{"id":9509,"date":"2021-04-12T14:05:21","date_gmt":"2021-04-12T11:05:21","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=9509"},"modified":"2021-04-12T14:05:21","modified_gmt":"2021-04-12T11:05:21","slug":"history-of-ransomware","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/history-of-ransomware\/9509\/","title":{"rendered":"Fidye yaz\u0131l\u0131m\u0131 destan\u0131"},"content":{"rendered":"<p>Bilgi g\u00fcvenli\u011fini takip ediyorsan\u0131z, b\u00fcy\u00fck olas\u0131kla son y\u0131llarda fidye yaz\u0131l\u0131m\u0131 ile ilgili bir \u00e7ok \u015fey duymu\u015fsunuzdur. Hatta bir sald\u0131r\u0131ya maruz kalma talihsizli\u011fini bile ya\u015fam\u0131\u015f olabilirsiniz. Fidye yaz\u0131l\u0131m\u0131n\u0131 \u00e7a\u011f\u0131m\u0131z\u0131n belki de en tehlikeli k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m\u0131 olarak tan\u0131mlasak abartm\u0131\u015f olmay\u0131z.<\/p>\n<p>Ancak bu t\u00fcr k\u00f6t\u00fc ama\u00e7l\u0131 programlar\u0131n 30 y\u0131ldan uzun s\u00fcredir var oldu\u011funu ve ara\u015ft\u0131rmac\u0131lar\u0131n g\u00fcn\u00fcm\u00fcz sald\u0131r\u0131lar\u0131n\u0131n bir\u00e7ok \u00f6zelli\u011fini 1990\u2019lar\u0131n ortalar\u0131nda \u00f6n g\u00f6rd\u00fc\u011f\u00fcn\u00fc biliyor muydunuz? Neden engelleyicilerin yerini \u015fifreleyici yaz\u0131l\u0131mlar\u0131n ald\u0131\u011f\u0131n\u0131, tarihteki en b\u00fcy\u00fck fidyenin ne oldu\u011funu ve AIDS\u2019in t\u00fcm bunlarla ne ilgisi oldu\u011funu \u00f6\u011frenmek ister misiniz?<\/p>\n<p>O halde okumaya devam edin, \u00e7\u00fcnk\u00fc sizin i\u00e7in bu ve daha bir\u00e7ok sorunun yan\u0131tlar\u0131n\u0131 i\u00e7eren bir fidye yaz\u0131l\u0131m\u0131 tarihi derlemesi haz\u0131rlad\u0131k. Engelleyicilerin, \u015fifreleyici ve silici yaz\u0131l\u0131mlar\u0131n ve di\u011fer fidye yaz\u0131l\u0131mlar\u0131n\u0131n neden oldu\u011fu k\u00f6t\u00fcl\u00fcklerin onlarca y\u0131l i\u00e7indeki geli\u015fiminin izlerini gelin birlikte s\u00fcrelim.<\/p>\n<p><strong><input type=\"hidden\" class=\"category_for_banner\" value=\"gandalf30\"><\/strong><\/p>\n<h2>Fidye yaz\u0131l\u0131m\u0131 s\u00f6zl\u00fc\u011f\u00fc<\/h2>\n<p>A\u015fa\u011f\u0131daki terimler, metinde s\u0131k\u00e7a yer almaktad\u0131r.<\/p>\n<p><strong>Kriptografi<\/strong> \u2014 gizli bilgilerin yabanc\u0131lar taraf\u0131ndan okunmas\u0131n\u0131 \u00f6nleme bilimi. \u015eifreleme, kriptografinin bir taraf\u0131d\u0131r.<\/p>\n<p><strong>Simetrik \u015fifreleme<\/strong> \u2014 bir anahtar\u0131n hem bilgiyi \u015fifrelemek hem de \u015fifreyi \u00e7\u00f6zmek i\u00e7in kullan\u0131ld\u0131\u011f\u0131 bir veri \u015fifreleme y\u00f6ntemi.<\/p>\n<p><strong>Asimterik \u015fifreleme<\/strong> \u2014 bilgiyi \u015fifrelemek i\u00e7in herkese a\u00e7\u0131k, \u015fifreyi \u00e7\u00f6zmek i\u00e7in ise \u00f6zel bir anahtar olmak \u00fczere iki anahtar\u0131n kullan\u0131ld\u0131\u011f\u0131 bir veri \u015fifreleme y\u00f6ntemi. Herkese a\u00e7\u0131k anahtar\u0131 bilmenin \u015fifreyi \u00e7\u00f6zme konusunda bir yard\u0131m\u0131 olmaz; bunun i\u00e7in \u00f6zel anahtar\u0131 bilmek gerekir.<\/p>\n<p><a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/rsa\/\" target=\"_blank\" rel=\"noopener\">RSA<\/a> \u2014 yayg\u0131n olarak kullan\u0131lan bir asimetrik \u015fifreleme algoritmas\u0131.<\/p>\n<p><strong>Fidye yaz\u0131l\u0131m\u0131<\/strong> \u2014 kurban\u0131, sald\u0131rgana fidye \u00f6demeye zorlayan herhangi bir k\u00f6t\u00fc ama\u00e7l\u0131 program. Fidye yaz\u0131l\u0131m\u0131; <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/blocker\/\" target=\"_blank\" rel=\"noopener\">engelleyicileri<\/a>, <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/cryptomalware\/\" target=\"_blank\" rel=\"noopener\">\u015fifreleyici yaz\u0131l\u0131mlar\u0131<\/a> ve \u015fifreleyici olarak gizlenen <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/wiper\/\" target=\"_blank\" rel=\"noopener\">silici yaz\u0131l\u0131mlar\u0131<\/a> i\u00e7erir.<\/p>\n<p><strong>Engelleyici<\/strong> \u2014 bir bilgisayar\u0131 veya mobil cihaz\u0131 engelleyen veya engellenmesini sim\u00fcle eden bir t\u00fcr fidye yaz\u0131l\u0131m\u0131. Bu t\u00fcr k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlar tipik olarak, kal\u0131c\u0131 \u015fekilde di\u011fer t\u00fcm pencerelerin \u00fcst\u00fcnde duran, bir \u00f6deme talebinin yer ald\u0131\u011f\u0131 bir mesaj g\u00f6sterir.