{"id":4514,"date":"2017-12-13T10:04:30","date_gmt":"2017-12-13T07:04:30","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=4514"},"modified":"2019-11-15T14:45:53","modified_gmt":"2019-11-15T11:45:53","slug":"kaspersky-end-of-the-year-2017","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/kaspersky-end-of-the-year-2017\/4514\/","title":{"rendered":"2017: Neydi ve ne olacak"},"content":{"rendered":"<p>Aral\u0131k \u00f6zeti bir nevi kutsal bir gelenek. Hemen ba\u015flayal\u0131m!<\/p>\n<h2>Fidye Yaz\u0131l\u0131m\u0131<\/h2>\n<p>Ge\u00e7en y\u0131l bu zamanlarda 2016\u2019y\u0131 fidye yaz\u0131l\u0131m\u0131 y\u0131l\u0131 ilan etmi\u015ftik. Ger\u00e7ekten de \u00e7e\u015fitli maskeler alt\u0131nda pek \u00e7ok \u015fifreleyici ve engelleyici vard\u0131 ve bula\u015fman\u0131n genel \u00f6l\u00e7e\u011fi olduk\u00e7a ciddiydi. Ama \u015fimdi g\u00f6r\u00fcyoruz ki \u201cfidye yaz\u0131l\u0131m\u0131 y\u0131l\u0131\u201d unvan\u0131 as\u0131l 2017\u2019ye yak\u0131\u015f\u0131yor. <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/wannacry-ransomware\/3181\/\" target=\"_blank\" rel=\"noopener\">WannaCry<\/a>, <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/new-ransomware-epidemics\/3319\/\" target=\"_blank\" rel=\"noopener\">ExPetr<\/a> ve <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/bad-rabbit-ransomware\/4326\/\" target=\"_blank\" rel=\"noopener\">BadRabbit<\/a> salg\u0131nlar\u0131 \u00f6nceden g\u00f6rd\u00fc\u011f\u00fcm\u00fcz hi\u00e7bir \u015feye benzemiyordu. Kapsam\u0131 bak\u0131m\u0131ndan WannaCry, hat\u0131rlanan en b\u00fcy\u00fck salg\u0131nlardan biri olan 2008-2009\u2019daki Conficker solucan\u0131n\u0131n d\u00fcnya \u00e7ap\u0131ndaki salg\u0131n\u0131yla kar\u015f\u0131la\u015ft\u0131r\u0131labilir.<\/p>\n<p>\u00d6te yandan, uzmanlar\u0131m\u0131z 2018\u2019in bir ba\u015fka fidye yaz\u0131l\u0131m\u0131 y\u0131l\u0131 olmayaca\u011f\u0131n\u0131 d\u00fc\u015f\u00fcn\u00fcyor. Birincilik \u00f6d\u00fcl\u00fcn\u00fc \u00e7oktan h\u0131z kazanmaya ba\u015flam\u0131\u015f <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/from-ransomware-to-webminers\/4437\/\" target=\"_blank\" rel=\"noopener\">gizli kripto para madencileri<\/a> alacak gibi g\u00f6r\u00fcn\u00fcyor. Ama bu konuya sonra gelece\u011fiz.<\/p>\n<h2>Finans \u015firketlerine sald\u0131r\u0131lar<\/h2>\n<p>2017 y\u0131l\u0131 korsanlar\u0131n en sevdi\u011fi hedeflerinden olan finansal kurulu\u015flara sald\u0131r\u0131da eksiklik ya\u015famad\u0131. Ekim ay\u0131nda uzmanlar\u0131m\u0131z Dark Web\u2019de <a href=\"https:\/\/securelist.com\/atm-malware-is-being-sold-on-darknet-market\/81871\/\" target=\"_blank\" rel=\"noopener\">Cutlet Maker<\/a> ad\u0131nda ATM\u2019leri kullanan yeni bir k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m buldular. \u00c7aylak korsanlar yaln\u0131zca birka\u00e7 bin dolar kar\u015f\u0131l\u0131\u011f\u0131nda ATM\u2019lere y\u00f6nelik y\u0131k\u0131c\u0131 sald\u0131r\u0131lar ba\u015flatabiliyordu: K\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m\u0131n i\u00e7erisinde talimatlarla beraber ihtiya\u00e7 duyulan her \u015fey mevcuttu. Baz\u0131 \u015fanss\u0131z i\u015fgalciler su\u00e7\u00fcst\u00fc yakaland\u0131 ama k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m\u0131n yarat\u0131c\u0131lar\u0131 da voliyi vurdu.