{"id":2991,"date":"2026-02-26T22:34:33","date_gmt":"2026-02-26T22:34:33","guid":{"rendered":"https:\/\/renewasoft.com.tr\/?p=2991"},"modified":"2026-02-28T00:34:48","modified_gmt":"2026-02-28T00:34:48","slug":"ics-fidye-yazilimi-ve-apt-tehditleri","status":"publish","type":"post","link":"https:\/\/renewasoft.com.tr\/index.php\/tr\/2026\/02\/26\/ics-fidye-yazilimi-ve-apt-tehditleri\/","title":{"rendered":"End\u00fcstriyel Kontrol Sistemlerine (ICS) Y\u00f6nelik Fidye Yaz\u0131l\u0131m\u0131 ve APT Tehditleri"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row][vc_column][vc_column_text css=&#8221;&#8221;]<\/p>\n<h1>ICS Fidye Yaz\u0131l\u0131m\u0131 ve APT Tehditleri<\/h1>\n<p><em>Sald\u0131r\u0131Ya\u015fam D\u00f6ng\u00fcs\u00fc, Yanal Hareket ve Yapay Zeka Destekli Savunma<\/em><br \/>\n<em>Hydrowise Yapay Zeka Destekli Hidroelektrik Santral Y\u00f6netim Sistemi<\/em><br \/>\n<strong>Renewasoft | 2026<\/strong><\/p>\n<p><span class=\"level-badge\">Seviye: \u0130leri<\/span> \u00a0 Hedef Kitle: SCADA M\u00fchendisi, HES \u0130\u015fletmecisi, CTO, Altyap\u0131 Yat\u0131r\u0131mc\u0131s\u0131<\/p>\n<hr \/>\n<h1>Giri\u015f: Fidyenin \u00d6tesinde &#8212; End\u00fcstriyel Kontrol Sistemlerinde Sessiz Sava\u015f<\/h1>\n<p>2021 y\u0131l\u0131nda Colonial Pipeline sald\u0131r\u0131s\u0131, ABD&#8217;nin do\u011fu yakas\u0131nda 6 g\u00fcnl\u00fck yak\u0131t krizine neden oldu\u011funda d\u00fcnya, kritik altyap\u0131ya y\u00f6nelik fidye yaz\u0131l\u0131m\u0131 tehditlerinin boyutunu somut olarak deneyimledi<sup>[2]<\/sup>. Ancak bu olay, buzda\u011f\u0131n\u0131n yaln\u0131zca g\u00f6r\u00fcnen k\u0131sm\u0131yd\u0131. Perde arkas\u0131nda ulus-devlet destekli \u0130leri Kal\u0131c\u0131 Tehditler (APT), enerji altyap\u0131lar\u0131n\u0131n derinliklerinde aylarca &#8212; bazen y\u0131llarca &#8212; gizlenerek kesif yap\u0131yor, kontrol mant\u0131\u011f\u0131n\u0131 analiz ediyor ve stratejik an i\u00e7in bekliyordu<sup>[11]<\/sup>.<\/p>\n<p>Hidroelektrik santraller (HES), bu tehdit manzaras\u0131nda \u00f6zellikle kritik bir konumdad\u0131r. Bir HES&#8217;in SCADA sistemi ele ge\u00e7irildi\u011finde sonu\u00e7lar veri kayb\u0131n\u0131n \u00e7ok \u00f6tesine ge\u00e7er: kontrols\u00fcz kap\u0131 operasyonlar\u0131, t\u00fcrbin a\u015f\u0131r\u0131 h\u0131z olaylar\u0131, baraj g\u00fcvenli\u011fi ihlalleri ve kademeli \u015febeke ar\u0131zalar\u0131 gibi kinetik ve \u00e7evresel felaketler s\u00f6z konusudur. Dragos&#8217;un 2023 raporuna g\u00f6re, enerji sekt\u00f6r\u00fc ICS tehdit gruplar\u0131n\u0131n en \u00e7ok hedef ald\u0131\u011f\u0131 sekt\u00f6r olmaya devam etmektedir<sup>[3]<\/sup>.<\/p>\n<p>Bu yaz\u0131, end\u00fcstriyel kontrol sistemlerine y\u00f6nelik fidye yaz\u0131l\u0131m\u0131 ve APT tehditlerini sald\u0131r\u0131 yasam d\u00f6ng\u00fcs\u00fc (kill chain) perspektifinden analiz etmekte<sup>[6]<\/sup>, yanal hareket mekanizmalar\u0131n\u0131 HES mimarisine \u00f6zg\u00fc risklerle e\u015fle\u015ftirmekte ve Renewasoft&#8217;un <strong>Hydrowise<\/strong> platformunun yapay zeka destekli anomali tespiti, adaptif segmentasyon ve u\u00e7tan uca dijital enerji y\u00f6netimi ile bu tehditlere nas\u0131l yan\u0131t verdi\u011fini detayland\u0131rmaktad\u0131r<sup>[13]<\/sup>.<\/p>\n<p>Hydrowise yaln\u0131zca bir siber g\u00fcvenlik \u00e7\u00f6z\u00fcm\u00fc de\u011fildir &#8212; SCADA ve IoT sens\u00f6rlerinden ger\u00e7ek zamanl\u0131 veri toplayarak \u00fcretim tahminleri, kestirimci bakim senaryolar\u0131, su debisi \u00f6ng\u00f6r\u00fcler ve EP\u0130A\u015e pazar entegrasyonu sunan <strong>u\u00e7tan uca dijital enerji y\u00f6netim platformudur<\/strong><sup>[13]<\/sup>.<\/p>\n<p>\u25ba\u00a0<a href=\"https:\/\/renewasoft.com.tr\/index.php\/tr\/hizmetimiz\/\">https:\/\/renewasoft.com.tr\/index.php\/tr\/hizmetimiz\/<\/a><\/p>\n<h2>Kavramlar 101: Temel Terminoloji<\/h2>\n<p>Bu yaz\u0131daki teknik terimleri anlamak i\u00e7in temel referans tablosu:<\/p>\n<table>\n<tbody>\n<tr>\n<th>Terim<\/th>\n<th>Tanim<\/th>\n<\/tr>\n<tr>\n<td><strong>ICS<\/strong><\/td>\n<td>Endustriyel Kontrol Sistemi &#8212; fiziksel s\u00fcre\u00e7leri (enerji \u00fcretimi, su y\u00f6netimi) izleyen ve kontrol eden donan\u0131m\/yaz\u0131l\u0131m b\u00fct\u00fcn\u00fc.<\/td>\n<\/tr>\n<tr>\n<td><strong>APT<\/strong><\/td>\n<td>\u0130leri Kal\u0131c\u0131 Tehdit &#8212; ulus-devlet destekli, uzun vadeli ve gizli siber sald\u0131r\u0131 kampanyalar\u0131. Hedef: istihbarat, sabotaj.<\/td>\n<\/tr>\n<tr>\n<td><strong>Ransomware<\/strong><\/td>\n<td>Fidye Yaz\u0131l\u0131m\u0131 &#8212; verileri\/sistemleri \u015fifreleyerek kripto para fidye talep eden kotu yaz\u0131l\u0131m turu.<\/td>\n<\/tr>\n<tr>\n<td><strong>Kill Chain<\/strong><\/td>\n<td>Sald\u0131r\u0131 Yasam D\u00f6ng\u00fcs\u00fc &#8212; bir siber sald\u0131r\u0131n\u0131n kesiften etkiye kadar ard\u0131\u015f\u0131k a\u015famalar\u0131n\u0131 tan\u0131mlayan model [6].<\/td>\n<\/tr>\n<tr>\n<td><strong>Lateral Movement<\/strong><\/td>\n<td>Yanal Hareket &#8212; sald\u0131rgan\u0131n a\u011f i\u00e7inde bir sistemden di\u011ferine yatay olarak ilerlemesi (IT \u2192 DMZ \u2192 OT).<\/td>\n<\/tr>\n<tr>\n<td><strong>C2 (C&amp;C)<\/strong><\/td>\n<td>Komuta ve Kontrol &#8212; sald\u0131rgan\u0131n ele ge\u00e7irilen sistemlerle gizli ileti\u015fim kanal\u0131 (HTTPS, DNS t\u00fcneli).<\/td>\n<\/tr>\n<tr>\n<td><strong>Dwell Time<\/strong><\/td>\n<td>Bekletilme Suresi &#8212; sald\u0131rgan\u0131n tespit edilmeden a\u011fda kald\u0131\u011f\u0131 sure. APT medyan\u0131: 21 g\u00fcn [11].<\/td>\n<\/tr>\n<tr>\n<td><strong>SIS<\/strong><\/td>\n<td>G\u00fcvenlik Enstr\u00fcmante Sistemi &#8212; proses g\u00fcvenli\u011fini sa\u011flayan son savunma hatt\u0131 (TRITON hedefi) [5].<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p class=\"caption\" style=\"text-align: center\"><em>Tablo 1: ICS Siber G\u00fcvenlik Temel Terminolojisi<\/em><\/p>\n<h2>\u00d6zet (TL;DR) &#8212; Y\u00f6netici \u00d6zeti<\/h2>\n<ol>\n<li><strong>ICS altyapilari cifte tehdit altindadir:<\/strong>\u00a0ulus-devlet destekli APT kampanyalari uzun vadeli sabotaj hedeflerken, fidye yazilimi gruplari anlik finansal kazanc icin operasyonel kesinti yaratir<sup>[3][11]<\/sup>.