{"id":14248,"date":"2026-02-12T21:04:25","date_gmt":"2026-02-12T18:04:25","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=14248"},"modified":"2026-02-12T21:04:25","modified_gmt":"2026-02-12T18:04:25","slug":"practical-value-of-cyberthreat-attribution","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/practical-value-of-cyberthreat-attribution\/14248\/","title":{"rendered":"Siber tehditlerin kayna\u011f\u0131n\u0131n belirlenmesinin \u00f6nemi"},"content":{"rendered":"<p>Her siber g\u00fcvenlik uzman\u0131, \u015firketlerini vuran k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m\u0131n arkas\u0131nda kimin oldu\u011funu tam olarak bulmaya \u00e7al\u0131\u015fman\u0131n \u00e7abaya de\u011fer oldu\u011funu d\u00fc\u015f\u00fcnmez. Tipik bir olay ara\u015ft\u0131rma algoritmas\u0131 \u015fu \u015fekildedir: Analist \u015f\u00fcpheli bir dosya bulur \u2192 antivir\u00fcs program\u0131 bunu yakalayamam\u0131\u015fsa, test etmek i\u00e7in bir sanal ortama yerle\u015ftirir \u2192 baz\u0131 k\u00f6t\u00fc ama\u00e7l\u0131 faaliyetleri do\u011frular \u2192 karma de\u011ferini engellenenler listesine ekler \u2192 kahve molas\u0131na \u00e7\u0131kar. Bunlar, bir\u00e7ok siber g\u00fcvenlik uzman\u0131n\u0131n ba\u015fvurdu\u011fu ad\u0131mlard\u0131r, \u00f6zellikle de uyar\u0131larla bo\u011fulmu\u015f durumdayken veya karma\u015f\u0131k bir sald\u0131r\u0131y\u0131 ad\u0131m ad\u0131m \u00e7\u00f6zmek i\u00e7in gerekli adli becerilere sahip olmad\u0131klar\u0131nda. Ancak, hedefli bir sald\u0131r\u0131 ile kar\u015f\u0131 kar\u015f\u0131ya kald\u0131\u011f\u0131n\u0131zda, bu yakla\u015f\u0131m felakete giden tek y\u00f6nl\u00fc bir bilettir. Neden mi? Okumaya devam edin.<\/p>\n<p>Bir sald\u0131rgan ciddi bir ama\u00e7 i\u00e7in sald\u0131r\u0131yorsa, nadiren tek bir sald\u0131r\u0131 vekt\u00f6r\u00fcne ba\u011fl\u0131 kal\u0131r. K\u00f6t\u00fc ama\u00e7l\u0131 dosyan\u0131n \u00e7ok a\u015famal\u0131 bir sald\u0131r\u0131da rol\u00fcn\u00fc \u00e7oktan oynam\u0131\u015f olma ve art\u0131k sald\u0131rgan i\u00e7in neredeyse hi\u00e7bir i\u015fe yaramama ihtimali y\u00fcksektir. Bu arada, sald\u0131rgan \u00e7oktan kurumsal altyap\u0131ya derinlemesine s\u0131zm\u0131\u015f ve tamamen farkl\u0131 bir ara\u00e7 setiyle \u00e7al\u0131\u015fmakla me\u015fgul durumdad\u0131r. Tehdidi tamamen ortadan kald\u0131rmak i\u00e7in g\u00fcvenlik ekibi, sald\u0131r\u0131 zincirinin tamam\u0131n\u0131 ortaya \u00e7\u0131karmak ve etkisiz hale getirmek zorundad\u0131r.<\/p>\n<p>Ancak bu; sald\u0131rganlar ger\u00e7ek bir hasara yol a\u00e7madan \u00f6nce, nas\u0131l h\u0131zl\u0131 ve etkili bir \u015fekilde yap\u0131labilir? Bir yol, ba\u011flama derinlemesine dalmakt\u0131r. Bir uzman tek bir dosyay\u0131 analiz ederek; \u015firketine kimlerin sald\u0131rd\u0131\u011f\u0131n\u0131 tam olarak belirleyebilir, belirli bir grubun kulland\u0131\u011f\u0131 di\u011fer ara\u00e7lar\u0131 ve taktikleri h\u0131zl\u0131 bir \u015fekilde bulabilir ve ard\u0131ndan altyap\u0131y\u0131 ilgili tehditlere kar\u015f\u0131 tarayabilir. Bunun i\u00e7in pek \u00e7ok tehdit istihbarat\u0131 arac\u0131 mevcuttur, ancak size <a href=\"https:\/\/www.kaspersky.com.tr\/enterprise-security\/threat-intelligence-subscription?icid=tr_kdailyplacehold_acq_ona_smm__onl_b2b_kdaily_wpplaceholder_sm-team___kti____3efa0d2912edc528\" target=\"_blank\" rel=\"noopener\">Kaspersky Threat Intelligence Portal<\/a> kullanarak nas\u0131l \u00e7al\u0131\u015ft\u0131\u011f\u0131n\u0131 g\u00f6sterece\u011fim.