<\/p>\n<p>Bu alanda devam eden bir ba\u015fka e\u011filim, bankac\u0131l\u0131k yap\u0131s\u0131n\u0131n i\u00e7inden gelen sald\u0131r\u0131lar. Ekim ay\u0131nda <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/silence-financial-apt\/4372\/\" target=\"_blank\" rel=\"noopener\">Silence<\/a> ad\u0131nda, finansal kurulu\u015flara y\u00f6nelik sald\u0131r\u0131lar d\u00fczenleyen bir siber su\u00e7 \u00f6rg\u00fct\u00fcn\u00fc de\u015fifre ettik. Kurbanlar\u0131n \u00e7o\u011fu Rus bankalar\u0131yd\u0131 ve \u00f6rg\u00fct\u00fcn de kendisi Rus\u00e7a konu\u015fuyora benziyordu. 2015 y\u0131l\u0131nda bankalar\u0131n hedeflendi\u011fi sald\u0131r\u0131lar\u0131 d\u00fczenleyerek man\u015fet olan <a href=\"https:\/\/www.kaspersky.com\/blog\/billion-dollar-apt-carbanak\/7519\/\" target=\"_blank\" rel=\"noopener nofollow\">Carbanak<\/a> ad\u0131ndaki grubun miras\u00e7\u0131s\u0131 olduklar\u0131 s\u00f6ylenebilir.<\/p>\n<h2>Hedefli sald\u0131r\u0131lar<\/h2>\n<p>Silence, hedefli sald\u0131r\u0131lardan, ya da geli\u015fmi\u015f kal\u0131c\u0131 tehdit olarak da bilinen APT\u2019lerden yaln\u0131zca biri. 2017 y\u0131l\u0131 boyunca bu kategoride etkin olan yakla\u015f\u0131k 100 korsan grubu g\u00f6zlemledik. 2016\u2019dan bu yana say\u0131 ikiye katland\u0131. Dahas\u0131, Silence da dahil olmak \u00fczere sadece on kadar\u0131n\u0131n ticari \u00e7\u0131karlar\u0131 bulunuyor: di\u011ferleri siber casusluk ve devlet kurumlar\u0131 ile petrol ve gaz \u015firketlerinin i\u00e7inden veri aramaya odakl\u0131lar. Bu da bizim ge\u00e7en <a href=\"https:\/\/kasperskycontenthub.com\/securelist\/files\/2016\/12\/KASPERSKY_SECURITY_BULLETIN_2016.pdf\" target=\"_blank\" rel=\"noopener nofollow\">y\u0131l\u0131n sonunda<\/a> tahmin etti\u011fimiz gibi: Korsan gruplar\u0131 belirli politik ve ekonomik g\u00fc\u00e7lerin yarar\u0131na daha etkin bir \u015fekilde \u00e7al\u0131\u015fmaya ba\u015flad\u0131.<\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"z6ZGsjeSFu\"><p><a href=\"https:\/\/www.kaspersky.com.tr\/blog\/kaspersky-predictions-2017\/2834\/\" target=\"_blank\" rel=\"noopener\">2016 sonu\u00e7lar\u0131, 2017 tahminleri<\/a><\/p><\/blockquote>\n<p><iframe loading=\"lazy\" class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"\u201c2016 sonu\u00e7lar\u0131, 2017 tahminleri\u201d \u2014 Daily - Turkish - Turkey - www.kaspersky.com.tr\/blog\" src=\"https:\/\/www.kaspersky.com.tr\/blog\/kaspersky-predictions-2017\/2834\/embed\/#?secret=A3docQiDOL#?secret=z6ZGsjeSFu\" data-secret=\"z6ZGsjeSFu\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p>Bu sene g\u00f6rd\u00fc\u011f\u00fcm\u00fcz hedefli sald\u0131r\u0131lar\u0131n yeni bir y\u00f6neyi de \u00fcr\u00fcnleri b\u00fcy\u00fck \u015firketler taraf\u0131ndan kullan\u0131lan yaz\u0131l\u0131m sat\u0131c\u0131lar\u0131. Sonu\u00e7ta su\u00e7lular da anlad\u0131: a\u015f\u0131lamayan kurumsal sistemlere sald\u0131rmak yerine kulland\u0131klar\u0131 yaz\u0131l\u0131m\u0131n pe\u015fine d\u00fc\u015fmek daha kolay.