Your email got hacked. Here's how to take it back.
Email is the master key to your digital life. Password resets, bank notifications, 2FA codes—it all flows through email. If someone's in your inbox, they can get everywhere else. Time to lock them out.
Why this is serious
Signs your email was compromised
Obvious signs
- Password stopped working
- Recovery email/phone changed
- Friends got spam "from you"
- Unfamiliar devices in login history
- Emails deleted or missing
Subtle signs
- Password reset emails you didn't request
- New email rules you didn't create
- "Read" emails you never opened
- Emails in Sent folder you didn't write
- Unfamiliar connected apps
Phase 1: Stop the Bleeding
Do these immediately. Every minute counts.
Scan your device first
10 min EasyBefore changing passwords, make sure your device isn't compromised. If there's a keylogger, they'll just capture your new password.
- Run a full antivirus/malware scan
- On Mac: Check System Settings → Privacy → Full Disk Access for suspicious apps
- On Windows: Run Windows Defender full scan
- Consider using a different, known-clean device for recovery
Regain access to your account
10-30 min ModerateIf you still have access, change your password immediately. If locked out, use account recovery.
Tip: Use a familiar device and network. Email providers use this to verify it's really you.
Sign out all other sessions
2 min EasyKick the attacker out of every device they're logged into. Most email providers have a "sign out everywhere" option.
Enable two-factor authentication
5 min EasyAdd 2FA immediately so a password alone isn't enough. Use an authenticator app, not SMS—attackers can intercept text messages.
- Google Authenticator, Authy, or Microsoft Authenticator
- Better yet: hardware key like YubiKey
- Save backup codes somewhere safe (not in email)
Phase 2: Remove Attacker Persistence
Changing your password isn't enough. Attackers set up backdoors to maintain access.
The hidden threat: email forwarding rules
Check email forwarding rules
5 min EasyThis is critical. Look for any rules that forward, redirect, or auto-delete emails—especially ones targeting keywords like "bank," "password," or "invoice."
Where to check:
- Gmail: Settings → See all settings → Filters and Blocked Addresses. Also check Forwarding and POP/IMAP tab.
- Outlook: Settings → Mail → Rules. Also check Forwarding settings.
- Yahoo: Settings → More Settings → Mailboxes → Check forwarding address
Red flags: Rules with vague names (., .., or single letters), rules forwarding to unknown addresses, rules deleting emails containing financial terms.
Review connected apps and permissions
5 min EasyAttackers may have authorized malicious apps to access your email. Revoke anything you don't recognize.
Remove app passwords
3 min EasyApp passwords let older apps bypass 2FA. If any exist that you didn't create, an attacker has a backdoor.
Check recovery options
3 min EasyMake sure your recovery email and phone number belong to you. Attackers change these to lock you out permanently.
Phase 3: Assess the Damage
Figure out what else they accessed and lock it down.
Check your Sent folder
5 min EasyDid they send emails as you? Attackers often send phishing emails to your contacts or request wire transfers from your employer.
If they sent emails: Warn your contacts. Report to your IT department if work-related.
Search for password reset emails
10 min EasySearch your email for "password reset" or "verify your account." This shows what other accounts they may have compromised.
Make a list of every account that received a reset email. You'll need to secure each one.
Check your trash and spam folders
5 min EasyAttackers often delete evidence. Look for password reset confirmations, security alerts, or bank notifications they tried to hide.
Phase 4: Secure Connected Accounts
Change passwords on everything important. Start with money, end with social.
Financial accounts first
30 min ModerateThese are the highest-value targets. Check for unauthorized transactions while you're in there.
- Bank accounts (checking, savings)
- Credit cards
- Investment accounts (401k, brokerage)
- PayPal, Venmo, Cash App
- Cryptocurrency exchanges
Report fraud within 48 hours
Shopping and subscription accounts
20 min EasyThese often have saved payment methods. Change passwords and review recent orders.
- Amazon, eBay, online retailers
- Streaming services (Netflix, Spotify)
- Food delivery (DoorDash, Uber Eats)
- Any site with saved credit cards
Social media and communication
15 min EasyAttackers use these to impersonate you or gather info for further attacks.
- Facebook, Instagram, Twitter/X, LinkedIn
- WhatsApp, Telegram, Signal
- Dating apps
Work and professional accounts
15 min EasyAlert your IT department. They may need to check for broader compromise.
- Work email and systems
- GitHub, GitLab, Bitbucket
- Cloud services (AWS, Google Cloud, Azure)
- Professional tools (Slack, Notion, Figma)
Phase 5: Protect Your Identity
If they had access to sensitive info, take these additional steps.
Freeze your credit
30 min EasyIf your email contained SSN, financial statements, or tax documents, freeze your credit immediately.
See our detailed credit freeze guide.
Freeze ChexSystems
10 min EasyPrevents attackers from opening bank accounts in your name.
Report the incident
15 min EasyCreate an official record and get a personalized recovery plan.
How did this happen?
Understanding how you got hacked helps prevent it from happening again. Common methods:
Password spray attack
Attackers try common passwords against many accounts. If your password was "Summer2024!" or similar, this is probably how.
Credential stuffing
Your password leaked in another breach and you reused it. Check Have I Been Pwned .
Phishing
You entered your password on a fake login page. Check your browser history for suspicious URLs.
Malware
A keylogger or info-stealer captured your password. That's why we scan your device first.
Prevention going forward
- Use a password manager—never reuse passwords
- Enable 2FA on everything (authenticator app, not SMS)
- Use a unique, complex password for your email (it's the master key)
- Be suspicious of login pages—check the URL carefully
- Consider a hardware security key for your most important accounts