<\/p>\n<p><strong>\u015eifreleyici k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlar (\u015fifreleyici yaz\u0131l\u0131mlar)<\/strong> \u2014 kullan\u0131c\u0131 dosyalar\u0131n\u0131 kullan\u0131lamayacak \u015fekilde \u015fifreleyen bir fidye yaz\u0131l\u0131m\u0131 t\u00fcr\u00fcd\u00fcr.<\/p>\n<p><strong>Silici yaz\u0131l\u0131mlar<\/strong> \u2014 kurban\u0131n cihaz\u0131ndaki verileri silmek i\u00e7in tasarlanm\u0131\u015f bir k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m t\u00fcr\u00fcd\u00fcr. Bazen bir \u015fifreleyici yaz\u0131l\u0131m\u0131 sim\u00fcle eden fidye yaz\u0131l\u0131m\u0131n\u0131n ger\u00e7ekte bir silici yaz\u0131l\u0131m oldu\u011fu ortaya \u00e7\u0131kar ve dosyalara onar\u0131lamaz \u015fekilde zarar verir; bu nedenle fidye \u00f6dense bile, verileri kurtarmak imkans\u0131zd\u0131r.<\/p>\n<p><strong>RaaS (Hizmet olarak Fidye Yaz\u0131l\u0131m\u0131)<\/strong>\u2014 Yaz\u0131l\u0131m\u0131n yarat\u0131c\u0131lar\u0131n\u0131n fidyeden bir miktar komisyon kar\u015f\u0131l\u0131\u011f\u0131nda yaz\u0131l\u0131m\u0131 yaymak isteyen ki\u015fiye, fidye yaz\u0131l\u0131m\u0131n\u0131 kiralad\u0131klar\u0131 su\u00e7 plan\u0131. Bir nevi siber su\u00e7 acenteli\u011fidir.<\/p>\n<h2>1989: \u0130lk fidye yaz\u0131l\u0131m\u0131 sald\u0131r\u0131s\u0131<\/h2>\n<p>Biyolojik ara\u015ft\u0131rmac\u0131 olan Dr. Joseph L. Popp bilinen ilk \u015fifreleyici yaz\u0131l\u0131m\u0131 yaratt\u0131. Popp, insanlar\u0131n AIDS\u2019e olan yo\u011fun ilgisinden yararland\u0131; bu sebeple k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m AIDS Truva At\u0131 olarak bilinmeye ba\u015flad\u0131.<\/p>\n<p>O g\u00fcnlerde internet hala emekleme d\u00f6nemindeydi, dolay\u0131s\u0131yla Popp (g\u00fcn\u00fcm\u00fcz standartlar\u0131na g\u00f6re) olduk\u00e7a \u00f6zg\u00fcn bir da\u011f\u0131t\u0131m y\u00f6ntemi <a href=\"https:\/\/www.sdxcentral.com\/security\/definitions\/case-study-aids-trojan-ransomware\/\" target=\"_blank\" rel=\"noopener nofollow\">kullanm\u0131\u015ft\u0131<\/a>. D\u00fcnya Sa\u011fl\u0131k \u00d6rg\u00fct\u00fc (WHO) AIDS konferans\u0131 ve &lt;em&gt;<em>PC Business World&lt;\/em&gt;<\/em> dergisi abonelerinin adreslerinin listesini ald\u0131ktan sonra kurbanlara, program\u0131n kurulumuna ili\u015fkin detayl\u0131 talimatlarla birlikte \u00fczerinde \u201cAIDS Bilgi Tan\u0131t\u0131m Disket\u201d yazan bir \u00e7\u0131kartman\u0131n oldu\u011fu disket g\u00f6nderdi. Lisans s\u00f6zle\u015fmesinde, kullan\u0131c\u0131n\u0131n program\u0131 y\u00fckleyerek \u015firkete 378 dolar \u00f6demeyi kabul etti\u011fi <a href=\"https:\/\/www.securityfocus.com\/columnists\/102\" target=\"_blank\" rel=\"noopener nofollow\">belirtiliyordu<\/a>. Ama bu tarz \u015feyleri kim ciddiye al\u0131yor ki?<\/p>\n<p>Asl\u0131nda y\u00fckleyici, k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m\u0131 sabit s\u00fcr\u00fcc\u00fcye ula\u015ft\u0131rmak i\u00e7in kullan\u0131l\u0131yordu. Belirli say\u0131da sistem \u00f6ny\u00fcklemesinden sonra, AIDS Truva At\u0131 etkin hale geldi ve vir\u00fcsl\u00fc bilgisayar\u0131n C: s\u00fcr\u00fcc\u00fcs\u00fcndeki dosya adlar\u0131n\u0131 (uzant\u0131lar dahil) \u015fifreledi. Dosya adlar\u0131, normal \u00e7al\u0131\u015fmay\u0131 imkans\u0131z hale getirecek \u015fekilde karma kar\u0131\u015f\u0131k rastgele karakterlere d\u00f6n\u00fc\u015ft\u00fc. \u00d6rne\u011fin, bir dosyay\u0131 a\u00e7mak veya \u00e7al\u0131\u015ft\u0131rmak i\u00e7in \u00f6nce o dosyan\u0131n hangi uzant\u0131ya sahip olmas\u0131 gerekti\u011fini bulmak ve manuel olarak de\u011fi\u015ftirmek gerekiyordu.<\/p>\n<p>Ayn\u0131 zamanda k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m ekranda, yaz\u0131l\u0131m\u0131n deneme s\u00fcresinin bitti\u011fini ve kullan\u0131c\u0131n\u0131n bir abonelik \u00fccreti \u00f6demesi gerekti\u011fini belirten bir mesaj g\u00f6r\u00fcnt\u00fcledi: Bir y\u0131l i\u00e7in 189 dolar veya \u00f6m\u00fcr boyu eri\u015fim i\u00e7in 378 dolar. Para, Panama\u2019daki bir hesaba g\u00f6nderilecekti.<\/p>\n<p>K\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m simetrik \u015fifreleme kullan\u0131yordu, yani dosyalar\u0131 kurtaracak anahtar kodun i\u00e7indeydi. Bu nedenle, sorunu \u00e7\u00f6zmek g\u00f6rece kolayd\u0131: Anahtar\u0131 al\u0131n, k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m\u0131 silin ve dosya adlar\u0131n\u0131 kurtarmak i\u00e7in anahtar\u0131 kullan\u0131n. Ocak 1990\u2019da <em>Virus Bulletin<\/em> edit\u00f6r dan\u0131\u015fman\u0131 Jim Bates tam olarak bunu yapmak i\u00e7in AIDSOUT ve CLEARAID programlar\u0131n\u0131 yaratt\u0131.