<\/p>\n<p>\u0130yi bir \u00f6rnek olarak Axiom grubunun pop\u00fcler Windows Kay\u0131t Defteri temizleme ayg\u0131t\u0131 <a href=\"https:\/\/threatpost.com\/inside-the-ccleaner-backdoor-attack\/128283\/\" target=\"_blank\" rel=\"noopener nofollow\">CCleaner<\/a> \u00fcreticisine yapt\u0131\u011f\u0131 y\u00fcksek profilli sald\u0131r\u0131 g\u00f6sterilebilir. Korsanlar d\u00fcnya \u00e7ap\u0131nda yakla\u015f\u0131k 2 milyon kullan\u0131c\u0131 taraf\u0131ndan indirilen bir program g\u00fcncellemesine zararl\u0131 bir kod ekledi. Kurbanlar yakla\u015f\u0131k 20 b\u00fcy\u00fck firmadan se\u00e7kin bir gruptu. Zararl\u0131 g\u00fcncelleme kurbanlar\u0131n sistemlerine girdi\u011finde su\u00e7lular da a\u011flar\u0131na girmeye devam etti.<\/p>\n<h2>Kripto para ve madencilik<\/h2>\n<p>Y\u0131l boyunca Bitcoin\u2019in de\u011feri 15 kat\u0131na \u00e7\u0131kt\u0131, Ethereum ise \u015fa\u015f\u0131rt\u0131c\u0131 bir bi\u00e7imde 48 kat artt\u0131. Kripto para birimleri bu y\u0131l k\u00fcresel ekonomi \u00fczerinde benzeri g\u00f6r\u00fclmemi\u015f bir etkiye sahip oldu ve giri\u015fim yat\u0131r\u0131mlar\u0131 pazar\u0131n\u0131 \u00e7oktan de\u011fi\u015ftirdiler bile: ICO kaynakl\u0131 fonlar 2017\u2019de 3,5 milyar dolara ula\u015f\u0131rken IPO bi\u00e7imi ise sadece 1 milyar dolara \u00e7ekildi.<\/p>\n<p><a href=\"https:\/\/www.kaspersky.com.tr\/blog\/kaspersky-predictions-2017\/2834\/\" target=\"_blank\" rel=\"noopener\">Tahmin etti\u011fimiz gibi<\/a>, bunun sonucunda yeni tehditler ve g\u00fcvenlik a\u00e7\u0131klar\u0131 ortaya \u00e7\u0131kt\u0131. Ba\u015flang\u0131\u00e7ta kar\u015f\u0131m\u0131za kimlik av\u0131 ve korsanl\u0131ktan Bitcoin c\u00fczdan numaralar\u0131n\u0131 panoya kopyalamaya kadar \u00e7ok \u00e7e\u015fitli sald\u0131r\u0131lar \u00e7\u0131kt\u0131. Hatta Nijeryal\u0131 istenmeyen posta olarak da bilinen doland\u0131r\u0131c\u0131l\u0131\u011f\u0131 biraz de\u011fi\u015ftirmek suretiyle insanlar\u0131n c\u00fczdan numaralar\u0131n\u0131 payla\u015fmalar\u0131 kar\u015f\u0131l\u0131\u011f\u0131nda onlara token verilece\u011fi \u015feklinde \u00f6rnekler bile g\u00f6rd\u00fck. (Adresinizi verirseniz paran\u0131z \u00e7al\u0131n\u0131yor.) Bu arada, 300 milyon dolar, ya da 2017 y\u0131l\u0131nda ICO\u2019lar arac\u0131l\u0131\u011f\u0131yla sa\u011flanan fonlar\u0131n neredeyse onda biri, su\u00e7lular taraf\u0131ndan \u00e7al\u0131nd\u0131.<\/p>\n<p>Hepsi bu kadar de\u011fil. Bu yeni ger\u00e7eklik, zenginle\u015fmenin yeni bi\u00e7imlerine \u00f6zg\u00fcrce yol veriyor. Bunlardan biri genelde taray\u0131c\u0131 tabanl\u0131 olan <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/hidden-miners-botnet-threat\/3741\/\" target=\"_blank\" rel=\"noopener\">gizli kripto para madencili\u011fi<\/a>. Web sitelerine ziyaret\u00e7ilerin bilgisayarlar\u0131n\u0131 onlar\u0131n bilgisi d\u0131\u015f\u0131nda madencilik i\u00e7in kulland\u0131ran bir betik bula\u015ft\u0131r\u0131ld\u0131.<\/p>\n<p>\u015eimdi siber g\u00fcvenlik d\u00fcnyas\u0131nda neler oldu\u011funun analizini yapt\u0131\u011f\u0131m\u0131za g\u00f6re ileride bizi neler bekledi\u011fine dair tahminlerimizi payla\u015faca\u011f\u0131z.<\/p>\n<h2>2018 tahminleri<\/h2>\n<ul>\n<li><strong>Yaz\u0131l\u0131m \u015firketlerine yap\u0131lan sald\u0131r\u0131lar \u00e7o\u011falacak.