<\/p>\n<h2>Atf\u0131n neden \u00f6nemli oldu\u011funa dair pratik bir \u00f6rnek<\/h2>\n<p>Diyelim ki, ke\u015ffetti\u011fimiz bir k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m\u0131 bir tehdit istihbarat\u0131 portal\u0131na y\u00fckledik ve bu yaz\u0131l\u0131m\u0131n genellikle <em>MysterySnail<\/em> grubu taraf\u0131ndan kullan\u0131ld\u0131\u011f\u0131n\u0131 \u00f6\u011frendik. Bu bize asl\u0131nda ne anlat\u0131yor? Elimizdeki bilgileri inceleyelim:<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2026\/02\/12204616\/practical-value-of-cyberthreat-attribution-EN-MysterySnail-1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-14252 aligncenter size-full\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2026\/02\/12204616\/practical-value-of-cyberthreat-attribution-EN-MysterySnail-1.png\" alt=\"MysterySnail grubuna dair bilgiler\" width=\"2696\" height=\"1292\"><\/a><\/p>\n<p>\u00d6ncelikle, bu sald\u0131rganlar hem Rusya hem de Mo\u011folistan\u2019daki devlet kurumlar\u0131n\u0131 hedef al\u0131yorlar. Genellikle casusluk faaliyetlerine odaklanan \u00c7ince konu\u015fan bir grup. Profiline g\u00f6re, altyap\u0131da bir yer edinip, \u00e7al\u0131nmaya de\u011fer bir \u015fey bulana kadar ortal\u0131kta g\u00f6r\u00fcnm\u00fcyorlar. Ayr\u0131ca, genellikle <em>CVE-2021-40449<\/em> g\u00fcvenlik a\u00e7\u0131\u011f\u0131n\u0131 kulland\u0131klar\u0131n\u0131 da biliyoruz. Bu ne t\u00fcr bir g\u00fcvenlik a\u00e7\u0131\u011f\u0131?<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2026\/02\/12204719\/practical-value-of-cyberthreat-attribution-EN-CVE-2021-40449.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-14253 aligncenter size-full\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2026\/02\/12204719\/practical-value-of-cyberthreat-attribution-EN-CVE-2021-40449.png\" alt=\"CVE-2021-40449 g\u00fcvenlik a\u00e7\u0131\u011f\u0131na dair bilgiler\" width=\"2696\" height=\"1418\"><\/a><\/p>\n<p>G\u00f6rd\u00fc\u011f\u00fcm\u00fcz gibi, bu bir ayr\u0131cal\u0131k y\u00fckseltme g\u00fcvenlik a\u00e7\u0131\u011f\u0131d\u0131r, yani hackerlar altyap\u0131ya s\u0131zd\u0131ktan sonra kullan\u0131l\u0131r. Bu g\u00fcvenlik a\u00e7\u0131\u011f\u0131 y\u00fcksek \u00f6nem derecesine sahiptir ve yayg\u0131n olarak k\u00f6t\u00fcye kullan\u0131lmaktad\u0131r. Peki, hangi yaz\u0131l\u0131mlar ger\u00e7ekten savunmas\u0131zd\u0131r?<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2026\/02\/12204752\/practical-value-of-cyberthreat-attribution-EN-Vulnerable-software-2.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-14254 aligncenter size-full\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2026\/02\/12204752\/practical-value-of-cyberthreat-attribution-EN-Vulnerable-software-2.png\" alt=\"Savunmas\u0131z yaz\u0131l\u0131mlar\" width=\"2144\" height=\"1478\"><\/a><\/p>\n<p>Cevap: Microsoft Windows. Bu a\u00e7\u0131\u011f\u0131 gideren yaman\u0131n ger\u00e7ekten y\u00fcklendi\u011fini iki kez kontrol etme zaman\u0131. Peki, g\u00fcvenlik a\u00e7\u0131\u011f\u0131 d\u0131\u015f\u0131nda, hackerlar hakk\u0131nda ba\u015fka ne biliyoruz? G\u00f6r\u00fcn\u00fc\u015fe g\u00f6re, a\u011f yap\u0131land\u0131rmalar\u0131n\u0131 kontrol etmek i\u00e7in tuhaf bir y\u00f6ntem kullan\u0131yorlar: 2ip.ru adl\u0131 halka a\u00e7\u0131k siteye ba\u011flan\u0131yorlar:<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2026\/02\/12204957\/practical-value-of-cyberthreat-attribution-EN-details.