<\/p>\n<p>Joseph Popp tutukland\u0131 ancak mahkeme, akli dengesinin yarg\u0131lama i\u00e7in yerinde olmad\u0131\u011f\u0131na karar verdi. Nas\u0131l oluyorsa on y\u0131l sonra <a href=\"https:\/\/www.journals.uchicago.edu\/doi\/10.1086\/394028\" target=\"_blank\" rel=\"noopener nofollow\">&lt;em&gt;Pop\u00fcler Evrim: Antropolojiden Hayat Dersleri&lt;\/em&gt;<\/a> kitab\u0131n\u0131 yay\u0131nlad\u0131.<\/p>\n<p><strong><input type=\"hidden\" class=\"category_for_banner\" value=\"kis-trial-ransomware\"><\/strong><\/p>\n<h2>1995\u20132004: Young, Yung ve gelece\u011fin fidye yaz\u0131l\u0131m\u0131<\/h2>\n<p>Belki de AIDS Truva At\u0131 yarat\u0131c\u0131s\u0131n\u0131 zengin edemedi\u011fi i\u00e7in, verileri fidye amac\u0131yla \u015fifreleme fikri, o zamanki doland\u0131r\u0131c\u0131lar aras\u0131nda \u00e7ok da fazla heyecan yaratmad\u0131. Beklenen ilgi 1995\u2019te ve bilim camias\u0131nda geri d\u00f6nd\u00fc.<\/p>\n<p>Kriptograflar Adam L. Young ve Moti Yung, en g\u00fc\u00e7l\u00fc bilgisayar vir\u00fcs\u00fcn\u00fcn nas\u0131l bir \u015fey olabilece\u011fini <a href=\"https:\/\/www.csoonline.com\/article\/3566886\/a-history-of-ransomware-the-motives-and-methods-behind-these-evolving-attacks.html?page=2\" target=\"_blank\" rel=\"noopener nofollow\">\u00f6\u011frenmek i\u00e7in yola \u00e7\u0131kt\u0131.<\/a> Asimetrik \u015fifreleme kullanan fidye yaz\u0131l\u0131m\u0131 konsepti fikrini ortaya att\u0131lar.<\/p>\n<p>Geli\u015ftirdikleri modellerinde, dosyalar\u0131 \u015fifrelemek i\u00e7in program koduna eklenmesi gereken tek bir anahtar kullanmak yerine, \u015fifreyi \u00e7\u00f6zecek anahtar\u0131 gizli tuttarak herkese a\u00e7\u0131k ve \u00f6zel olmak \u00fczere iki ayr\u0131 anahtar kulland\u0131lar. Dahas\u0131, Young ve Yung, kurban\u0131n hen\u00fcz o zamanlar var olmayan elektronik paray\u0131 kullanarak \u00f6deme yapmas\u0131 gerekece\u011fini varsayd\u0131.<\/p>\n<p>Siber g\u00fcvenlik kahinleri d\u00fc\u015f\u00fcncelerini 1996\u2019daki IEEE G\u00fcvenlik ve Gizlilik konferans\u0131nda sundular ancak pek de iyi kar\u015f\u0131lanmad\u0131lar. Ard\u0131ndan 2004\u2019te Young ve Yung, ara\u015ft\u0131rmalar\u0131n\u0131n sonu\u00e7lar\u0131n\u0131 <a href=\"https:\/\/cacm.acm.org\/magazines\/2017\/7\/218875-cryptovirology\/fulltext\" target=\"_blank\" rel=\"noopener nofollow\">sistematik hale<\/a> getirdikleri <em>K\u00f6t\u00fc Ama\u00e7l\u0131 Kriptografi: Kriptovirolojiye Maruz Kalma<\/em><em>\u2018y\u0131 yay\u0131mland\u0131.<\/em><\/p>\n<h2>2007\u20132010: Engelleyicilerin alt\u0131n y\u0131llar\u0131<\/h2>\n<p>\u015eifreleyici k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlar kendileri i\u00e7in uygun zaman\u0131 beklerken, d\u00fcnya ba\u015fka bir t\u00fcr fidye yaz\u0131l\u0131m\u0131n\u0131n y\u00fckseli\u015fine \u015fahit oldu: Engelleyiciler. Bu olduk\u00e7a ilkel k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m t\u00fcr\u00fc, kendisini Windows\u2019un ba\u015flang\u0131\u00e7 rutinine ekleyerek i\u015fletim sisteminin normal i\u015fleyi\u015fine m\u00fcdahale etti. Buna ek olarak, silinmeyi engellemek i\u00e7in bir\u00e7ok engelleyici kay\u0131t defteri d\u00fczenleyicisini ve g\u00f6rev y\u00f6neticisini engelledi.<\/p>\n<p>Bu t\u00fcr k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlar, kurbanlar\u0131n bilgisayarlar\u0131n\u0131 kullanmas\u0131n\u0131 engellemek i\u00e7in masa\u00fcst\u00fc duvar ka\u011f\u0131d\u0131n\u0131n de\u011fi\u015ftirmekten kapat\u0131lamayan pencereye kadar bir \u00e7ok farkl\u0131 y\u00f6ntem kulland\u0131. Bir \u00f6deme y\u00f6ntemi, fidyeyi <a href=\"https:\/\/securelist.com\/kaspersky-security-bulletin-malware-evolution-2010\/36343\/\" target=\"_blank\" rel=\"noopener\">paral\u0131 bir hatta k\u0131sa mesaj yoluyla g\u00f6ndermekti<\/a>.<\/p>\n<p>Fidye yaz\u0131l\u0131m\u0131 engelleyicileri etkisiz hale getirmek i\u00e7in genellikle bir antivir\u00fcs program\u0131na ihtiya\u00e7 yoktu, bunun yerine kullan\u0131c\u0131n\u0131n olduk\u00e7a fazla teknik bilgiye sahip olmas\u0131 yeterliydi. \u00d6rne\u011fin k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m\u0131 manuel olarak kald\u0131rmak i\u00e7in, sistemi bir Canl\u0131 veya kurtarma CD\u2019sinden y\u00fcklemek, g\u00fcvenli modda ba\u015flatmak veya Windows\u2019ta farkl\u0131 bir kullan\u0131c\u0131 profili ile oturum a\u00e7mak gerekiyordu.