<\/li>\n<li><strong>Saldiri yasam dongusu (kill chain) cok asamalidir:<\/strong>\u00a0IT agi penetrasyonu \u2192 yanal hareket \u2192 OT kesfi \u2192 ICS silah dagitimy \u2192 kinetik etki. Ortalama bekletilme suresi APT icin 21 gun, fidye yazilimi icin 5 gundur<sup>[6][11]<\/sup>.<\/li>\n<li><strong>Yanal hareket HES&#8217;ler icin en kritik risk vektorudur:<\/strong>\u00a0duz ag topolojileri ve DMZ eksikligi, saldirganlar\u0131n IT&#8217;den OT&#8217;ye gecisini kolaylastirir<sup>[4]<\/sup>.<\/li>\n<li><strong>Erken tespit is sureklilignin anahtaridir:<\/strong>\u00a0yapay zeka tabanli davranissal analiz, geleneksel imza tabanli tespitte gorunmez kalan APT gizliligini kirabilir<sup>[13]<\/sup>.<\/li>\n<li><strong>Hydrowise uctan uca dijital enerji yonetim platformu olarak;<\/strong>\u00a0DPI, ML anomali tespiti ve adaptif segmentasyonun yan\u0131 sira uretim tahmini, kestirimci bakim ve EP\u0130A\u015e entegrasyonu ile hem guvenli\u011fi hem operasyonel verimliligi maksimize eder<sup>[13]<\/sup>.<\/li>\n<\/ol>\n<h1>ICS ve OT Dunyasinda Paradigma Degisimi<\/h1>\n<h2>ICS Nedir ve Neden Farklidir?<\/h2>\n<p>Endustriyel Kontrol Sistemleri (ICS), elektrik uretiminden su yonetimine, petrokimyadan ulasima kadar fiziksel surecleri izleyen ve kontrol eden sistemlerin tumunu kapsar. SCADA, PLC, RTU, HMI ve DCS gibi bilesenlerden olusan bu sistemler, IT dunyasindan temel olarak farklidir: oncelik siralamas\u0131\u00a0<strong>kullanilabilirlik \u2192 butunluk \u2192 gizlilik<\/strong>\u00a0seklindedir (IT&#8217;de tam tersi). Bir PLC&#8217;nin 10ms&#8217;lik kontrol dongusu gecikmeye tahammul edemez; bir HMI&#8217;in anlik gorunurluk kaybi operator icin kor ucus demektir<sup>[8]<\/sup>.<\/p>\n<p>Purdue Modeli (ISA-95\/IEC 62443), bu IT\/OT ayrimini bes katmanli bir referans mimarisyle tanimlar: Level 0 (fiziksel surec), Level 1 (PLC\/RTU), Level 2 (HMI\/SCADA), Level 3 (site operasyonlari), Level 3.5 (DMZ) ve Level 4-5 (kurumsal IT\/internet)<sup>[8]<\/sup>. Bu katmanlar arasindaki gecisler, saldiri yasam dongusunun kritik dugum noktalaridir.<\/p>\n<h2>APT ve Fidye Yazilimi: Iki Farkli Tehdit Modeli<\/h2>\n<p>ICS altyapilarin\u0430 yonelik siber tehditleri anlamak icin iki temel saldiri paradigmasini ayirt etmek gerekir:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-2997 size-full\" src=\"https:\/\/renewasoft.com.tr\/wp-content\/uploads\/2026\/02\/ics-gorsel-1-apt-vs-ransomware.png\" alt=\"\" width=\"1400\" height=\"700\" srcset=\"https:\/\/renewasoft.com.tr\/wp-content\/uploads\/2026\/02\/ics-gorsel-1-apt-vs-ransomware.png 1400w, https:\/\/renewasoft.com.tr\/wp-content\/uploads\/2026\/02\/ics-gorsel-1-apt-vs-ransomware-300x150.png 300w, https:\/\/renewasoft.com.tr\/wp-content\/uploads\/2026\/02\/ics-gorsel-1-apt-vs-ransomware-1024x512.png 1024w, https:\/\/renewasoft.com.tr\/wp-content\/uploads\/2026\/02\/ics-gorsel-1-apt-vs-ransomware-768x384.png 768w, https:\/\/renewasoft.com.tr\/wp-content\/uploads\/2026\/02\/ics-gorsel-1-apt-vs-ransomware-350x175.png 350w, https:\/\/renewasoft.com.tr\/wp-content\/uploads\/2026\/02\/ics-gorsel-1-apt-vs-ransomware-540x270.png 540w, https:\/\/renewasoft.com.tr\/wp-content\/uploads\/2026\/02\/ics-gorsel-1-apt-vs-ransomware-920x460.png 920w, https:\/\/renewasoft.com.tr\/wp-content\/uploads\/2026\/02\/ics-gorsel-1-apt-vs-ransomware-730x365.png 730w, https:\/\/renewasoft.com.tr\/wp-content\/uploads\/2026\/02\/ics-gorsel-1-apt-vs-ransomware-600x300.png 600w\" sizes=\"auto, (max-width: 1400px) 100vw, 1400px\" \/><\/p>\n<p class=\"caption\" style=\"text-align: center\"><em>Infografik 1: APT ve Fidye Yazilimi Tehdit Kars\u0131lastirmasi &#8212; HES\/ICS Perspektifi [3][5][11]<\/em><\/p>\n<table>\n<tbody>\n<tr>\n<th>Kriter<\/th>\n<th>APT (Ileri Kalici Tehdit)<\/th>\n<th>Fidye Yazilimi<\/th>\n<\/tr>\n<tr>\n<td><strong>Motivasyon<\/strong><\/td>\n<td>Istihbarat toplama, stratejik sabotaj, jeopolitik avantaj<\/td>\n<td>Finansal kazanc (kripto para fidye odemesi)<\/td>\n<\/tr>\n<tr>\n<td><strong>Aktor Profili<\/strong><\/td>\n<td>Ulus-devlet destekli: XENOTIME, ELECTRUM, CHERNOVITE [5]<\/td>\n<td>Organize suc: DarkSide, LockBit, BlackCat [2]<\/td>\n<\/tr>\n<tr>\n<td><strong>Bekletilme Suresi<\/strong><\/td>\n<td>Mediyan 21 gun; aylar-yillar mumkun [11]<\/td>\n<td>Mediyan 5 gun; hizla azalan trend [11]<\/td>\n<\/tr>\n<tr>\n<td><strong>HES Etkisi<\/strong><\/td>\n<td>PLC logic manipulasyonu \u2192 fiziksel hasar, SIS devre disi birakma [5]<\/td>\n<td>SCADA\/HMI sifreleme, historian DB kaybi \u2192 operasyonel korlu\u043a [2]<\/td>\n<\/tr>\n<tr>\n<td><strong>Tespit Zorlugu<\/strong><\/td>\n<td>Cok yuksek &#8212; normal trafik taklit eder, dusuk hizli [4]<\/td>\n<td>Orta &#8212; sifreleme aktivitesi belirgin, ancak gec fark edilir [4]<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p class=\"caption\" style=\"text-align: center\"><em>Tablo 2: APT ve Fidye Yazilimi Tehdit Kars\u0131lastirmasi [3][5][11]<\/em><\/p>\n<div class=\"callout\">\n<p><strong>\ud83d\udd0d Teknik Not: ICS Tarihinin Donum Noktalari<\/strong><\/p>\n<p><strong>Stuxnet (2010):<\/strong>\u00a0Ilk bilinen ICS silahi. USB yoluyla Iran Natanz tesisine sizan kotu yazilim, Siemens S7-300 PLC&#8217;lerin frekans donusturucu kontrol mantigini degistirerek ~1.000 uranyum zenginlestirme santrifujunu fiziksel olarak tahrip etti<sup>[1]<\/sup>.<\/p>\n<p><strong>Colonial Pipeline (2021):<\/strong>\u00a0DarkSide fidye yazilimi grubu, ele gecirilmis bir VPN kimlik bilgisi ile IT agina sizdi. IT sistemlerinin sifrelemesi, OT operasyonlarinin onlem olarak durdurulmasina yol acti &#8212; 6 gun yakit krizi, $4.4M fidye odemesi<sup>[2]<\/sup>.<\/p>\n<p><strong>TRITON\/TRISIS (2017):<\/strong>\u00a0XENOTIME tehdit grubu, Ortadogu&#8217;daki bir petrokimya tesisinin Guvenlik Enstrumante Sistemini (SIS &#8212; Schneider Triconex) hedef aldi. Muhendislik istasyonu uzerinden SIS kontrolorunu yeniden programladi. Saldirganlar\u0131n son guvenlik hattini devre disi birakma niyetini kan\u0131tladi<sup>[5]<\/sup>.<\/p>\n<p><em>(Kaynak:\u00a0<sup>[1][2][5]<\/sup>)<\/em><\/p>\n<\/div>\n<h1>Saldiri Yasam Dongusu: ICS Kill Chain<\/h1>\n<p>SANS Enstitusu&#8217;nun ICS Cyber Kill Chain modeli<sup>[6]<\/sup>, endustriyel kontrol sistemlerine yonelik saldirilar\u0131 iki asamali bir cercevede tanimlar: (1) IT agi penetrasyonu ve yerlesme, (2) OT agina gecis ve ICS silah dagitimy. Bu model, MITRE ATT&amp;CK for ICS<sup>[4]<\/sup>\u00a0teknik siniflandirmasiyla birlestirildiginde, hem saldirinin her asamasini hem de savunma firsatlarini somut olarak haritalamak mumkun hale gelir.