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-14255 aligncenter size-full\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2026\/02\/12204957\/practical-value-of-cyberthreat-attribution-EN-details.png\" alt=\"Teknik ayr\u0131nt\u0131lar\" width=\"2146\" height=\"228\"><\/a><\/p>\n<p>B\u00f6ylece, bu t\u00fcr davran\u0131\u015flar\u0131 i\u015faretlemek i\u00e7in SIEM\u2019e bir ili\u015fkilendirme kural\u0131 eklemek mant\u0131kl\u0131d\u0131r.<\/p>\n<p>\u015eimdi, bu grubu daha ayr\u0131nt\u0131l\u0131 olarak incelemek ve SIEM izleme i\u00e7in ek g\u00fcvenlik ihlali g\u00f6stergeleri (IoC\u2019ler) ile kullan\u0131ma haz\u0131r YARA kurallar\u0131 (k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlar\u0131 tan\u0131mlamak i\u00e7in kullan\u0131lan yap\u0131land\u0131r\u0131lm\u0131\u015f metin a\u00e7\u0131klamalar\u0131) toplamak i\u00e7in do\u011fru zaman. Bu, kurumsal altyap\u0131ya \u00e7oktan s\u0131zm\u0131\u015f olabilecek bu canavar\u0131n t\u00fcm uzant\u0131lar\u0131n\u0131 takip etmemize ve tekrar girmeye \u00e7al\u0131\u015ft\u0131klar\u0131nda onlar\u0131 h\u0131zl\u0131 bir \u015fekilde durdurmam\u0131za yard\u0131mc\u0131 olacakt\u0131r.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2026\/02\/12205041\/practical-value-of-cyberthreat-attribution-EN-Repots-1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-14256 aligncenter size-full\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2026\/02\/12205041\/practical-value-of-cyberthreat-attribution-EN-Repots-1.png\" alt=\"Ek MysterySnail raporlar\u0131\" width=\"2700\" height=\"1396\"><\/a><\/p>\n<p>Kaspersky Threat Intelligence Portal, MysterySnail sald\u0131r\u0131lar\u0131 hakk\u0131nda \u00e7ok say\u0131da ek rapor sunar ve her bir rapor, IoC\u2019lerin ve YARA kurallar\u0131n\u0131n bir listesini i\u00e7erir. Bu YARA kurallar\u0131 t\u00fcm u\u00e7 noktalar\u0131 taramak i\u00e7in kullan\u0131labilir ve bu IoC\u2019ler s\u00fcrekli izleme i\u00e7in SIEM\u2019e eklenebilir. Bu arada, raporlar\u0131 inceleyerek bu sald\u0131rganlar\u0131n veri s\u0131zd\u0131rma i\u015flemlerini nas\u0131l ger\u00e7ekle\u015ftirdiklerini ve genellikle ne t\u00fcr verileri arad\u0131klar\u0131n\u0131 g\u00f6relim. Art\u0131k sald\u0131r\u0131y\u0131 \u00f6nlemek i\u00e7in somut ad\u0131mlar atabiliriz.<\/p>\n<p>Ve i\u015fte bu \u015fekilde, MysterySnail, altyap\u0131 art\u0131k sizi bulmak ve an\u0131nda yan\u0131t vermek i\u00e7in ayarland\u0131. Di\u011fer bir de\u011fi\u015fle art\u0131k casusluk yapmaya son!<\/p>\n<h2><a name=\"_Toc256000012\"><\/a>K\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m at\u0131f y\u00f6ntemleri<\/h2>\n<p>Belirli y\u00f6ntemlere ge\u00e7meden \u00f6nce, bir \u015feyi netle\u015ftirmemiz gerekiyor: Atf\u0131n ger\u00e7ekten i\u015fe yaramas\u0131 i\u00e7in sa\u011flanan tehdit istihbarat\u0131n\u0131n, tehdit akt\u00f6rleri taraf\u0131ndan kullan\u0131lan taktikler, teknikler ve prosed\u00fcrler (TTP\u2019ler) hakk\u0131nda kapsaml\u0131 bir bilgi taban\u0131na ihtiyac\u0131 vard\u0131r. Bu veri tabanlar\u0131n\u0131n kapsam\u0131 ve kalitesi, sat\u0131c\u0131lar aras\u0131nda b\u00fcy\u00fck farkl\u0131l\u0131klar g\u00f6sterebilir. Bizim durumumuzda, arac\u0131m\u0131z\u0131 geli\u015ftirmeden \u00f6nce, y\u0131llarca \u00e7e\u015fitli sald\u0131r\u0131 kampanyalar\u0131nda bilinen gruplar\u0131 takip ederek onlar\u0131n TTP\u2019lerini kaydettik ve bug\u00fcn de bu veri taban\u0131n\u0131 aktif olarak g\u00fcncellemeye devam ediyoruz.