckl\u00fcyor. Bunun amac\u0131 do\u011frudan ad\u0131nda gizli: <strong>REM<\/strong>ote (Uzaktan) <strong>CO<\/strong>ntrol (Kontrol) ve <strong>S<\/strong>urveillance (G\u00f6zetim). Di\u011fer bir deyi\u015fle, Remcos siber su\u00e7lular\u0131n t\u00fcm kullan\u0131c\u0131 hareketlerini g\u00f6zlemesini ve vir\u00fcsl\u00fc sistemin tam kontrol\u00fcn\u00fc ele ge\u00e7irmesini sa\u011fl\u0131yor.<\/p>\n<p>\u00a0<\/p>\n<h2>Kripto c\u00fczdanlar\u0131n\u0131z nas\u0131l korunur<\/h2>\n<p>Kripto para birimleri siber su\u00e7lular\u0131n ilgisini \u00e7ekmeye devam ediyor, bu nedenle t\u00fcm kripto yat\u0131r\u0131mc\u0131lar\u0131n\u0131n g\u00fcvenlik konusunda s\u0131k\u0131 d\u00fc\u015f\u00fcnmesi gerekiyor. Bunu demi\u015fken, <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/4-key-steps-to-protect-cryptocurrency-properly\/11394\/\" target=\"_blank\" rel=\"noopener\">Kripto yat\u0131r\u0131mlar\u0131n\u0131 korumak: G\u00fcvenli\u011fe giden 4 \u00f6nemli ad\u0131m<\/a> ba\u015fl\u0131kl\u0131 son yaz\u0131m\u0131z\u0131 okuman\u0131z\u0131 \u00f6neririz. Konunun d\u00f6rt temel noktas\u0131 \u015furada:<\/p>\n<ul>\n<li><strong>Doland\u0131r\u0131c\u0131l\u0131\u011fa kar\u015f\u0131 uyan\u0131k olun.<\/strong> Kripto para d\u00fcnyas\u0131 her t\u00fcrden doland\u0131r\u0131c\u0131yla doludur, bu nedenle bubi tuzaklar\u0131na kar\u015f\u0131 s\u00fcrekli olarak \u00e7evreyi taray\u0131n ve her \u015feyi titizlikle iki kez kontrol edin.<\/li>\n<li><strong>T\u00fcm yumurtalar\u0131n\u0131z\u0131 ayn\u0131 sepete koymay\u0131n.<\/strong> S\u0131cak (mevcut i\u015flemler i\u00e7in) ve so\u011fuk (uzun d\u00f6nemli yat\u0131r\u0131mlar i\u00e7in) c\u00fczdanlardan olu\u015fan bir kombinasyon kullan\u0131n.<\/li>\n<li><strong>Siber su\u00e7lular\u0131n <\/strong><a href=\"https:\/\/www.kaspersky.com.tr\/blog\/five-threats-hardware-crypto-wallets\/11425\/\" target=\"_blank\" rel=\"noopener\">so\u011fuk kripto c\u00fczdanlar\u0131na nas\u0131l sald\u0131rabilece\u011fini<\/a> \u00f6\u011frenin.<\/li>\n<li><strong>Sadece resmi kaynaklardan sat\u0131n al\u0131n:<\/strong> Donan\u0131m c\u00fczdanlar\u0131n\u0131 \u00fcreticinin web sitesi ya da yetkili bayiler gibi resmi ve g\u00fcvenilir kaynaklardan sat\u0131n al\u0131n, b\u00f6ylece <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/fake-trezor-hardware-crypto-wallet\/11437\/\" target=\"_blank\" rel=\"noopener\">sahte kripto c\u00fczdan<\/a> sat\u0131n almaktan ka\u00e7\u0131nabilirsiniz.<\/li>\n<li><strong>Kurcalama i\u015faretlerini kontrol edin:<\/strong> Yeni bir donan\u0131m c\u00fczdan\u0131 kullanmadan \u00f6nce \u00e7izik, yap\u0131\u015ft\u0131r\u0131c\u0131 ya da e\u015fle\u015fmeyen bile\u015fenler gibi kurcalama i\u015faretlerini kontrol edin.<\/li>\n<li><strong>\u00dcretici yaz\u0131l\u0131m\u0131n\u0131 do\u011frulay\u0131n:<\/strong> Donan\u0131m c\u00fczdan\u0131 \u00fczerindeki \u00fcretici yaz\u0131l\u0131m\u0131n\u0131n me\u015fru ve g\u00fcncel olup olmad\u0131\u011f\u0131n\u0131 her zaman do\u011frulay\u0131n. Bunu \u00fcreticinin web sitesindeki en son s\u00fcr\u00fcm\u00fc kontrol ederek yapabilirsiniz.<\/li>\n<li><strong>Donan\u0131m c\u00fczdan\u0131n\u0131z\u0131n kurtarma terimini asla bir bilgisayara girmeyin.<\/strong> Hi\u00e7bir donan\u0131m c\u00fczdan\u0131 sat\u0131c\u0131s\u0131 bunu sizden istemez.<\/li>\n<li><strong>Parolalar\u0131, anahtarlar\u0131 ve kurtarma terimlerini koruyun.<\/strong> G\u00fc\u00e7l\u00fc ve benzersiz parolalar kullan\u0131n, <a href=\"https:\/\/www.kaspersky.com.tr\/password-manager?icid=tr_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____kpm___\" target=\"_blank\" rel=\"noopener\">bunlar\u0131 g\u00fcvenle depolay\u0131n<\/a>, ve elbette <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/cryptocurrency-giveaway-scam\/10691\/\" target=\"_blank\" rel=\"noopener\">ki\u015fisel anahtarlar\u0131n\u0131z\u0131 ya da kurtarma terimlerinizi asla<\/a> ve hi\u00e7bir ko\u015fulda ba\u015fkalar\u0131na vermeyin.