<\/p>\n<p>Ancak bu t\u00fcr Truva atlar\u0131n\u0131 yazman\u0131n kolay olmas\u0131n\u0131n kar\u015f\u0131l\u0131\u011f\u0131nda riskleri de g\u00f6rece olarak d\u00fc\u015f\u00fckt\u00fc. Hemen hemen herkes bunlar\u0131 da\u011f\u0131tabilirdi. Hatta otomatik engelleyici \u00fcrete\u00e7ler bile vard\u0131.<\/p>\n<p>K\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m bazen (bug\u00fcn hala kullan\u0131lan bir taktik olan) masa\u00fcst\u00fcne pornografik bir banner yerle\u015ftiriyor ve kurban\u0131n yasaklanm\u0131\u015f i\u00e7eri\u011fi g\u00f6r\u00fcnt\u00fcledi\u011fini iddia ediyordu. Fidye talebinin y\u00f6netilebilir olmas\u0131 nedeniyle, kurbanlar\u0131n \u00e7o\u011fu yard\u0131m istemeyi de\u011fil, sadece \u00f6demeyi tercih ediyordu.<\/p>\n<h2>2010: Asimetrik \u015fifrelemeye sahip \u015fifreleyici k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlar<\/h2>\n<p>2011\u2019de \u015fifreleyici k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m geli\u015ftiricileri i\u015fleri \u00f6nemli \u00f6l\u00e7\u00fcde ilerlettiler ve Yung ve Young\u2019\u0131n tahmin etti\u011fi gibi asimetrik \u015fifreleme kullanmaya ba\u015flad\u0131lar. \u00d6rne\u011fin GpCode \u015fifreleyici yaz\u0131l\u0131m\u0131n\u0131n bir modifikasyonu, <a href=\"https:\/\/securelist.com\/gpcode-like-ransomware-is-back\/29633\/\" target=\"_blank\" rel=\"noopener\">RSA algoritmas\u0131na dayan\u0131yordu<\/a>.<\/p>\n<h2>2013: Hibrit fidye yaz\u0131l\u0131m\u0131 CryptoLocker<\/h2>\n<p>2013\u2019\u00fcn sonlar\u0131nda, bir engelleyici ile \u015fifreleyici k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m\u0131 bir araya getiren hibrit fidye yaz\u0131l\u0131m\u0131n\u0131n <a href=\"https:\/\/blog.emsisoft.com\/en\/818\/the-accdfisa-malware-family-ransomware-targetting-windows-servers\/\" target=\"_blank\" rel=\"noopener nofollow\">ortaya \u00e7\u0131k\u0131\u015f\u0131<\/a> dikkat \u00e7ekti. K\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m\u0131 kald\u0131rmak ve bu sayede engeli kald\u0131rmak bile kurbanlar\u0131n dosyalar\u0131na eri\u015fimini geri getirmedi\u011fi i\u00e7in bu konsept siber su\u00e7lulara \u00f6deme yap\u0131lmas\u0131 \u015fans\u0131n\u0131 art\u0131rd\u0131. Belki de bu hibrit fidye yaz\u0131l\u0131mlar\u0131n\u0131n en k\u00f6t\u00fc \u015f\u00f6hretlisi <a href=\"https:\/\/www.kaspersky.com\/blog\/cryptolocker-is-bad-news\/3122\/\" target=\"_blank\" rel=\"noopener nofollow\">CryptoLocker<\/a>\u2018d\u0131r. Bu k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m spam e-postalar ile da\u011f\u0131t\u0131ld\u0131 ve yaz\u0131l\u0131m\u0131n arkas\u0131ndaki siber su\u00e7lular fidye \u00f6demesini Bitcoin olarak kabul etti.<\/p>\n<h2>2015: \u015eifreleyici yaz\u0131l\u0131mlar engelleyicilerin yerini al\u0131yor<\/h2>\n<p>2015 y\u0131l\u0131nda Kaspersky, 5,5 kat artan sald\u0131r\u0131 say\u0131s\u0131 ile \u00e7\u0131\u011f gibi b\u00fcy\u00fcyen \u015fifreleyici k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m bula\u015ft\u0131rma giri\u015fimlerini g\u00f6zlemledi. \u015eifreleyici yaz\u0131l\u0131mlar <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/ransomware-blocker-to-cryptor\/2221\/\" target=\"_blank\" rel=\"noopener\">engelleyicileri yerinden etmeye ba\u015flad\u0131<\/a>.<\/p>\n<p>\u015eifreleyici yaz\u0131l\u0131mlar birka\u00e7 nedenden dolay\u0131 galip geldi. Birincisi; kullan\u0131c\u0131 verileri, her zaman yeniden y\u00fcklenebilen sistem dosyalar\u0131ndan ve uygulamalardan \u00e7ok daha de\u011ferlidir. \u015eifreleme sayesinde, siber su\u00e7lular \u00f6nemli \u00f6l\u00e7\u00fcde daha y\u00fcksek fidye talep edebilir ve fidyenin \u00f6denme \u015fans\u0131 \u00e7ok daha y\u00fcksektir.<\/p>\n<p>\u0130kincisi ise; 2015 itibar\u0131yla anonim para transferleri i\u00e7in yayg\u0131n olarak kripto para birimleri kullan\u0131l\u0131yordu, bu nedenle sald\u0131rganlar art\u0131k izlenmekten korkmuyorlard\u0131. Bitcoin ve di\u011fer kripto para birimleri, yakalanmadan y\u00fcksek tutarda fidye al\u0131nmas\u0131na olanak sa\u011flad\u0131.