<\/p>\n<p>TTP veri taban\u0131 kurulduktan sonra, a\u015fa\u011f\u0131daki at\u0131f y\u00f6ntemleri uygulanabilir:<\/p>\n<ol>\n<li>Dinamik at\u0131f: Belirli dosyalar\u0131n dinamik analizi yoluyla TTP\u2019leri tan\u0131mlama, ard\u0131ndan bu TTP k\u00fcmesini bilinen hack gruplar\u0131n\u0131n TTP\u2019leriyle kar\u015f\u0131la\u015ft\u0131rma<\/li>\n<li>Teknik at\u0131f: Belirli dosyalar ile belirli hack gruplar\u0131n\u0131n k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlar\u0131nda kulland\u0131klar\u0131 bilinen kod par\u00e7alar\u0131 aras\u0131nda kod \u00e7ak\u0131\u015fmalar\u0131 bulma<\/li>\n<\/ol>\n<h3>Dinamik at\u0131f<\/h3>\n<p>Dinamik analiz s\u0131ras\u0131nda TTP\u2019leri tan\u0131mlamak nispeten kolayd\u0131r; asl\u0131nda, bu i\u015flevsellik uzun s\u00fcredir t\u00fcm modern sanal alanlar\u0131n temel bir \u00f6zelli\u011fidir. Do\u011fal olarak, t\u00fcm sanal ortamlar\u0131m\u0131z bir k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m \u00f6rne\u011finin dinamik analizi s\u0131ras\u0131nda TTP\u2019leri de tan\u0131mlar:<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2026\/02\/12205351\/practical-value-of-cyberthreat-attribution-EN-Matrix.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-14257 aligncenter size-full\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2026\/02\/12205351\/practical-value-of-cyberthreat-attribution-EN-Matrix.png\" alt=\"Bir k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m \u00f6rne\u011finin TTP'leri\" width=\"2700\" height=\"1420\"><\/a><\/p>\n<p>Bu y\u00f6ntemin \u00f6z\u00fc, MITRE ATT&amp;CK \u00e7er\u00e7evesini kullanarak k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m faaliyetlerini kategorize etmektir. Bir sandbox raporu genellikle tespit edilen TTP\u2019lerin bir listesini i\u00e7erir. Bu veriler son derece yararl\u0131 olmakla birlikte, belirli bir gruba tam anlam\u0131yla atfedilebilmesi i\u00e7in yeterli de\u011fildir. Sadece bu y\u00f6ntemi kullanarak bir sald\u0131r\u0131n\u0131n faillerini tespit etmeye \u00e7al\u0131\u015fmak, eski Hint atas\u00f6z\u00fcndeki <a href=\"https:\/\/en.wikipedia.org\/wiki\/Blind_men_and_an_elephant\" target=\"_blank\" rel=\"noopener nofollow\">k\u00f6r adamlar ve fil<\/a> hikayesine benzer: G\u00f6zleri ba\u011fl\u0131 insanlar filin farkl\u0131 yerlerine dokunarak, sadece bu dokunu\u015flardan \u00f6nlerinde ne oldu\u011funu anlamaya \u00e7al\u0131\u015f\u0131rlar. Filin g\u00f6vdesine hortumuna dokunan adam onun bir y\u0131lan oldu\u011funu d\u00fc\u015f\u00fcn\u00fcr; yan taraf\u0131na dokunan, onun bir duvar oldu\u011fundan emindir ve hikaye b\u00f6yle devam eder.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2026\/02\/12205420\/practical-value-of-cyberthreat-attribution-Elefant-1.