<\/li>\n<li><strong>Kendinizi koruyun.<\/strong> Kripto c\u00fczdanlar\u0131n\u0131z\u0131 y\u00f6netmek i\u00e7in kulland\u0131\u011f\u0131n\u0131z t\u00fcm cihazlara <a href=\"https:\/\/www.kaspersky.com.tr\/premium?icid=tr_bb2023-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kprem___\" target=\"_blank\" rel=\"noopener\">g\u00fcvenilir koruma<\/a> y\u00fcklemeyi ihmal etmeyin.<input type=\"hidden\" class=\"category_for_banner\" value=\"ksec-crypto\"><input type=\"hidden\" class=\"category_for_banner\" value=\"premium-generic\"><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Geli\u015fmi\u015f k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m DoubleFinger\u2019\u0131n kripto para c\u00fczdanlar\u0131na g\u00f6z koyan GreetingGhoul adl\u0131 h\u0131rs\u0131z program\u0131 nas\u0131l indirdi\u011fini a\u00e7\u0131kl\u0131yoruz.<\/p>\n","protected":false},"author":2706,"featured_media":11500,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1287,1351],"tags":[1098,612,2629,2628,1500,1933,537,1986],"class_list":{"0":"post-11542","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"category-threats","9":"tag-blok-zinciri","10":"tag-dolandiricilik","11":"tag-hirsizlar","12":"tag-kripto-cuzdanlari","13":"tag-kripto-para-birimleri","14":"tag-sahtecilik","15":"tag-tehditler","16":"tag-truva-atlari"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/doublefinger-crypto-stealer-2\/11542\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/doublefinger-crypto-stealer\/25795\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/doublefinger-crypto-stealer\/21236\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/doublefinger-crypto-stealer\/10753\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/doublefinger-crypto-stealer\/28489\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/doublefinger-crypto-stealer\/26094\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/doublefinger-crypto-stealer\/26408\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/doublefinger-crypto-stealer\/28901\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/doublefinger-crypto-stealer\/27805\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/doublefinger-crypto-stealer\/35546\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/doublefinger-crypto-stealer\/20700\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/doublefinger-crypto-stealer\/21384\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/doublefinger-crypto-stealer\/30219\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/doublefinger-crypto-stealer\/33997\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/doublefinger-crypto-stealer\/26410\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/doublefinger-crypto-stealer\/32104\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/doublefinger-crypto-stealer\/31787\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/kripto-para-birimleri\/","name":"kripto para birimleri"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/11542","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/2706"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=11542"}],"version-history":[{"count":4,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/11542\/revisions"}],"predecessor-version":[{"id":11548,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/11542\/revisions\/11548"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/11500"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=11542"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=11542"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=11542"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}