<\/p>\n<h2>2016: Toplu fidye yaz\u0131l\u0131m\u0131<\/h2>\n<p>Fidye yaz\u0131l\u0131m\u0131, siber g\u00fcvenlikte bir g\u00fc\u00e7 olarak b\u00fcy\u00fcmeye devam etti ve 2016 y\u0131l\u0131nda <a href=\"https:\/\/securelist.com\/files\/2016\/12\/KSB2016_Story_of_the_Year_ENG.pdf\" target=\"_blank\" rel=\"noopener\">fidye yaz\u0131l\u0131m\u0131 modifikasyonlar\u0131n\u0131n say\u0131s\u0131nda on kat art\u0131\u015f<\/a> g\u00f6r\u00fcld\u00fc, ortalama fidye ise 0,5 ila y\u00fczlerce bitcoin (o g\u00fcnk\u00fc de\u011feri \u015fu andaki de\u011ferinin k\u00fcsurat\u0131 kadard\u0131) aras\u0131nda de\u011fi\u015fiyordu. Sald\u0131r\u0131lar\u0131n as\u0131l oda\u011f\u0131 bireysel kullan\u0131c\u0131dan kurumsal sekt\u00f6re kayd\u0131 ve hakl\u0131 olarak yeni bir su\u00e7 end\u00fcstrisinin ortaya \u00e7\u0131k\u0131\u015f\u0131ndan s\u00f6z edilmeye ba\u015flad\u0131.<\/p>\n<p>Siber su\u00e7lular art\u0131k kendi ba\u015flar\u0131na k\u00f6t\u00fc ama\u00e7l\u0131 bir yaz\u0131l\u0131m geli\u015ftirmek zorunda de\u011fildi; haz\u0131r sat\u0131lan k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlar\u0131 sat\u0131n alabiliyorlard\u0131. \u00d6rne\u011fin, Stampado fidye yaz\u0131l\u0131m\u0131 i\u00e7in \u201c\u00f6m\u00fcr boyu kullan\u0131m lisans\u0131\u201d sat\u0131lmaya ba\u015fland\u0131. Bu k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m, kurbanlar\u0131 korkutarak fidye \u00f6demelerini sa\u011flamak i\u00e7in belirli bir s\u00fcrenin sonunda <a href=\"https:\/\/www.zdnet.com\/article\/this-obscenely-cheap-ransomware-will-also-encrypt-files-across-your-network-and-removable-drives\/\" target=\"_blank\" rel=\"noopener nofollow\">rastgele dosya silmekle<\/a> tehdit etti.<\/p>\n<p>Fidye yaz\u0131l\u0131mlar\u0131, <a href=\"https:\/\/securelist.com\/files\/2016\/12\/KSB2016_Story_of_the_Year_ENG.pdf\" target=\"_blank\" rel=\"noopener\">Encryptor RaaS\u2019\u0131n<\/a> ortaya \u00e7\u0131k\u0131\u015f\u0131yla do\u011fan bir terim olan <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/ransomware-as-a-service-raas\/\" target=\"_blank\" rel=\"noopener\">RaaS<\/a> (Hizmet olarak Fidye Yaz\u0131l\u0131m\u0131) modeli ile de kullan\u0131ma sunuldu. Bu sat\u0131\u015f modeli, fidye yaz\u0131l\u0131mlar\u0131n\u0131n daha da yayg\u0131nla\u015fmas\u0131na katk\u0131da bulundu.<\/p>\n<p>Gasp\u00e7\u0131lar, i\u015fletmeler ve ev kullan\u0131c\u0131lar\u0131n\u0131n yan\u0131nda h\u00fck\u00fcmet ve belediye kurulu\u015flar\u0131n\u0131 da hedef almaya ba\u015flad\u0131. San Francisco Belediyesi Ula\u015f\u0131m Dairesi\u2019nin 2.000\u2019den fazla bilgisayar\u0131na <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/mamba-hddcryptor-ransomware\/2691\/\" target=\"_blank\" rel=\"noopener\">fidye yaz\u0131l\u0131m\u0131 bula\u015ft\u0131ran<\/a> HDDCryptor bunun en iyi \u00f6rne\u011fi. Siber su\u00e7lular, sistemleri geri y\u00fcklemek i\u00e7in 100 BTC talep ettiler (daha sonradan yakla\u015f\u0131k 70.000 dolar istediler), ancak ajans\u0131n BT departman\u0131 sorunu kendi ba\u015f\u0131na \u00e7\u00f6zmeyi ba\u015fard\u0131.<\/p>\n<p><strong><input type=\"hidden\" class=\"category_for_banner\" value=\"kis-top3\"><\/strong><\/p>\n<h2>2016\u20132017: Petya, NotPetya, ve WannaCry<\/h2>\n<p>Nisan 2016\u2019da, <a href=\"https:\/\/www.kaspersky.com\/blog\/petya-ransomware\/11715\/\" target=\"_blank\" rel=\"noopener nofollow\">Petya adl\u0131 yeni bir k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m y\u00fckseli\u015fe ge\u00e7ti<\/a>. \u00d6nceki \u015fifreleyici yaz\u0131l\u0131mlar, kurbanlar\u0131n fidyeyi \u00f6demesine izin vermek i\u00e7in i\u015fletim sistemlerini sa\u011flam b\u0131rak\u0131yorken Petya, sabit s\u00fcr\u00fcc\u00fcdeki t\u00fcm dosya ve klas\u00f6r yap\u0131s\u0131n\u0131n depoland\u0131\u011f\u0131 bir veri taban\u0131 olan MFT\u2019yi (Ana Dosya Tablosu) hedef ald\u0131 ve vir\u00fcsl\u00fc makineleri tamamen i\u015flevsiz hale getirip tu\u011flaya d\u00f6n\u00fc\u015ft\u00fcrd\u00fc (bricked).<\/p>\n<p>Her ne kadar y\u0131k\u0131c\u0131 olsa da, Petya\u2019n\u0131n s\u0131zma ve da\u011f\u0131t\u0131m mekanizmas\u0131 s\u0131k\u0131nt\u0131l\u0131yd\u0131. Petya\u2019y\u0131 etkinle\u015ftirmek i\u00e7in kurban\u0131n, manuel olarak bir y\u00fcr\u00fct\u00fclebilir dosyay\u0131 indirmesi ve \u00e7al\u0131\u015ft\u0131rmas\u0131 gerekiyordu, bu da bula\u015fma olas\u0131l\u0131\u011f\u0131n\u0131 azaltt\u0131. Asl\u0131nda, ba\u015fka bir fidye yaz\u0131l\u0131m\u0131 \u2014 <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/wannacry-ransomware\/3181\/\" target=\"_blank\" rel=\"noopener\">hak etti\u011fi ismiyle WannaCry<\/a> kadar iz b\u0131rakmam\u0131\u015f olabilir.