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-14258 aligncenter size-full\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2026\/02\/12205420\/practical-value-of-cyberthreat-attribution-Elefant-1.jpg\" alt=\"K\u00f6r adamlar ve bir fil\" width=\"1152\" height=\"864\"><\/a><\/p>\n<h3>Teknik at\u0131f<\/h3>\n<p>\u0130kinci at\u0131f y\u00f6ntemi, statik kod analizi ile ger\u00e7ekle\u015ftirilir (ancak bu t\u00fcr at\u0131flar\u0131n her zaman sorunlu oldu\u011funu unutmay\u0131n). Buradaki temel fikir, belirli benzersiz \u00f6zelliklere g\u00f6re, birbiriyle biraz \u00e7ak\u0131\u015fan k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m dosyalar\u0131n\u0131 bile k\u00fcmelemektir. Analiz ba\u015flamadan \u00f6nce, k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m \u00f6rne\u011fi par\u00e7alara ayr\u0131lmal\u0131d\u0131r. Mesele \u015fu ki, bilgilendirici ve yararl\u0131 par\u00e7alar\u0131n yan\u0131 s\u0131ra, kurtar\u0131lan kodda \u00e7ok fazla g\u00fcr\u00fclt\u00fc vard\u0131r. At\u0131f algoritmas\u0131 bu bilgilendirici olmayan gereksiz bilgileri dikkate al\u0131rsa, herhangi bir k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m \u00f6rne\u011fi \u00e7ok say\u0131da g\u00fcvenilir dosyayla benzer hale gelir ve kaliteli at\u0131f yapma imkan\u0131 ortadan kalkar. \u00d6te yandan, yaln\u0131zca yararl\u0131 par\u00e7alara dayal\u0131 olarak k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlar\u0131 atfetmeye \u00e7al\u0131\u015fmak, ancak matematiksel olarak ilkel bir y\u00f6ntem kullanmak, hatal\u0131 pozitif oran\u0131n\u0131n tavan yapmas\u0131na neden olacakt\u0131r. Ayr\u0131ca, herhangi bir at\u0131f sonucu, yasal dosyalarla benzerlikler a\u00e7\u0131s\u0131ndan \u00e7apraz kontrol edilmelidir ve bu kontrol\u00fcn kalitesi genellikle sat\u0131c\u0131n\u0131n teknik yeteneklerine b\u00fcy\u00fck \u00f6l\u00e7\u00fcde ba\u011fl\u0131d\u0131r.<\/p>\n<h3><a name=\"_Toc256000013\"><\/a>Kaspersky\u2019nin at\u0131f yakla\u015f\u0131m\u0131<\/h3>\n<p>\u00dcr\u00fcnlerimiz, 25 y\u0131l\u0131 a\u015fk\u0131n bir s\u00fcredir olu\u015fturulan, belirli hack gruplar\u0131yla ili\u015fkili benzersiz bir k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m veri taban\u0131ndan yararlanmaktad\u0131r. Bunun yan\u0131 s\u0131ra, s\u00f6k\u00fclm\u00fc\u015f kodun statik analizine dayanan <a href=\"https:\/\/www1.fips.ru\/ofpstorage\/Doc\/IZPM\/RUNWC1\/000\/000\/002\/757\/265\/%D0%98%D0%97-02757265-00001\/DOCUMENT.PDF\" target=\"_blank\" rel=\"noopener nofollow\">patentli bir at\u0131f algoritmas\u0131<\/a> kullan\u0131yoruz. Bu, analiz edilen bir dosyan\u0131n belirli bir gruptan al\u0131nan bilinen \u00f6rneklerle ne kadar benzer oldu\u011funu y\u00fcksek hassasiyetle ve hatta belirli bir olas\u0131l\u0131k y\u00fczdesiyle belirlememizi sa\u011flar. Bu \u015fekilde, k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m\u0131 belirli bir tehdit akt\u00f6r\u00fcne atfederek, sa\u011flam temellere dayanan bir karar verebiliriz. Sonu\u00e7lar daha sonra milyarlarca g\u00fcvenilir dosyan\u0131n bulundu\u011fu bir veri taban\u0131yla kar\u015f\u0131la\u015ft\u0131r\u0131larak hatal\u0131 pozitif sonu\u00e7lar filtrelenir; herhangi bir dosya ile e\u015fle\u015fme bulunursa, at\u0131f karar\u0131 buna g\u00f6re d\u00fczeltilir. Bu yakla\u015f\u0131m, <a href=\"https:\/\/www.kaspersky.com.tr\/enterprise-security\/threat-intelligence-subscription?icid=tr_kdailyplacehold_acq_ona_smm__onl_b2b_kdaily_wpplaceholder_sm-team___kti____3efa0d2912edc528\" target=\"_blank\" rel=\"noopener\">Kaspersky Threat Intelligence Portal<\/a>\u2018daki tehdit at\u0131f hizmetini destekleyen Kaspersky Tehdit At\u0131f Motorunun temelini olu\u015fturur.