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-2998 size-full\" src=\"https:\/\/renewasoft.com.tr\/wp-content\/uploads\/2026\/02\/ics-gorsel-2-kill-chain.png\" alt=\"\" width=\"1400\" height=\"900\" srcset=\"https:\/\/renewasoft.com.tr\/wp-content\/uploads\/2026\/02\/ics-gorsel-2-kill-chain.png 1400w, https:\/\/renewasoft.com.tr\/wp-content\/uploads\/2026\/02\/ics-gorsel-2-kill-chain-300x193.png 300w, https:\/\/renewasoft.com.tr\/wp-content\/uploads\/2026\/02\/ics-gorsel-2-kill-chain-1024x658.png 1024w, https:\/\/renewasoft.com.tr\/wp-content\/uploads\/2026\/02\/ics-gorsel-2-kill-chain-768x494.png 768w, https:\/\/renewasoft.com.tr\/wp-content\/uploads\/2026\/02\/ics-gorsel-2-kill-chain-350x225.png 350w, https:\/\/renewasoft.com.tr\/wp-content\/uploads\/2026\/02\/ics-gorsel-2-kill-chain-540x347.png 540w, https:\/\/renewasoft.com.tr\/wp-content\/uploads\/2026\/02\/ics-gorsel-2-kill-chain-778x500.png 778w, https:\/\/renewasoft.com.tr\/wp-content\/uploads\/2026\/02\/ics-gorsel-2-kill-chain-622x400.png 622w, https:\/\/renewasoft.com.tr\/wp-content\/uploads\/2026\/02\/ics-gorsel-2-kill-chain-600x386.png 600w\" sizes=\"auto, (max-width: 1400px) 100vw, 1400px\" \/><\/p>\n<p class=\"caption\" style=\"text-align: center\"><em>Infografik 2: ICS Siber Saldiri Kill Chain &#8212; SANS Modeli [6] + MITRE ATT&amp;CK for ICS [4] + Hydrowise Tespit Noktalari<\/em><\/p>\n<table>\n<tbody>\n<tr>\n<th>#<\/th>\n<th>Asama<\/th>\n<th>Teknik Detay<\/th>\n<th>MITRE ID<\/th>\n<th>Sure<\/th>\n<\/tr>\n<tr>\n<td><strong>1<\/strong><\/td>\n<td><strong>Kesif &amp; Silahlanma<\/strong><\/td>\n<td>Hedef HES OSINT arastirmasi, SCADA vendor\/versiyon tespiti, spear-phishing payload hazirlama<\/td>\n<td>T0817, T0883<\/td>\n<td>Haftalar-Aylar<\/td>\n<\/tr>\n<tr>\n<td><strong>2<\/strong><\/td>\n<td><strong>Ilk Erisim &amp; C2<\/strong><\/td>\n<td>Phishing \u2192 IT endpoint, VPN\/RDP credential calma, C2 kanali (HTTPS\/DNS tuneli)<\/td>\n<td>T0866, T0886<\/td>\n<td>Gunler<\/td>\n<\/tr>\n<tr>\n<td><strong>3<\/strong><\/td>\n<td><strong>Yanal Hareket<\/strong><\/td>\n<td>IT \u2192 DMZ \u2192 OT gecisi, EWS ele gecirme, credential harvesting (Mimikatz, Pass-the-Hash)<\/td>\n<td>T0852, T0859<\/td>\n<td>Gunler-Haftalar<\/td>\n<\/tr>\n<tr>\n<td><strong>4<\/strong><\/td>\n<td><strong>OT Kesfi<\/strong><\/td>\n<td>OT ag topolojisi tarama, PLC\/RTU envanteri cikarma, kontrol mantigi analizi<\/td>\n<td>T0840, T0842<\/td>\n<td>Haftalar<\/td>\n<\/tr>\n<tr>\n<td><strong>5<\/strong><\/td>\n<td><strong>ICS Silah Dagitimy<\/strong><\/td>\n<td>PLC logic reprogramlama, fidye yazilimi HMI\/SCADA yayma, historian DB sifreleme<\/td>\n<td>T0843, T0831<\/td>\n<td>Saatler<\/td>\n<\/tr>\n<tr>\n<td><strong>6<\/strong><\/td>\n<td><strong>Etki &amp; Hasar<\/strong><\/td>\n<td>Turbin kontrolu manipulasyonu, SCADA gorunurluk kaybi, operasyonel duraklatma<\/td>\n<td>T0855, T0826<\/td>\n<td>Anlik<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p class=\"caption\" style=\"text-align: center\"><em>Tablo 3: ICS Kill Chain Asamalari &#8212; HES Baglami [4][6]<\/em><\/p>\n<h1>Yanal Hareket ve Operasyonel Durus Riski<\/h1>\n<h2>Saldiri Yuzeyi Haritalama: HES&#8217;lerdeki Zayif Noktalar<\/h2>\n<p>Kill chain&#8217;in en kritik ve en savunulabilir asamasi yanal harekettir. Bir saldirgan IT aginda ilk erisimi elde ettikten sonra, OT agina ulasmak icin birden fazla ag sinirini gecmek zorundadir &#8212; eger bu sinirlar dogru uygulanmissa<sup>[7]<\/sup>. Ancak bircok HES kurulumunda bu sinirlar fiilen mevcut degildir:<\/p>\n<div class=\"callout-warn\">\n<p><strong>\u26a0 Risk Kutusu: HES&#8217;lerde Yanal Hareketin 4 Kritik Yolu<\/strong><\/p>\n<p><strong>1. Duz Ag Topolojisi:<\/strong>\u00a0SCADA, muhendislik istasyonlari ve kurumsal IT tek Layer 2 broadcast domain&#8217;inde. Saldirgan ARP poisoning ile tum trafigi gorebilir. Purdue Level 3.5 DMZ eksikligi en yaygin kok neden.<\/p>\n<p><strong>2. Cift Bagli Muhendislik Istasyonlari (EWS):<\/strong>\u00a0Hem kurumsal aga hem OT agina bagli dual-homed EWS, saldirgan icin dogal bir kopru. RDP ile erisim saglanir, PLC programlama araclari (TIA Portal, Studio 5000) uzerinden dogrudan kontrol.<\/p>\n<p><strong>3. Paylasilan Kimlik Bilgileri:<\/strong>\u00a0OT ortamlarinda siklikla varsayilan sifreler (admin\/admin), paylasilan servis hesaplari ve rotasyonsuz credential&#8217;lar kullanilir. Bir IT credential&#8217;i calindiginda OT&#8217;ye de erisim saglar.<\/p>\n<p><strong>4. Uzaktan Erisim VPN&#8217;leri:<\/strong>\u00a0COVID sonrasi artan uzaktan bakim talebi, genellikle MFA olmaksizin dogrudan OT agina VPN erisimi saglamistir. Colonial Pipeline saldirisinin giris noktasi tam olarak budur<sup>[2]<\/sup>.<\/p>\n<p><em>(Kaynak:\u00a0<sup>[2][4][7]<\/sup>)<\/em><\/p>\n<\/div>\n<h2>Is Surekliligi ve Felaket Senaryosu<\/h2>\n<p>Basarili bir yanal hareket sonrasi OT agina ulasan saldirganin yaratabilecegi felaket senaryolari:<\/p>\n<table>\n<tbody>\n<tr>\n<th>Senaryo<\/th>\n<th>Mekanizma<\/th>\n<th>HES Etkisi<\/th>\n<\/tr>\n<tr>\n<td><strong>Fidye Sifrelemesi<\/strong><\/td>\n<td>HMI\/SCADA\/historian sifreleme \u2192 operator gorunurluk kaybi<\/td>\n<td>Manuel operasyona gecis, uretim kaybi: ~$18K\/saat [2]<\/td>\n<\/tr>\n<tr>\n<td><strong>PLC Manipulasyonu<\/strong><\/td>\n<td>Governor PLC logic degisikligi \u2192 kontrolsuz ayar kanadi hareketi<\/td>\n<td>Turbin asiri hiz \u2192 mekanik ariza, $250K-$500K [1]<\/td>\n<\/tr>\n<tr>\n<td><strong>SIS Devre Disi<\/strong><\/td>\n<td>TRITON benzeri SIS kontrolor reprogramlama [5]<\/td>\n<td>Son guvenlik hatti yok \u2192 felaket potansiyeli<\/td>\n<\/tr>\n<tr>\n<td><strong>Veri Silme (Wiper)<\/strong><\/td>\n<td>Historian, SCADA config, PLC backup yedeklerini silme<\/td>\n<td>Toparlanma suresi haftalara uzar, forensic kanit yok<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><em style=\"text-align: center\">\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0Tablo 4: OT Agina Ulasan Saldirganin Felaket Senaryolari [1][2][5]<\/em><\/p>\n<h1>Savunma Katmanlari: Erken Tespit ve Zero Trust<\/h1>\n<h2>Anomali Analizi ile APT Gizliligini Kirmak<\/h2>\n<p>APT saldirilar\u0131, imza tabanli guvenlik araclari atlatmak uzere tasarlanmistir &#8212; bilinen kotu yazilim imzalarini kullanmaz, mesru araclari (living-off-the-land) tercih eder ve normal trafik paternlerini taklit eder. Bu nedenle geleneksel antivirus ve firewall katmanlari yetersiz kalir<sup>[4]<\/sup>.