<\/p>\n<p>May\u0131s 2017\u2019de, WannaCry d\u00fcnya \u00e7ap\u0131nda 500.000\u2019den fazla cihaza bula\u015farak 4 milyar dolarl\u0131k hasara neden oldu. Bunu nas\u0131l ba\u015fard\u0131? Windows\u2019taki baz\u0131 \u00e7ok tehlikeli g\u00fcvenlik a\u00e7\u0131klar\u0131ndan <a href=\"https:\/\/www.kaspersky.com\/blog\/exploits-problem-explanation\/9448\/\" target=\"_blank\" rel=\"noopener nofollow\">yararlanan EternalBlue ile birlikte \u00e7al\u0131\u015farak.<\/a> Truva at\u0131 a\u011flara s\u0131zd\u0131 ve WannaCry\u2019i kurbanlar\u0131n bilgisayarlar\u0131na kurdu. Daha sonra k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m yerel a\u011fdaki di\u011fer cihazlara yay\u0131lmaya devam etti. WannaCry bula\u015ft\u0131\u011f\u0131 sistemlerin i\u00e7inde normal \u015fekilde davranarak dosyalar\u0131 \u015fifreliyor ve fidye talep ediyordu.<\/p>\n<p>WannaCry salg\u0131n\u0131n\u0131n \u00fczerinde iki ay ge\u00e7memi\u015fti ki, EternalBlue i\u00e7in modifiye edilmi\u015f yeni bir \u015fifreleyici yaz\u0131l\u0131m ortaya \u00e7\u0131kt\u0131: <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/new-ransomware-epidemics\/3319\/\" target=\"_blank\" rel=\"noopener\">ExPetr olarak da bilinen NotPetya<\/a>. NotPetya sabit diskleri tamamen yak\u0131p yok etti.<\/p>\n<p>Dahas\u0131, NotPetya dosya tablosunu fidye \u00f6demesinden sonra bile \u00e7\u00f6z\u00fclmesi imkans\u0131z olacak \u015fekilde \u015fifreledi. Sonu\u00e7 olarak uzmanlar, bunun asl\u0131nda bir \u015fifreleyici yaz\u0131l\u0131m k\u0131l\u0131\u011f\u0131na girmi\u015f silici yaz\u0131l\u0131m oldu\u011fu <a href=\"https:\/\/securelist.com\/expetrpetyanotpetya-is-a-wiper-not-ransomware\/78902\/\" target=\"_blank\" rel=\"noopener\">sonucuna vard\u0131<\/a>. NotPetya\u2019n\u0131n neden oldu\u011fu toplam hasar <a href=\"https:\/\/www.nytimes.com\/2017\/06\/27\/technology\/ransomware-hackers.html\" target=\"_blank\" rel=\"noopener nofollow\">10 milyar dolar\u0131 a\u015ft\u0131<\/a>.<\/p>\n<p>WannaCry sald\u0131r\u0131s\u0131 o kadar y\u0131k\u0131c\u0131yd\u0131 ki Microsoft art\u0131k desteklemedi\u011fi i\u015fletim sistemleri i\u00e7in bile acil bir yama yay\u0131nlad\u0131. Deste\u011fi devam eden sistemler i\u00e7in her iki salg\u0131n\u0131n \u00e7ok \u00f6ncesinde de g\u00fcncellemeler bulunuyordu ancak herkes bunlar\u0131 y\u00fcklememi\u015fti ve bu da iki fidye yaz\u0131l\u0131m\u0131 program\u0131n\u0131n uzun bir s\u00fcre varl\u0131\u011f\u0131n\u0131 devam ettirmesine izin veriyordu.<\/p>\n<h2>2017: \u015eifre \u00e7\u00f6zme i\u00e7in bir milyon dolar<\/h2>\n<p>E\u015fi benzeri g\u00f6r\u00fclmemi\u015f hasarlar\u0131n yan\u0131nda, tek bir i\u015fletme taraf\u0131ndan \u00f6denmi\u015f o g\u00fcne kadar bilinen en b\u00fcy\u00fck fidye ile 2017\u2019de bir rekor daha k\u0131r\u0131ld\u0131. G\u00fcney Koreli Web sunucusu Nayana, Erebus \u015fifreleyici yaz\u0131l\u0131m\u0131n\u0131n bula\u015ft\u0131\u011f\u0131 bilgisayarlar \u00fczerindeki engeli kald\u0131rmak i\u00e7in <a href=\"https:\/\/www.bbc.com\/news\/technology-40340820\" target=\"_blank\" rel=\"noopener nofollow\">1 milyon dolar \u00f6demeyi kabul etti<\/a> (bunun 4,5 kat\u0131 olan fidye talebi pazarl\u0131kla bu tutara d\u00fc\u015f\u00fcr\u00fcld\u00fc).<\/p>\n<p>Uzmanlar\u0131 en \u00e7ok \u015fa\u015f\u0131rtan \u015feyse, \u015firketin \u00f6demeyi kamuya duyurmas\u0131yd\u0131. Kurbanlar\u0131n \u00e7o\u011fu bu t\u00fcr \u015feyleri duyurmamay\u0131 tercih eder.<\/p>\n<h2>2018\u20132019: Topluma y\u00f6nelik bir tehdit<\/h2>\n<p>Ge\u00e7ti\u011fimiz birka\u00e7 y\u0131l, kamu hizmetlerine ve tesislerine yap\u0131lan b\u00fcy\u00fck fidye yaz\u0131l\u0131m\u0131 sald\u0131r\u0131lar\u0131 a\u00e7\u0131s\u0131ndan dikkat \u00e7ekiciydi. Ula\u015f\u0131m, su, enerji ve sa\u011fl\u0131k kurumlar\u0131, <a href=\"https:\/\/securelist.com\/story-of-the-year-2019-cities-under-ransomware-siege\/95456\/\" target=\"_blank\" rel=\"noopener\">kendilerini g\u00fcn ge\u00e7tik\u00e7e artan \u015fekilde risk alt\u0131nda buldular<\/a>. \u00dcstelik siber su\u00e7lular \u00f6deme yap\u0131laca\u011f\u0131na da g\u00fcveniyordu; \u00e7\u00fcnk\u00fc fidye talepleri \u00e7ok b\u00fcy\u00fck olsa bile, bir yerin karanl\u0131\u011fa g\u00f6m\u00fclmesi binlerce veya milyonlarca insan\u0131 zor durumda b\u0131rakmak anlam\u0131na geliyordu.