<\/strong> CCleaner ve M.E.Doc (g\u00fcncelleme sunucusu ExPetr da\u011f\u0131tmak i\u00e7in kullan\u0131lan bir yaz\u0131l\u0131m \u015firketi) vakalar\u0131n\u0131n a\u00e7\u0131k\u00e7a g\u00f6sterdi\u011fi gibi tek bir programa yap\u0131lan ba\u015far\u0131l\u0131 bir sald\u0131r\u0131 t\u00fcm potansiyel kullan\u0131c\u0131lar\u0131n\u0131 tehlikeye at\u0131yor.<\/li>\n<li><strong>ATM\u2019lere yap\u0131lan otomatik sald\u0131r\u0131lar ve izinsiz giri\u015f i\u00e7in kural d\u0131\u015f\u0131 \u00e7\u00f6z\u00fcmler.<\/strong> \u015eimdiye kadar ATM\u2019lere izinsiz giri\u015flerin bir \u00e7e\u015fit sopaya ba\u011fl\u0131 flash s\u00fcr\u00fcc\u00fc i\u00e7erdi\u011fini g\u00f6rd\u00fck. Tabii bu y\u00f6ntem s\u00fcrekli izlenen ATM\u2019lerde etkili olmuyor, yine de bu durumun sald\u0131rganlar\u0131n vazge\u00e7melerine engel oldu\u011fu s\u00f6ylenemez. Yeni izinsiz giri\u015f y\u00f6ntemleri geli\u015ftirilecek, bunlar\u0131n baz\u0131lar\u0131 uzaktan olabilir.<\/li>\n<li><strong>Daha derin bir i\u015fletim sistemi d\u00fczeyinde yeni cihazlara sald\u0131r\u0131lar.<\/strong> Hedefli sald\u0131r\u0131lar\u0131n y\u00f6neyi \u015fimdiden geleneksel masa\u00fcst\u00fc bilgisayarlardan yeni cihazlara do\u011fru kaymaya ba\u015flad\u0131, ak\u0131ll\u0131 telefonlar ve Nesnelerin \u0130nterneti de dahil. Sald\u0131rganlar koruma kontrol sistemleri taraf\u0131ndan alg\u0131lanmay\u0131 \u00f6nlemek i\u00e7in i\u015fletim sistemi i\u00e7erisinde daha d\u00fc\u015f\u00fck bir seviyede i\u015flem yapmaya \u00e7al\u0131\u015f\u0131yorlar, \u00f6rne\u011fin i\u015fletim sisteminden \u00f6nce \u00e7al\u0131\u015fmaya ba\u015flayan i\u015flemci yaz\u0131l\u0131m\u0131 UEFI d\u00fczeyinde.<\/li>\n<li><strong>Fidye yaz\u0131l\u0131m\u0131 i\u00e7eren daha fazla hedefli sald\u0131r\u0131.<\/strong> Sald\u0131rganlar b\u00fcy\u00fck \u015firketlere kar\u015f\u0131 sald\u0131r\u0131 saatini de \u00f6zenle se\u00e7erek dikkatlilikte \u00e7oktan uzmanla\u015fm\u0131\u015flard\u0131: \u00d6rne\u011fin ExPetr, \u015firketin \u00e7\u0131lg\u0131nca \u00f6deme yapmas\u0131n\u0131 sa\u011flamak i\u00e7in dosyalar\u0131 vergi iadesinden birka\u00e7 g\u00fcn \u00f6nce \u015fifreledi. Bunun gibi daha \u00e7ok hikaye duyabiliriz.<\/li>\n<li><strong>Kripto para doland\u0131r\u0131c\u0131l\u0131\u011f\u0131 ve blok zincirindeki sanal de\u011ferli e\u015fyalara sald\u0131r\u0131.<\/strong> Bireylerin ve \u015firketlerin kripto para hesaplar\u0131na sald\u0131r\u0131 ve yasa d\u0131\u015f\u0131 madencilik \u015fimdiden geleneksel bankac\u0131l\u0131k sistemleri ve \u00e7evrimi\u00e7i bankalara sald\u0131r\u0131lardan \u00e7ok daha fazla kazand\u0131r\u0131yor. Gizli madencili\u011fin farkl\u0131 \u00e7e\u015fitlerinin mantar gibi \u00e7o\u011falmas\u0131na ek olarak kripto c\u00fczdanlara oldu\u011fu kadar blok zincirindeki de\u011ferli e\u015fyalara sald\u0131r\u0131lar\u0131n da yeni t\u00fcrlerini g\u00f6rece\u011fiz. Daha biz konu\u015furken kripto para ve de\u011ferli e\u015fyalar\u0131n\u0131n olu\u015fturuldu\u011funu hesaba katarsak (\u00f6rne\u011fin herkesi heyecanland\u0131ran <a href=\"https:\/\/eksisozluk.com\/cryptokitties--5514596\" target=\"_blank\" rel=\"noopener nofollow\">CryptoKitties<\/a>), bunlar\u0131n siber h\u0131rs\u0131zlar\u0131n hedeflerinde olaca\u011f\u0131n\u0131 rahatl\u0131kla d\u00fc\u015f\u00fcnebiliriz.