They were autosyncing. They were prepared for not being able to sync (restore main system and sync back), but not for the sync to replicate a corrupt state.
Any backup strategy with only one backup (instead of preserving historical snapshots) is vulnerable this way.
Any backup strategy with only one backup (instead of preserving historical snapshots) is vulnerable this way.