<\/p>\n<p>\u00d6rne\u011fin 2018\u2019de, \u0130ngiltere\u2019deki Bristol Havaliman\u0131\u2019na d\u00fczenlenen bir <a href=\"https:\/\/www.bbc.co.uk\/news\/uk-england-bristol-45539841\" target=\"_blank\" rel=\"noopener nofollow\">\u015fifreleyici k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m sald\u0131r\u0131s\u0131<\/a>, u\u00e7u\u015f ekranlar\u0131nda iki tam g\u00fcn boyunca kesinti ya\u015fanmas\u0131na neden oldu. Personel son \u00e7are olarak beyaz tahta kullanma ve havaalan\u0131n\u0131n sayg\u0131nl\u0131\u011f\u0131ndan yararlanma yoluna gitti ve sald\u0131r\u0131ya tepkisi h\u0131zl\u0131 ve etkili oldu. Bildi\u011fimiz kadar\u0131yla hi\u00e7bir u\u00e7u\u015f iptal edilmedi ve fidye \u00f6denmedi.<\/p>\n<p>ABD\u2019de bir klinik olan Hancock Health, SamSam fidye yaz\u0131l\u0131m\u0131n\u0131n sistemlerine sald\u0131rmas\u0131ndan sonra 4 BTC (o zamanlar 55.000 dolar de\u011ferindeydi) \u00f6dedi ve klinik i\u00e7in \u00e7ok da ge\u00e7mi\u015f olsun denemezdi. <a href=\"https:\/\/www.hancockregionalhospital.org\/2018\/01\/6262\/\" target=\"_blank\" rel=\"noopener nofollow\">\u015eirketin fidyeyi \u00f6deme karar\u0131n\u0131 a\u00e7\u0131klayan<\/a> CEO Steve Long, ak\u0131llardaki en k\u00f6t\u00fc grip mevsimlerinden biri ile birlikte yakla\u015fan bir kar f\u0131rt\u0131nas\u0131 benzetmesini yapt\u0131. Klini\u011fin, sald\u0131rganlardan ba\u011f\u0131ms\u0131z \u015fekilde bilgisayarlar\u0131n\u0131 geri y\u00fcklemek i\u00e7in zaman\u0131 yoktu.<\/p>\n<p>2019\u2019da Amerika Birle\u015fik Devletleri\u2019nde toplamda 170\u2019den fazla belediye kurumu <a href=\"https:\/\/edition.cnn.com\/2019\/05\/10\/politics\/ransomware-attacks-us-cities\/index.html\" target=\"_blank\" rel=\"noopener nofollow\">fidye yaz\u0131l\u0131mlar\u0131n\u0131n kurban\u0131 oldu<\/a> ve fidye talepleri 5 milyon dolara kadar \u00e7\u0131kt\u0131. Bu t\u00fcr kurumlarda i\u015fletim sistemlerini g\u00fcncellemek zor olabilir, bu nedenle siber su\u00e7lular genellikle eski \u2014 ve dolay\u0131s\u0131yla daha eri\u015filebilir \u2014 a\u00e7\u0131klardan faydalan\u0131r.<\/p>\n<h2>2020: Artan \u00f6l\u00e7ek ve veri s\u0131z\u0131nt\u0131s\u0131 ile para s\u0131zd\u0131rma<\/h2>\n<p>Sebep oldu\u011fu sonu\u00e7lar ve fidye tutarlar\u0131n\u0131n yan\u0131nda <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/ransomware-incidents-2020\/9019\/\" target=\"_blank\" rel=\"noopener\">k\u00f6t\u00fc yaz\u0131l\u0131m bula\u015fmas\u0131na ili\u015fkin artan \u00f6l\u00e7e\u011fe<\/a> ek olarak 2020, verileri \u015fifrelemeden \u00f6nce siber su\u00e7lu kullan\u0131c\u0131lara g\u00f6nderen yeni bir hibrit fidye yaz\u0131l\u0131m\u0131 yakla\u015f\u0131m\u0131n\u0131n g\u00f6r\u00fclmesi a\u00e7\u0131s\u0131ndan unutulmaz bir y\u0131l oldu. <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/ransomware-data-disclosure\/7655\/\" target=\"_blank\" rel=\"noopener\">Bilgiyi rakiplere s\u0131zd\u0131rmak<\/a> veya ard\u0131ndan yay\u0131nlamakla ilgili tehditler. Bug\u00fcnlerde ki\u015fisel veriler konusundaki a\u015f\u0131r\u0131 duyarl\u0131l\u0131k g\u00f6z \u00f6n\u00fcne al\u0131nd\u0131\u011f\u0131nda bu durum, bir i\u015fletme i\u00e7in \u00f6l\u00fcmc\u00fcl olabilir. Taktik ilk olarak 2019\u2019da <a href=\"https:\/\/securelist.com\/maze-ransomware\/99137\/\" target=\"_blank\" rel=\"noopener\">Maze grubunun<\/a> uzmanla\u015ft\u0131\u011f\u0131 bir konuydu, ancak 2020\u2019de ger\u00e7ek bir trend haline geldi.<\/p>\n<p>Transform Hospital Group estetik cerrahi zinciri, 2020\u2019nin sansasyonel olaylar\u0131ndan birinin kurban\u0131 oldu. REvil hacker grubu, hastalar\u0131n ameliyat \u00f6ncesi ve sonras\u0131 foto\u011fraflar\u0131n\u0131 da i\u00e7eren <a href=\"https:\/\/www.bbc.com\/news\/technology-55439190\" target=\"_blank\" rel=\"noopener nofollow\">Transform\u2019a ait 900 GB boyutundaki veriyi \u015fifreledi, \u00e7ald\u0131<\/a> ve bunlar\u0131 yay\u0131nlamakla tehdit etti.<\/p>\n<p>Bunlara ek olarak \u015fifreleyici k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m kullan\u0131c\u0131lar\u0131, 2020\u2019de bir dizi yeni taktik benimsedi. \u00d6rne\u011fin REvil grubu, \u00e7al\u0131nan bilgileri <a href=\"https:\/\/threatpost.com\/revil-ransomware-gang-auction-stolen-data\/157006\/\" target=\"_blank\" rel=\"noopener nofollow\">a\u00e7\u0131k art\u0131rmada satmaya ba\u015flad\u0131<\/a>. Siber su\u00e7lular ayr\u0131ca, kartel benzeri organizasyon yap\u0131s\u0131yla birlik oldular. Bunlardan ilki, LockBit \u015fifreleyici yaz\u0131l\u0131m\u0131 taraf\u0131ndan \u00e7al\u0131nan bilgileri yay\u0131nlamaya ba\u015flayan Maze grubuydu. <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/ransomware-gangs-team-up-to-form-extortion-cartel\/\" target=\"_blank\" rel=\"noopener nofollow\">Siber su\u00e7lulara g\u00f6re<\/a> art\u0131k LockBit ile yak\u0131n bir \u015fekilde \u00e7al\u0131\u015f\u0131yorlar, veri s\u0131z\u0131nt\u0131s\u0131 i\u00e7in ellerindeki platformu ve sahip olduklar\u0131 bilgileri payla\u015f\u0131yorlar.