<\/li>\n<\/ul>\n<p>Bu tahminlerin hangilerinin ger\u00e7ekle\u015fece\u011fini bekleyip g\u00f6rmemiz gerekiyor. Ama size \u015fimdilik m\u00fckemmel tatiller, g\u00fcvende kal\u0131n!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Aral\u0131k \u00f6zeti bir nevi kutsal bir gelenek. Hemen ba\u015flayal\u0131m!<\/p>\n","protected":false},"author":40,"featured_media":4515,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1287],"tags":[1030,1333,493,627,615,1336,1339,550,921,1108,820],"class_list":{"0":"post-4514","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"tag-1030","9":"tag-1333","10":"tag-apt","11":"tag-great","12":"tag-hedefli-saldiri","13":"tag-kripto-para-birimi","14":"tag-madencilik","15":"tag-siber-guvenlik","16":"tag-sifreleyici","17":"tag-tahminler","18":"tag-tehdit"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/kaspersky-end-of-the-year-2017\/4514\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/kaspersky-end-of-the-year-2017\/11976\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/kaspersky-end-of-the-year-2017\/9971\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/kaspersky-end-of-the-year-2017\/14208\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/kaspersky-end-of-the-year-2017\/12421\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/kaspersky-end-of-the-year-2017\/12182\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/kaspersky-end-of-the-year-2017\/14975\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/kaspersky-end-of-the-year-2017\/14811\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/kaspersky-end-of-the-year-2017\/19335\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/kaspersky-end-of-the-year-2017\/20430\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/kaspersky-end-of-the-year-2017\/9941\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/kaspersky-end-of-the-year-2017\/8641\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/kaspersky-end-of-the-year-2017\/15494\/"},{"hreflang":"zh","url":"https:\/\/www.kaspersky.com.cn\/blog\/kaspersky-end-of-the-year-2017\/8989\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/kaspersky-end-of-the-year-2017\/18967\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/kaspersky-end-of-the-year-2017\/19189\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/kaspersky-end-of-the-year-2017\/19185\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/2017\/","name":"2017"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/4514","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=4514"}],"version-history":[{"count":5,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/4514\/revisions"}],"predecessor-version":[{"id":6994,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/4514\/revisions\/6994"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/4515"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=4514"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=4514"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=4514"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}