<\/p>\n<p>Etkili bir savunma stratejisi,\u00a0<strong>davranissal anomali analizi<\/strong>\u00a0uzerine kurulmalidir: her cihazin, her protokolun ve her surec degiskeninin &#8216;normal&#8217; davranisini ogrenen bir ML modeli, sapmalari &#8212; ne kadar kucuk olursa olsun &#8212; tespit edebilir<sup>[13]<\/sup>. NIST SP 800-207 Zero Trust mimarisi<sup>[7]<\/sup>\u00a0bu yaklasimin cercevesini olusturur: &#8216;Asla Guvenme, Her Zaman Dogrula.&#8217;<\/p>\n<p>\u25ba\u00a0<a href=\"https:\/\/csrc.nist.gov\/pubs\/sp\/800\/207\/final\">NIST SP 800-207 Zero Trust Architecture \u2192 https:\/\/csrc.nist.gov\/pubs\/sp\/800\/207\/final<\/a><br \/>\n\u25ba\u00a0<a href=\"https:\/\/attack.mitre.org\/techniques\/ics\/\">MITRE ATT&amp;CK for ICS \u2192 https:\/\/attack.mitre.org\/techniques\/ics\/<\/a><\/p>\n<table>\n<tbody>\n<tr>\n<th>Savunma Katmani<\/th>\n<th>APT&#8217;ye Karsi Etkinlik<\/th>\n<th>Fidye Yazilimina Karsi Etkinlik<\/th>\n<\/tr>\n<tr>\n<td><strong>DPI (Derin Paket Inceleme)<\/strong><\/td>\n<td>Yetkisiz Modbus FC, OPC UA oturum tespiti &#8212; gizli kesif trafi\u011fini yakalar [13]<\/td>\n<td>Sifreleme oncesi dosya yayilim trafi\u011fini ve SMB lateral movement&#8217;i tespit [13]<\/td>\n<\/tr>\n<tr>\n<td><strong>ML Davranissal Analiz<\/strong><\/td>\n<td>Normal trafik taklit eden APT&#8217;yi baseline sapmasiyla tespit &#8212; en etkili katman [13]<\/td>\n<td>Anormal dosya erisim desenleri, toplu sifreleme aktivitesi tespiti [13]<\/td>\n<\/tr>\n<tr>\n<td><strong>Mikro-Segmentasyon<\/strong><\/td>\n<td>Yanal hareketi IEC 62443 bolge\/kanal duzeyinde durdurur [8]<\/td>\n<td>Fidye yayilimini etkilenen zone ile sinirlar [8]<\/td>\n<\/tr>\n<tr>\n<td><strong>PAM (Ayricalikli Erisim)<\/strong><\/td>\n<td>EWS&#8217;ye dogrudan RDP&#8217;yi ortadan kaldirir, MFA + oturum kaydi [13]<\/td>\n<td>Credential harvesting&#8217;i MFA ile bloke eder [13]<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p class=\"caption\" style=\"text-align: center\"><em>Tablo 5: Savunma Katmanlarinin APT ve Fidye Yazilimina Karsi Etkinligi [7][8][13]<\/em><\/p>\n<h1>Teknik Risk Skorlama Modeli<\/h1>\n<p>APT ve fidye yazilimi tehditlerinin HES&#8217;e ozgu riskini olcmek icin FAIR metodolojisi<sup>[9]<\/sup>\u00a0uyarlanmistir. IEC 62443-3-2<sup>[8]<\/sup>\u00a0ve NERC CIP<sup>[10]<\/sup>\u00a0uyumludur.<\/p>\n<div class=\"risk-formula\">Risk Puani (R) = T \u00d7 V \u00d7 I<br \/>\nT = Tehdit Olasiligi (1-10) \u00a0|\u00a0 V = Zafiyet Somurlebilirli\u011fi (1-10) \u00a0|\u00a0 I = Operasyonel Etki (1-10)<\/div>\n<h3>Senaryo Kars\u0131lastirmasi: APT vs Fidye Yazilimi<\/h3>\n<table>\n<tbody>\n<tr>\n<th>Senaryo<\/th>\n<th>T<\/th>\n<th>V<\/th>\n<th>I<\/th>\n<th>R<\/th>\n<th>Gerekc\u0435<\/th>\n<\/tr>\n<tr>\n<td><strong>APT: Governor PLC<\/strong><\/td>\n<td><strong>8<\/strong><\/td>\n<td><strong>8<\/strong><\/td>\n<td><strong>9<\/strong><\/td>\n<td><strong>576<\/strong><\/td>\n<td>Ulus-devlet APT, Modbus TCP (auth yok), turbin asiri hiz [2][6]<\/td>\n<\/tr>\n<tr>\n<td><strong>Fidye: SCADA\/HMI<\/strong><\/td>\n<td><strong>7<\/strong><\/td>\n<td><strong>7<\/strong><\/td>\n<td><strong>7<\/strong><\/td>\n<td><strong>343<\/strong><\/td>\n<td>Organize suc, eski OS\/EDR yok, operasyonel korlu\u043a [2][11]<\/td>\n<\/tr>\n<tr>\n<td><strong>Fidye: Historian DB<\/strong><\/td>\n<td><strong>7<\/strong><\/td>\n<td><strong>6<\/strong><\/td>\n<td><strong>5<\/strong><\/td>\n<td><strong>210<\/strong><\/td>\n<td>Veri kaybi, compliance ihlali, forensic kayip [9]<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p class=\"caption\"><em>\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0Tablo 8: APT ve Fidye Yazilimi Risk Puanlama Kars\u0131lastirmasi [9]<\/em><\/p>\n<h1>Hydrowise: Uctan Uca Dijital Enerji Yonetim Platformu<\/h1>\n<h2>Platform Genel Bakisi<\/h2>\n<p><strong>Hydrowise<\/strong>, hidroelektrik santraller icin uctan uca dijital donusumu saglamak uzere tasarlanmis yapay zeka destekli bir enerji yonetim platformudur. SCADA ve IoT sensorlerinden gercek zamanli veri toplayarak santral performansini surekli izler ve tum kritik operasyonel parametreler uzerinde guvenilir gorunurluk saglar<sup>[13]<\/sup>.<\/p>\n<p>Siber guvenlik, bu kapsamli platformun kritik bir bile\u015fenidir. Kurumsal IT guvenlik araclari OT&#8217;ye uyarlamak yerine &#8212; bu araclar gecikme ekler, yanlis pozitifler uretir ve ICS protokol gorunurlugunden yoksundur &#8212; Hydrowise, hem APT gizliligini kiran hem de fidye yazilimi yayilimini durduran amaca yonelik bir guvenlik katmani saglar<sup>[13]<\/sup>.<\/p>\n<h2>3Adimda Nasil Calisir?<\/h2>\n<table>\n<tbody>\n<tr>\n<th>#<\/th>\n<th>Adim<\/th>\n<th>Aciklama<\/th>\n<\/tr>\n<tr>\n<td><strong>1<\/strong><\/td>\n<td><strong>Yapay Zeka Destekli Veri Entegrasyonu<\/strong><\/td>\n<td>SCADA, sensorler ve IoT cihazlarindan gelen gercek zamanli operasyonel veriler guvenli bicimde toplanir ve Hydrowise platformunda birlestirilir. Guvenlik olaylari ile surec verileri tek merkezden izlenir.<\/td>\n<\/tr>\n<tr>\n<td><strong>2<\/strong><\/td>\n<td><strong>Yapay Zeka Destekli Analiz<\/strong><\/td>\n<td>Buyuk veri teknolojileri ile operasyonel parametreler islenir. Ag guvenlik olaylari ile surec verileri korelasyon altinda birlestirilerek anomali tespiti, uretim tahmini ve risk analizi yapilir.<\/td>\n<\/tr>\n<tr>\n<td><strong>3<\/strong><\/td>\n<td><strong>Tahmin, Tespit &amp; Karar Destek<\/strong><\/td>\n<td>ML algoritmalari: uretim tahmini, kestirimci bakim, su debisi ongorusu, anomali tespiti (\u22644sn). EP\u0130A\u015e pazar entegrasyonu, otomatik raporlama ve karar destek mekanizmalari ile yoneticilere eyleme donusturulebilir zeka sunulur [13].