It happened to me, too:
I had a hard drive attached to a GL.iNet- branded router (Beryl AX), serving as my NAS. The ransomware attack happened on Jan 5 2024 (I saw that's when all the !want_to_cry files were created.) But I didn't notice the attack until Feb 18th.
My setup was SMB, I had it accessible via LAN and WAN, using port 443, and it was password protected, but a very weak password. To be honest I didn't realize it was WAN-accessible; I thought it was protected behind my network/router firewall and password, which is a lot more robust. My Win10 computer wasn't affected. No files were attacked/encrypted on any devices connected within my home network -- only the drive that I gave access to WAN with a weak password directly on the router. For that reason I think this was a brute force attack via remote/online attacker that did a dictionary attack and was able to get access that way. But my IT skills are minimal and I realize there is a lot I don't know about network security.
I had an old backup so I didn't lose a whole lot of important information, but I'm definitely embarrassed that I left myself vulnerable.
I ended up doing a *.* search on the drive and picked out the things that did not get encrypted. Zip files were renamed but not encrypted: simply remove the extension they put on and you can extract the contents. Exe files were left alone, and I think .epub files were not altered either. You can try removing the file extension they added to different file types and see what's affected or not.
After all this I still have questions.
How did the attackers find access to my NAS? I don't even know what ip address to enter to find my NAS online!
If I had made my network SSID hidden, would that have helped?
If I had made access to my files read-only, would that have protected me from the attack?
Is this the same type of attack as the wannacry ransomware back in 2017?
Does anyone know if there is a decryptor available that works on this new "!want_to_cry" encryption?
Is there a chance at recovering anything encrypted, or should I just call it a day, wipe my drive and move on?
Hopefully my experience can help some of you out there.