That's pretty much exactly what happened to me, but with a different attack designed to turn my machine into some kind of miner.
I found this article quite amusing:
https://sysdig.com/blog/fishing-for-hackers
He basically does the *opposite* of recommended security practice and sees what happens.
Discussion
Oh like your computer is an Iranian nuclear centrifuge? nostr:nevent1qqsyjk8njlmrsne0u6yyjeyvv2xwj5snr26g3ye8ee2n3fuww39vsgszyrtkqaryyfwg4dssm2v5jk78pj9r53dq879z922lqm7tt0zzretn5gjgemk