<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p class=\"caption\" style=\"text-align: center\"><em>Tablo 6: Hydrowise &#8212; 3 Adimda Nasil Calisir [13]<\/em><\/p>\n<div class=\"callout\">\n<p><strong>\ud83d\udd0d Teknik Not: HES-Spesifik Yapay Zeka Yetenekleri<\/strong><\/p>\n<p><strong>Su Debisi Tahmini:<\/strong>\u00a0Meteorolojik veriler (yagis, kar erimesi, sicaklik), havza hidrolojik parametreleri ve gecmis akis kayitlari uzerinde egitilmis ML modeli. Saatlik ve gunluk cozunurlukle 72 saatlik tahmin penceresi.<\/p>\n<p><strong>Rezervuar Seviye Izleme:<\/strong>\u00a0Gercek zamanli seviye sensoru + akis tahmini entegrasyonu. Dolma\/bosalma egrileri ve taskin riski erken uyarisi ile optimum su yonetimi.<\/p>\n<p><strong>Uretim Tahmini:<\/strong>\u00a0Rezervuar seviyesi + su debisi + turbin verimlili\u043a egrileri + piyasa fiyat sinyalleri entegre tahmini. EP\u0130A\u015e GOP\/GIP teslim donemlerine uyumlu cikti.<\/p>\n<p><strong>Kestirimci Bakim:<\/strong>\u00a0Turbin titresim profili, rulman sicaklik trendi, yag kalitesi, sargi yalitim direncinden cok degiskenli anomali skorlamasi. Plansiz duruslari onlemek icin bakim penceresi onerisi.<\/p>\n<p><strong>EP\u0130A\u015e Pazar Entegrasyonu:<\/strong>\u00a0Gun Oncesi Piyasasi (GOP) ve Gun Ici Piyasasi (GIP) fiyat sinyalleri ile entegre optimizasyon. Otomatik bildirim hazirlama, dengesizlik risk analizi ve gelir maksimizasyonu.<\/p>\n<\/div>\n<h1>Vaka Analizi: 200 MW HES Uzerinde APT + Fidye Yazilimi Hibrit Saldiri Simulasyonu<\/h1>\n<p>Asagidaki senaryo, dort adet 50 MW Francis turbin-jenerator unitesine sahip kurgusal bir 200 MW depolamali HES (&#8220;Santral Alfa&#8221;) uzerinde ulus-devlet APT kampanyasini takip eden firsatci fidye yazilimi saldirisini modellemektedir. Santral Siemens S7-1500 PLC&#8217;ler, Modbus TCP ve OPC UA gateway kullanmaktadir<sup>[4]<\/sup>.<\/p>\n<table>\n<tbody>\n<tr>\n<th>Gun<\/th>\n<th>Asama<\/th>\n<th>Saldirgan Aksiyonu<\/th>\n<th>Hydrowise Tespiti<\/th>\n<\/tr>\n<tr>\n<td><strong>G1<\/strong><\/td>\n<td><strong>Ilk Erisim<\/strong><\/td>\n<td>Spear-phishing \u2192 IT endpoint ele gecirme. DarkSide varianti yukleme.<\/td>\n<td>&#8212; (IT scope, Hydrowise OT odakli)<\/td>\n<\/tr>\n<tr>\n<td><strong>G3<\/strong><\/td>\n<td><strong>Yanal Hareket<\/strong><\/td>\n<td>RDP ile EWS&#8217;ye gecis. Mimikatz ile credential dump. OT agi tarama baslatma.<\/td>\n<td>\ud83d\udfe2 DPI: EWS&#8217;den gelen yeni Modbus tarama trafigi tespit [13]<\/td>\n<\/tr>\n<tr>\n<td><strong>G7<\/strong><\/td>\n<td><strong>OT Kesfi<\/strong><\/td>\n<td>PLC envanteri cikarma (S7comm read), kontrol mantigi analizi, SCADA config dump.<\/td>\n<td>\ud83d\udfe2 ML: baseline disi S7comm session sikligi anomali [13]<\/td>\n<\/tr>\n<tr>\n<td><strong>G14<\/strong><\/td>\n<td><strong>Fidye Dagitimy<\/strong><\/td>\n<td>HMI\/SCADA sifreleme baslatma. Historian DB kilitleme. Fidye notu birakma.<\/td>\n<td>\ud83d\udd34 DPI: SMB mass file encryption trafigi \u2192 otomatik izolasyon [13]<\/td>\n<\/tr>\n<tr>\n<td><strong>G14+4sn<\/strong><\/td>\n<td><strong>Hydrowise Yanit<\/strong><\/td>\n<td>&#8212;<\/td>\n<td>\ud83d\udee1 Adaptif segmentasyon: etkilenen zone izole. Saglamuniteler yuk aktarimi. EP\u0130A\u015e bildirimi guncelleme [13].<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p class=\"caption\" style=\"text-align: center\"><em>Tablo 9: Hibrit APT + Fidye Yazilimi Saldiri Zaman Cizelgesi [4][13]<\/em><\/p>\n<p>Bu senaryo, APT kesif asamasinin fidye yazilimi dagitimini kolaylastirdigi hibrit bir saldiri modelini gostermektedir. Hydrowise&#8217;in DPI motoru G3&#8217;te yanal hareket trafi\u011fini, ML modeli G7&#8217;de baseline disi PLC iletisimini tespit ederdi. G14&#8217;te fidye dagitimy basladiginda adaptif segmentasyon etkilenen zone&#8217;u saniyeler icinde izole ederken, enerji yonetim katmani kalan unitelerin yuk dag\u0131l\u0131mini otomatik olarak yeniden hesaplar ve EP\u0130A\u015e bildirimlerini gunceller<sup>[13]<\/sup>.<\/p>\n<p>Ayrica Hydrowise&#8217;in enerji yonetim katmani, saldiri sonrasi toparlanma surecinde de kritik deger sunar: kalan uc unitenin optimum yuk dag\u0131l\u0131mini otomatik olarak yeniden hesaplar (3 x 50 MW), EP\u0130A\u015e pazar bildirimleri icin uretim kapasitesini gunceller ve kestirimci bakim modulu plansiz duraklatma surelerini minimize eder<sup>[13]<\/sup>. Boylece guvenlik olayinin finansal etkisi yalnizca tespit ile degil, entegre enerji yonetimi zekasi ile de azaltilir.<\/p>\n<h1>Teknik Derinlemesine \u0130nceleme<\/h1>\n<p><strong>S1: APT ile fidye yazilimi arasindaki temel fark HES guvenligi acisindan nedir?<\/strong><br \/>\nAPT ulus-devlet destekli, uzun vadeli ve gizli sabotaj kampanyalaridir (mediyan 21 gun bekletilme); fiziksel hasar hedefler. Fidye yazilimi finansal motivasyonlu, hizli ve gurult\u00fcludur; operasyonel kesinti yaratarak fidye talep eder. HES&#8217;ler her ikisine karsi farkli savunma katmanlarina ihtiyac duyar<sup>[3][11]<\/sup>.<\/p>\n<p><strong>S2: Hydrowise, APT&#8217;nin normal trafik taklitini nasil tespit eder?<\/strong><br \/>\n30 gunluk baseline ile her cihaz, protokol ve surec degiskeni icin &#8216;normal&#8217; davranisi ogrenen ML modeli. APT trafigi mesru gorunse de, mikro-duzeyde frekans, timing ve korelasyon sapmalari tespit edilir<sup>[13]<\/sup>.<\/p>\n<p><strong>S3: Kill chain&#8217;in hangi asamasinda Hydrowise en etkilidir?<\/strong><br \/>\nAsama 3 (Yanal Hareket) ve Asama 5 (ICS Silah Dagitimy). DPI ile yanal hareket trafigi, ML ile OT kesif aktiviteleri, adaptif segmentasyon ile fidye yayilimi durdurulur<sup>[4][13]<\/sup>.<\/p>\n<p><strong>S4: Fidye yazilimi HMI\/SCADA&#8217;yi sifrelerse santral nasil calismaya devam eder?<\/strong><br \/>\nHydrowise, etkilenen zone&#8217;u izole eder ve saglamunitelerin yuk dag\u0131l\u0131mini otomatik yeniden hesaplar. EP\u0130A\u015e pazar bildirimleri guncellenir. Kestirimci bakim modulu toparlanma surecini optimize eder<sup>[13]<\/sup>.<\/p>\n<p><strong>S5: Colonial Pipeline benzeri bir saldiri HES&#8217;te ne etkisi yaratir?<\/strong><br \/>\nColonial&#8217;de IT sifrelemesi OT operasyonlarinin onlem olarak durdurulmasina neden oldu. Bir HES&#8217;te ayni senaryo: SCADA gorunurluk kaybi \u2192 manuel operasyon \u2192 uretim kaybi (~$18K\/saat) \u2192 EP\u0130A\u015e dengesizlik cezasi. Hydrowise&#8217;in IT\/OT segmentasyonu bu domino etkisini onler<sup>[2][13]<\/sup>.<\/p>\n<p><strong>S6: Stuxnet benzeri PLC logic manipulasyonuna karsi savunma nedir?