My home file server and HTPC was infected by malware yesterday. All files encrypted with the hacker asking for $1000 in bitcoin.
The infected computer was a Windows 10 VM on the default RDP port, I know, never got around to changing it. ALL my shares were mapped to drive letters on this VM\myaccount.
Everything is synced to Google Drive. Luckily I logged in from work during lunch to check a file I had uploaded to Google Drive from work had started to sync to my sever at home. Noticed Google Drive was uploading 1000s of files !!!This is probably the only time I'm happy my upload speed is slow
I only lost a couple of early photo albums which I have backed up offline and some application packages which can be re-downloaded and recreated. Documents, photos and home videos didn't have time to start uploading.
Nothing on the HTPC was backed up tough, TV recordings, shows and movies. Not a big deal as we mainly stream nowadays.
On the VM there was a new folder, C:\users\scan with a .exe. There was no new user profile. My password is fairly complex and no combination of the username and password is used for any online sites. Is there way in through RDP without knowing the username and password or was the hacker was able to generate the password without me noticing?
I'll need to look at offline incremental backups, any suggestions? Google Drive's revision history doesn't give me older version of the modified (encrypted) files.