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"mdr\"><input type=\"hidden\" class=\"placeholder_for_banner\" data-cat_id=\"mdr\" value=\"14231\">\n","protected":false},"excerpt":{"rendered":"<p>K\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlar\u0131 belirli bir hacker grubuna atfetmek neden yararl\u0131d\u0131r?<\/p>\n","protected":false},"author":2792,"featured_media":14249,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1726,1194],"tags":[2753,1109,1935],"class_list":{"0":"post-14248","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-enterprise","8":"category-business","9":"tag-hizmetler","10":"tag-saldirilar","11":"tag-tehdit-istihbarati"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/practical-value-of-cyberthreat-attribution\/14248\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/practical-value-of-cyberthreat-attribution\/30133\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/practical-value-of-cyberthreat-attribution\/25194\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/practical-value-of-cyberthreat-attribution\/13167\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/practical-value-of-cyberthreat-attribution\/30010\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/practical-value-of-cyberthreat-attribution\/28957\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/practical-value-of-cyberthreat-attribution\/31823\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/practical-value-of-cyberthreat-attribution\/30444\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/practical-value-of-cyberthreat-attribution\/41238\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/practical-value-of-cyberthreat-attribution\/55217\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/practical-value-of-cyberthreat-attribution\/23591\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/practical-value-of-cyberthreat-attribution\/24713\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/practical-value-of-cyberthreat-attribution\/33159\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/practical-value-of-cyberthreat-attribution\/30222\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/practical-value-of-cyberthreat-attribution\/35894\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/practical-value-of-cyberthreat-attribution\/35550\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/tehdit-istihbarati\/","name":"tehdit istihbarat\u0131"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/14248","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/2792"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=14248"}],"version-history":[{"count":4,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/14248\/revisions"}],"predecessor-version":[{"id":14251,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/14248\/revisions\/14251"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/14249"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=14248"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=14248"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=14248"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}