<\/strong><br \/>\nCift katmanli tespit: (1) Ag &#8212; PLC programlama oturumlari (S7comm yazma) DPI ile tespit ve degisiklik yonetimi kayitlariyla korelasyon<sup>[4]<\/sup>. (2) Surec &#8212; davranissal model, PLC logic degisikliginin downstream etkisini (turbin hiz sapmas\u0131, sicaklik trendi) tespit eder<sup>[13]<\/sup>.<\/p>\n<p><strong>S7: Bekletilme suresini (dwell time) nasil minimize edersiniz?<\/strong><br \/>\nHydrowise MTTD: ag anomalileri &lt;4sn, surec anomalileri &lt;15sn. Sektor mediyani: APT 21 gun, fidye 5 gun. ML tabanli surekli izleme, bekletilme suresini saniye mertebesine dusuror<sup>[11][13]<\/sup>.<\/p>\n<p><strong>S8: Hangi uyumluluk cercevaleri desteklenir?<\/strong><br \/>\nIEC 62443<sup>[8]<\/sup>, NIST CSF 2.0<sup>[12]<\/sup>, NERC CIP<sup>[10]<\/sup>, AB NIS2 Direktifi, ISO\/IEC 27001 Ek A. Otomatik uyumluluk raporlari &#8212; her kontrol Hydrowise telemetrisi ve olay kayitlarina baglanir<sup>[8][10][12][13]<\/sup>.<\/p>\n<p><strong>S9: EP\u0130A\u015e pazar entegrasyonu siber guvenlik olaylarinda nasil calisir?<\/strong><br \/>\nSaldiri sirasinda Hydrowise kalan uretim kapasitesini otomatik hesaplar, GOP\/GIP bildirimlerini gunceller ve dengesizlik riski analizi yapar. Siber guvenlik katmani pazar verisi kanallarinin butunlugunu de korur<sup>[13]<\/sup>.<\/p>\n<p><strong>S10: Kurulum suresi ve surec nasildir?<\/strong><br \/>\nAsamali: Hf 1-2 (Saha degerlendirmesi + TAP kurulumu) \u2192 Hf 3-6 (Pasif izleme + baseline) \u2192 Hf 7-8 (Model dogrulama + YP ayarlama) \u2192 Hf 9-10 (Aktif uygulama + egitim). Toplam: ~10 hafta, uretimde sifir kesinti<sup>[13]<\/sup>.<\/p>\n<h1>Sonu\u00e7 ve Eylem \u00c7a\u011fr\u0131s\u0131<\/h1>\n<p>Endustriyel kontrol sistemlerine yonelik fidye yazilimi ve APT tehditleri, HES operatorleri icin artik teorik senaryolar degil &#8212; gerceklesmis ve tekrarlanan saldirilardir. Stuxnet fiziksel yikimin mumkun oldugunu, Colonial Pipeline IT\/OT bagimliliginin kritik altyapiyi felc edebilecegini, TRITON ise saldirganlar\u0131n son guvenlik hattini bile hedef alacagini kanitlamistir.<\/p>\n<p>Hydrowise bu tehditlere uctan uca dijital enerji yonetim platformu olarak yanit verir: DPI ile yanal hareket trafi\u011fini durduran, ML davranissal analiz ile APT gizliligini kiran, adaptif segmentasyon ile fidye yayilimini sinirlandiran ve tum bunlari uretim tahmini, kestirimci bakim ve EP\u0130A\u015e pazar entegrasyonu ile birlestiren butunlesik bir yaklasim<sup>[13]<\/sup>. Sonuc: HES&#8217;ler hem siber direnclilik hem operasyonel verimlilik kazanir.<\/p>\n<p>[\/vc_column_text][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row][vc_column][vc_column_text css=&#8221;&#8221;] ICS Fidye Yaz\u0131l\u0131m\u0131 ve APT Tehditleri Sald\u0131r\u0131Ya\u015fam D\u00f6ng\u00fcs\u00fc, Yanal Hareket ve Yapay Zeka Destekli Savunma Hydrowise Yapay Zeka Destekli Hidroelektrik Santral Y\u00f6netim Sistemi Renewasoft | 2026 Seviye: \u0130leri \u00a0 Hedef Kitle: SCADA M\u00fchendisi, HES \u0130\u015fletmecisi, CTO, Altyap\u0131 Yat\u0131r\u0131mc\u0131s\u0131 Giri\u015f: Fidyenin \u00d6tesinde &#8212; End\u00fcstriyel Kontrol Sistemlerinde Sessiz Sava\u015f 2021 y\u0131l\u0131nda Colonial Pipeline sald\u0131r\u0131s\u0131, ABD&#8217;nin [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1863],"tags":[],"class_list":["post-2991","post","type-post","status-publish","format-standard","hentry","category-kritik-altyapi-siber-guvenligi-ve-endustriyel-sistem-guvenligi"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>End\u00fcstriyel Kontrol Sistemlerine (ICS) Y\u00f6nelik Fidye Yaz\u0131l\u0131m\u0131 ve APT Tehditleri - Renewasoft Enerji ve Yaz\u0131l\u0131m A.\u015e<\/title>\n<meta name=\"description\" content=\"ICS altyap\u0131lar\u0131nda fidye yaz\u0131l\u0131m\u0131 ve APT sald\u0131r\u0131 yasam d\u00f6ng\u00fcs\u00fc, yanal hareket riskleri ve Hydrowise&#039;\u0131n yapay zeka destekli erken tespit mimarisi.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/renewasoft.com.tr\/index.php\/tr\/2026\/02\/26\/ics-fidye-yazilimi-ve-apt-tehditleri\/\" \/>\n<meta property=\"og:locale\" content=\"tr_TR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"End\u00fcstriyel Kontrol Sistemlerine (ICS) Y\u00f6nelik Fidye Yaz\u0131l\u0131m\u0131 ve APT Tehditleri - Renewasoft Enerji ve Yaz\u0131l\u0131m A.\u015e\" \/>\n<meta property=\"og:description\" content=\"ICS altyap\u0131lar\u0131nda fidye yaz\u0131l\u0131m\u0131 ve APT sald\u0131r\u0131 yasam d\u00f6ng\u00fcs\u00fc, yanal hareket riskleri ve Hydrowise&#039;\u0131n yapay zeka destekli erken tespit mimarisi.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/renewasoft.com.tr\/index.php\/tr\/2026\/02\/26\/ics-fidye-yazilimi-ve-apt-tehditleri\/\" \/>\n<meta property=\"og:site_name\" content=\"Renewasoft Enerji ve Yaz\u0131l\u0131m A.\u015e\" \/>\n<meta property=\"article:published_time\" content=\"2026-02-26T22:34:33+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-28T00:34:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/renewasoft.com.tr\/wp-content\/uploads\/2026\/02\/ics-gorsel-1-apt-vs-ransomware.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1400\" \/>\n\t<meta property=\"og:image:height\" content=\"700\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Bayram Kamus\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Yazan:\" \/>\n\t<meta name=\"twitter:data1\" content=\"Bayram Kamus\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tahmini okuma s\u00fcresi\" \/>\n\t<meta name=\"twitter:data2\" content=\"18 dakika\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/renewasoft.com.tr\/index.php\/tr\/2026\/02\/26\/ics-fidye-yazilimi-ve-apt-tehditleri\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/renewasoft.com.tr\/index.php\/tr\/2026\/02\/26\/ics-fidye-yazilimi-ve-apt-tehditleri\/\"},\"author\":{\"name\":\"Bayram Kamus\",\"@id\":\"https:\/\/renewasoft.com.tr\/#\/schema\/person\/34e2b2ece2456ef9b7617d547b7f46ba\"},\"headline\":\"End\u00fcstriyel Kontrol Sistemlerine (ICS) Y\u00f6nelik Fidye Yaz\u0131l\u0131m\u0131 ve APT