How to stop someone who hacked my machines and my rclone folder from log in my Gdrive , i changed the password for my google account

What is the problem you are having with rclone?

rclone config file and rclone folder got hacked while using RDP service my info stoles and my accounts and files too , i changed all my password , how can i stop access to someone who have my rclone config file ?

What is your rclone version (output from rclone version)

latest version v1.53.1

Which OS you are using and how many bits (eg Windows 7, 64 bit)

Server 2012 64 bit

Which cloud storage system are you using? (eg Google Drive)

Google drive

hello and welcome to the forum

it depends on how you setup the config file.
can you post that, redacting id and password?

redacting id and password? why would i put my password on public page ?

redact -> censor or obscure (part of a text) for legal or security purposes

[googledrive]
type = drive
scope = drive
token = {"access_token":
[googledrive]
type = drive
scope = drive
token = {"access_token":

root_folder_id =

[googledrive_crypt]
type = crypt
remote = googledrive:/main
filename_encryption = standard
directory_name_encryption = true

password =
password2 =

thats all lines without the passwords

i am not a goolge drive expert, i am sure one will stop by soon.

but in the mean time you might want to run this

thank you i already revoked all apps that have access to my gdrive , and i did change the passwords for my account

now im trying to get to my rclone to mount the drive

i get this

Encrypted drive 'googledrive_crypt:': Statfs failed: failed to get Drive storageQuota: Get google
apis.*com/drive/v3/about?alt=json&fields=storageQuota&prettyPrint=false": couldn't fetch token - maybe it has expired? - refresh with "rclone config reconnect googledrive:": oauth2: cannot fetch token: 400 Bad Request
Response: {
"error": "invalid_grant",
"error_description": "Token has been expired or revoked."

now how i fix that ?

googledrive_crypt remote depends on googledrive remote.
and googledrive remote is no longer valid, you removed the oauth2 token.

in the config file, i would rename the googledrive remote to googledriveold.
and re-create a new remote named googledrive

and about the config file, did you enable encryption?
if so, the hacker would need the password to read the rclone config file.

re-create a new remote named googledrive ?

i dont get that ? i have encryption enabled yes

can you explain the re-create part please

you might be able to use https://rclone.org/commands/rclone_config_reconnect/

but i would create a new remote for googledrive.

took me forever to learn a little from rclone i wish there was just a gui have everything on it

why too difficult for new users , why everything must be so hard typing too many commands

iam not bit ching its just too much to just do one single command , why do we have to keep typing commands instead of just using mouse one click click done ?

now i cant config the reconnect can u please explain i dont know how to put the flag i dont know shit

sorry i am frustrated , i think i would just cancel my google account and wipe my gdrive so rclone wont be ever again in my life this is insane we are in 2020 not 1995

oh no, here comes @VBB

Can I ask how you believe you got hacked? I also use RDP to connect to a dedicated server, and that is one of my nightmare scenarios.

LOL@jojo :wink:

about that dedicated server.
is it local or remote?

Some of my files were displaces and deleted and i didnt touch it , i remember what i have had in my RDP its HOSTDZIRE , never go with this hoster ever again , i give up on rclone , i hate anything requires CMD , thanks for trying to help me ,

how did you connect to that rdp server?
rdp via a public ip address?

My dedicated server is remote, hosted by OVH. I connect via RDP to a public IP, like OP, most likely. So, there's always a concern, no matter how good the host is about detecting attacks.

I guess what I'm asking is, what evidence do you have that a hacker actually got in via RDP?

HOSTDZIRE
that is a very scary company.

  • offering an almost 10 year old version of windows server on a shared server.
  • allowing direct rdp over internet.

any number of hackers around the world, can hack that easily.