<\/p>\n<p>Ayr\u0131ca, yak\u0131nda ba\u015fka bir grubun da kartele kat\u0131laca\u011f\u0131yla ilgili \u00f6v\u00fcn\u00fcyorlard\u0131: RagnarLocker; para s\u0131zd\u0131rd\u0131\u011f\u0131 \u015firketler \u00fczerinde ek bir bask\u0131 arac\u0131 olarak kurbanlar\u0131n kaynaklar\u0131na y\u00f6nelik DDoS sald\u0131r\u0131lar\u0131n\u0131 organize etme konusunda \u00f6nc\u00fcl\u00fck eden bir grup.<\/p>\n<h2>Sonu\u00e7<\/h2>\n<p>Otuz y\u0131ll\u0131k bir s\u00fcre\u00e7te fidye yaz\u0131l\u0131m\u0131, g\u00f6rece olarak zarars\u0131z bir oyuncaktan, t\u00fcm platformlar\u0131n kullan\u0131c\u0131lar\u0131 ve \u00f6zellikle i\u015fletmeler i\u00e7in ciddi bir tehdide d\u00f6n\u00fc\u015ft\u00fc. Sald\u0131r\u0131lara kar\u015f\u0131 korunmak i\u00e7in birka\u00e7 <a href=\"https:\/\/www.kaspersky.com\/blog\/ransomware-10-tips\/10673\/\" target=\"_blank\" rel=\"noopener nofollow\">g\u00fcvenlik kural\u0131na<\/a> uydu\u011funuzdan emin olun \u2014 ve bir \u015fekilde, bir sald\u0131r\u0131 ba\u015far\u0131l\u0131 olursa, yaln\u0131zca siber su\u00e7lular\u0131n tekliflerini kabul etmekle kalmamak ve <a href=\"https:\/\/www.nomoreransom.org\/tu\/index.html\" target=\"_blank\" rel=\"noopener nofollow\">uzmanlardan yard\u0131m istemek <\/a>\u00f6nemlidir.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kis-trial-ransomware\">\n","protected":false},"excerpt":{"rendered":"<p>Bir zamanlar adeta sevimli olan ekran engelleyicileri taraf\u0131ndan temsil edilen fidye yaz\u0131l\u0131m\u0131 r\u00fc\u015ft\u00fcn\u00fc ispatlad\u0131.<\/p>\n","protected":false},"author":2484,"featured_media":9510,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1351],"tags":[885,591,2397,2398],"class_list":{"0":"post-9509","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"tag-engelleyiciler","9":"tag-fidye-yazilimi","10":"tag-sifreleyici-yazilimlar","11":"tag-silici-yazilimlar"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/history-of-ransomware\/9509\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/history-of-ransomware\/22700\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/history-of-ransomware\/18184\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/history-of-ransomware\/24514\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/history-of-ransomware\/22552\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/history-of-ransomware\/21583\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/history-of-ransomware\/25027\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/history-of-ransomware\/24313\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/history-of-ransomware\/30373\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/history-of-ransomware\/39203\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/history-of-ransomware\/16718\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/history-of-ransomware\/17280\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/history-of-ransomware\/14685\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/history-of-ransomware\/26487\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/history-of-ransomware\/30428\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/history-of-ransomware\/26879\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/history-of-ransomware\/23727\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/history-of-ransomware\/29075\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/history-of-ransomware\/28872\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/fidye-yazilimi\/","name":"Fidye Yaz\u0131l\u0131m\u0131"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/9509","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/2484"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=9509"}],"version-history":[{"count":1,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/9509\/revisions"}],"predecessor-version":[{"id":9511,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/9509\/revisions\/9511"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/9510"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=9509"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=9509"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=9509"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}