Tehditleri\",\"datePublished\":\"2026-02-26T22:34:33+00:00\",\"dateModified\":\"2026-02-28T00:34:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/renewasoft.com.tr\/index.php\/tr\/2026\/02\/26\/ics-fidye-yazilimi-ve-apt-tehditleri\/\"},\"wordCount\":3049,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/renewasoft.com.tr\/#organization\"},\"image\":{\"@id\":\"https:\/\/renewasoft.com.tr\/index.php\/tr\/2026\/02\/26\/ics-fidye-yazilimi-ve-apt-tehditleri\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/renewasoft.com.tr\/wp-content\/uploads\/2026\/02\/ics-gorsel-1-apt-vs-ransomware.png\",\"articleSection\":[\"Kritik Altyap\u0131 Siber G\u00fcvenli\u011fi ve End\u00fcstriyel Sistem G\u00fcvenli\u011fi\"],\"inLanguage\":\"tr\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/renewasoft.com.tr\/index.php\/tr\/2026\/02\/26\/ics-fidye-yazilimi-ve-apt-tehditleri\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/renewasoft.com.tr\/index.php\/tr\/2026\/02\/26\/ics-fidye-yazilimi-ve-apt-tehditleri\/\",\"url\":\"https:\/\/renewasoft.com.tr\/index.php\/tr\/2026\/02\/26\/ics-fidye-yazilimi-ve-apt-tehditleri\/\",\"name\":\"End\u00fcstriyel Kontrol Sistemlerine (ICS) Y\u00f6nelik Fidye Yaz\u0131l\u0131m\u0131 ve APT Tehditleri - Renewasoft Enerji ve Yaz\u0131l\u0131m A.\u015e\",\"isPartOf\":{\"@id\":\"https:\/\/renewasoft.com.tr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/renewasoft.com.tr\/index.php\/tr\/2026\/02\/26\/ics-fidye-yazilimi-ve-apt-tehditleri\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/renewasoft.com.tr\/index.php\/tr\/2026\/02\/26\/ics-fidye-yazilimi-ve-apt-tehditleri\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/renewasoft.com.tr\/wp-content\/uploads\/2026\/02\/ics-gorsel-1-apt-vs-ransomware.png\",\"datePublished\":\"2026-02-26T22:34:33+00:00\",\"dateModified\":\"2026-02-28T00:34:48+00:00\",\"description\":\"ICS altyap\u0131lar\u0131nda fidye yaz\u0131l\u0131m\u0131 ve APT sald\u0131r\u0131 yasam d\u00f6ng\u00fcs\u00fc, yanal hareket riskleri ve Hydrowise'\u0131n yapay zeka destekli erken tespit mimarisi.\",\"breadcrumb\":{\"@id\":\"https:\/\/renewasoft.com.tr\/index.php\/tr\/2026\/02\/26\/ics-fidye-yazilimi-ve-apt-tehditleri\/#breadcrumb\"},\"inLanguage\":\"tr\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/renewasoft.com.tr\/index.php\/tr\/2026\/02\/26\/ics-fidye-yazilimi-ve-apt-tehditleri\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"tr\",\"@id\":\"https:\/\/renewasoft.com.tr\/index.php\/tr\/2026\/02\/26\/ics-fidye-yazilimi-ve-apt-tehditleri\/#primaryimage\",\"url\":\"https:\/\/renewasoft.com.tr\/wp-content\/uploads\/2026\/02\/ics-gorsel-1-apt-vs-ransomware.png\",\"contentUrl\":\"https:\/\/renewasoft.com.tr\/wp-content\/uploads\/2026\/02\/ics-gorsel-1-apt-vs-ransomware.png\",\"width\":1400,\"height\":700},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/renewasoft.com.tr\/index.php\/tr\/2026\/02\/26\/ics-fidye-yazilimi-ve-apt-tehditleri\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Anasayfa\",\"item\":\"https:\/\/renewasoft.com.tr\/index.php\/tr\/ana-sayfa\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"End\u00fcstriyel Kontrol Sistemlerine (ICS) Y\u00f6nelik Fidye Yaz\u0131l\u0131m\u0131 ve APT Tehditleri\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/renewasoft.com.tr\/#website\",\"url\":\"https:\/\/renewasoft.com.tr\/\",\"name\":\"Renewasoft Enerji ve Yaz\u0131l\u0131m A.\u015e\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/renewasoft.com.tr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/renewasoft.com.tr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"tr\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/renewasoft.com.tr\/#organization\",\"name\":\"Renewasoft Enerji ve Yaz\u0131l\u0131m A.\u015e\",\"url\":\"https:\/\/renewasoft.com.tr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"tr\",\"@id\":\"https:\/\/renewasoft.com.tr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/renewasoft.com.tr\/wp-content\/uploads\/2025\/03\/images.jpg\",\"contentUrl\":\"https:\/\/renewasoft.com.tr\/wp-content\/uploads\/2025\/03\/images.jpg\",\"width\":225,\"height\":225,\"caption\":\"Renewasoft Enerji ve Yaz\u0131l\u0131m A.\u015e\"},\"image\":{\"@id\":\"https:\/\/renewasoft.com.tr\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/renewasoft\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/renewasoft.com.tr\/#\/schema\/person\/34e2b2ece2456ef9b7617d547b7f46ba\",\"name\":\"Bayram Kamus\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"tr\",\"@id\":\"https:\/\/renewasoft.com.tr\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5dc034653d3652a594cbe48c6b4c7bd9794d8e11f0bc0d2219fb266b54ce0149?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5dc034653d3652a594cbe48c6b4c7bd9794d8e11f0bc0d2219fb266b54ce0149?s=96&d=mm&r=g\",\"caption\":\"Bayram Kamus\"},\"url\":\"https:\/\/renewasoft.com.tr\/index.php\/author\/bayram\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"End\u00fcstriyel Kontrol Sistemlerine (ICS) Y\u00f6nelik Fidye Yaz\u0131l\u0131m\u0131 ve APT Tehditleri - Renewasoft Enerji ve Yaz\u0131l\u0131m A.\u015e","description":"ICS altyap\u0131lar\u0131nda fidye yaz\u0131l\u0131m\u0131 ve APT sald\u0131r\u0131 yasam d\u00f6ng\u00fcs\u00fc, yanal hareket riskleri ve Hydrowise'\u0131n yapay zeka destekli erken tespit mimarisi.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/renewasoft.com.tr\/index.php\/tr\/2026\/02\/26\/ics-fidye-yazilimi-ve-apt-tehditleri\/","og_locale":"tr_TR","og_type":"article","og_title":"End\u00fcstriyel Kontrol Sistemlerine (ICS) Y\u00f6nelik Fidye Yaz\u0131l\u0131m\u0131 ve APT Tehditleri - Renewasoft Enerji ve Yaz\u0131l\u0131m A.\u015e","og_description":"ICS altyap\u0131lar\u0131nda fidye yaz\u0131l\u0131m\u0131 ve APT sald\u0131r\u0131 yasam d\u00f6ng\u00fcs\u00fc, yanal hareket riskleri ve Hydrowise'\u0131n yapay zeka destekli erken tespit mimarisi.","og_url":"https:\/\/renewasoft.com.tr\/index.php\/tr\/2026\/02\/26\/ics-fidye-yazilimi-ve-apt-tehditleri\/","og_site_name":"Renewasoft Enerji ve Yaz\u0131l\u0131m A.\u015e","article_published_time":"2026-02-26T22:34:33+00:00","article_modified_time":"2026-02-28T00:34:48+00:00","og_image":[{"width":1400,"height":700,"url":"https:\/\/renewasoft.com.tr\/wp-content\/uploads\/2026\/02\/ics-gorsel-1-apt-vs-ransomware.png","type":"image\/png"}],"author":"Bayram Kamus","twitter_card":"summary_large_image","twitter_misc":{"Yazan:":"Bayram Kamus","Tahmini okuma s\u00fcresi":"18 dakika"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/renewasoft.com.tr\/index.php\/tr\/2026\/02\/26\/ics-fidye-yazilimi-ve-apt-tehditleri\/#article","isPartOf":{"@id":"https:\/\/renewasoft.com.tr\/index.php\/tr\/2026\/02\/26\/ics-fidye-yazilimi-ve-apt-tehditleri\/"},"author":{"name":"Bayram Kamus","@id":"https:\/\/renewasoft.com.tr\/#\/schema\/person\/34e2b2ece2456ef9b7617d547b7f46ba"},"headline":"End\u00fcstriyel Kontrol Sistemlerine (ICS) Y\u00f6nelik Fidye Yaz\u0131l\u0131m\u0131 ve APT Tehditleri","datePublished":"2026-02-26T22:34:33+00:00","dateModified":"2026-02-28T00:34:48+00:00","mainEntityOfPage":{"@id":"https:\/\/renewasoft.com.tr\/index.php\/tr\/2026\/02\/26\/ics-fidye-yazilimi-ve-apt-tehditleri\/"},"wordCount":3049,"commentCount":0,"publisher":{"@id":"https:\/\/renewasoft.com.tr\/#organization"},"image":{"@id":"https:\/\/renewasoft.com.tr\/index.php\/tr\/2026\/02\/26\/ics-fidye-yazilimi-ve-apt-tehditleri\/#primaryimage"},"thumbnailUrl":"https:\/\/renewasoft.com.tr\/wp-content\/uploads\/2026\/02\/ics-gorsel-1-apt-vs-ransomware.png","articleSection":["Kritik Altyap\u0131 Siber G\u00fcvenli\u011fi ve End\u00fcstriyel Sistem G\u00fcvenli\u011fi"],"inLanguage":"tr","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/renewasoft.com.tr\/index.php\/tr\/2026\/02\/26\/ics-fidye-yazilimi-ve-apt-tehditleri\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/renewasoft.com.tr\/index.php\/tr\/2026\/02\/26\/ics-fidye-yazilimi-ve-apt-tehditleri\/","url":"https:\/\/renewasoft.com.tr\/index.php\/tr\/2026\/02\/26\/ics-fidye-yazilimi-ve-apt-tehditleri\/","name":"End\u00fcstriyel Kontrol Sistemlerine (ICS) Y\u00f6nelik Fidye Yaz\u0131l\u0131m\u0131 ve APT Tehditleri - Renewasoft Enerji ve Yaz\u0131l\u0131m A.\u015e","isPartOf":{"@id":"https:\/\/renewasoft.com.tr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/renewasoft.com.tr\/index.php\/tr\/2026\/02\/26\/ics-fidye-yazilimi-ve-apt-tehditleri\/#primaryimage"},"image":{"@id":"https:\/\/renewasoft.com.tr\/index.php\/tr\/2026\/02\/26\/ics-fidye-yazilimi-ve-apt-tehditleri\/#primaryimage"},"thumbnailUrl":"https:\/\/renewasoft.com.tr\/wp-content\/uploads\/2026\/02\/ics-gorsel-1-apt-vs-ransomware.png","datePublished":"2026-02-26T22:34:33+00:00","dateModified":"2026-02-28T00:34:48+00:00","description":"ICS altyap\u0131lar\u0131nda fidye yaz\u0131l\u0131m\u0131 ve APT sald\u0131r\u0131 yasam d\u00f6ng\u00fcs\u00fc, yanal hareket riskleri ve Hydrowise'\u0131n yapay zeka destekli erken tespit mimarisi.","breadcrumb":{"@id":"https:\/\/renewasoft.com.tr\/index.php\/tr\/2026\/02\/26\/ics-fidye-yazilimi-ve-apt-tehditleri\/#breadcrumb"},"inLanguage":"tr","potentialAction":[{"@type":"ReadAction","target":["https:\/\/renewasoft.com.tr\/index.php\/tr\/2026\/02\/26\/ics-fidye-yazilimi-ve-apt-tehditleri\/"]}]},{"@type":"ImageObject","inLanguage":"tr","@id":"https:\/\/renewasoft.com.tr\/index.php\/tr\/2026\/02\/26\/ics-fidye-yazilimi-ve-apt-tehditleri\/#primaryimage","url":"https:\/\/renewasoft.com.tr\/wp-content\/uploads\/2026\/02\/ics-gorsel-1-apt-vs-ransomware.png","contentUrl":"https:\/\/renewasoft.com.tr\/wp-content\/uploads\/2026\/02\/ics-gorsel-1-apt-vs-ransomware.png","width":1400,"height":700},{"@type":"BreadcrumbList","@id":"https:\/\/renewasoft.com.tr\/index.php\/tr\/2026\/02\/26\/ics-fidye-yazilimi-ve-apt-tehditleri\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Anasayfa","item":"https:\/\/renewasoft.com.tr\/index.php\/tr\/ana-sayfa\/"},{"@type":"ListItem","position":2,"name":"End\u00fcstriyel Kontrol Sistemlerine (ICS) Y\u00f6nelik Fidye Yaz\u0131l\u0131m\u0131 ve APT Tehditleri"}]},{"@type":"WebSite","@id":"https:\/\/renewasoft.com.tr\/#website","url":"https:\/\/renewasoft.com.tr\/","name":"Renewasoft Enerji ve Yaz\u0131l\u0131m A.\u015e","description":"","publisher":{"@id":"https:\/\/renewasoft.com.tr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/renewasoft.com.tr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"tr"},{"@type":"Organization","@id":"https:\/\/renewasoft.com.tr\/#organization","name":"Renewasoft Enerji ve Yaz\u0131l\u0131m A.\u015e","url":"https:\/\/renewasoft.com.tr\/","logo":{"@type":"ImageObject","inLanguage":"tr","@id":"https:\/\/renewasoft.com.tr\/#\/schema\/logo\/image\/","url":"https:\/\/renewasoft.com.tr\/wp-content\/uploads\/2025\/03\/images.jpg","contentUrl":"https:\/\/renewasoft.com.tr\/wp-content\/uploads\/2025\/03\/images.jpg","width":225,"height":225,"caption":"Renewasoft Enerji ve Yaz\u0131l\u0131m A.\u015e"},"image":{"@id":"https:\/\/renewasoft.com.tr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/renewasoft\/"]},{"@type":"Person","@id":"https:\/\/renewasoft.com.tr\/#\/schema\/person\/34e2b2ece2456ef9b7617d547b7f46ba","name":"Bayram Kamus","image":{"@type":"ImageObject","inLanguage":"tr","@id":"https:\/\/renewasoft.com.tr\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/5dc034653d3652a594cbe48c6b4c7bd9794d8e11f0bc0d2219fb266b54ce0149?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5dc034653d3652a594cbe48c6b4c7bd9794d8e11f0bc0d2219fb266b54ce0149?s=96&d=mm&r=g","caption":"Bayram Kamus"},"url":"https:\/\/renewasoft.com.tr\/index.php\/author\/bayram\/"}]}},"_links":{"self":[{"href":"https:\/\/renewasoft.com.tr\/index.php\/wp-json\/wp\/v2\/posts\/2991","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/renewasoft.com.tr\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/renewasoft.com.tr\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/renewasoft.com.tr\/index.php\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/renewasoft.com.tr\/index.php\/wp-json\/wp\/v2\/comments?post=2991"}],"version-history":[{"count":1,"href":"https:\/\/renewasoft.com.tr\/index.php\/wp-json\/wp\/v2\/posts\/2991\/revisions"}],"predecessor-version":[{"id":3000,"href":"https:\/\/renewasoft.com.tr\/index.php\/wp-json\/wp\/v2\/posts\/2991\/revisions\/3000"}],"wp:attachment":[{"href":"https:\/\/renewasoft.com.tr\/index.php\/wp-json\/wp\/v2\/media?parent=2991"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/renewasoft.com.tr\/index.php\/wp-json\/wp\/v2\/categories?post=2991"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/renewasoft.com.tr\/index.php\/wp-json\/wp\/v2\/tags?post=2991"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}