×

20 Things You Should Immediately Do After You've Been Hacked


20 Things You Should Immediately Do After You've Been Hacked


What to Do When Your Digital Security Has Been Compromised

Uh-oh. You just clicked on a link in a suspicious-looking email, and now you can't access your accounts. What should you do now? Before you panic, you'll want to act fast; give a hacker some more time, and they can do much more damage than compromise one account. Whether it’s your email, bank account, social media, phone, or work login, here are 20 steps you'll definitely want to take as soon as possible after you've been hacked.

1779206894f96a84c2205abb3691ae52ffc386c0cbccfe8c30.jpgMichael Geiger on Unsplash

1. Disconnect the Affected Device from the Internet

If you think your computer, phone, or tablet has been compromised, disconnect it from Wi-Fi or unplug the Ethernet cable right away. This can stop the attacker from continuing to access the device or sending more data from it. Don’t shut everything down in a rush if you may need evidence later, but cutting off the connection is a smart first move.

17792069979f17f52b21a2a967178a6000280dd241f8ea1354.jpgStephen Phillips - Hostreviews.co.uk on Unsplash

2. Change the Password for the Hacked Account

Go to the affected account from a trusted device and change the password immediately. Make it long, unique, and unrelated to anything you’ve used before, since reused passwords are one of the easiest ways attackers move from one account to another. Don’t save the new password in a browser you suspect may also be compromised.

177920702181ba1a1e8d3c7085a9596bbf73264f2a6f7145fb.jpegPixabay on Pexels

3. Change Passwords on Any Linked Accounts

After securing the hacked account, think about what else is connected to it. Your email, banking apps, shopping accounts, cloud storage, and social media profiles may all be at risk if they share the same password or recovery email. Change those passwords too, starting with the most sensitive accounts first.

17792070492a171478d12a8caa98bc5fe5c8570c50e068bfae.jpegindra projects on Pexels

Advertisement

4. Turn On Two-Factor Authentication

Enable two-factor authentication on every important account that offers it. An authenticator app or hardware security key is usually stronger than text-message codes, though any extra layer is better than relying on a password alone. Once it’s turned on, save your backup codes in a secure place so you don’t lock yourself out later.

17792070738c564392497ac774e484eb1a2001489ca2ee44e5.jpgOnur Binay on Unsplash

5. Sign Out of All Active Sessions

Most major platforms let you see where your account is currently logged in. Look for a setting such as "devices," "active sessions," or "where you’re signed in," then log out of everything you don’t recognize. Even after you change your password, forcing old sessions to end can help remove access for anyone who still has it.

17792071221a054d5d3941152d003dad62ed73f5dfae04401c.jpegPixabay on Pexels

6. Check Your Account Recovery Options

Review the recovery email addresses, phone numbers, backup codes, and security questions tied to the account. Hackers often change these details so they can get back in after you regain control. Remove anything unfamiliar, update outdated information, and avoid security question answers that someone could guess from your public profiles.

17792071454ba572413ea0fdd283e26b2941a3490d9cc36f42.jpgFranck on Unsplash

7. Scan Your Device for Malware

Run a full scan using trusted security software, not a random tool you found through a search result or pop-up ad. Malware can capture passwords, watch what you type, or keep giving attackers access even after you change your login details. If the scan finds anything serious, follow the removal instructions carefully and consider getting professional help.

17792071672e40338596ccb179e7eabbfd547d2d6afc0cd178.jpgEd Hardie on Unsplash

8. Update Your Software and Operating System

Install updates for your operating system, browser, apps, and security tools as soon as possible. Many attacks succeed because old software has known weaknesses that have already been fixed in newer versions. Restart your device after updating if prompted, since some protections don’t take effect until the update fully finishes.

17792071878b44b76d68bd9f283b310eeda1c90357596474a7.jpgClint Patterson on Unsplash

9. Review Recent Account Activity

Look through recent logins, sent messages, purchases, password changes, and file activity. Pay attention to unfamiliar locations, devices, payment attempts, deleted emails, or messages you didn’t send. This helps you understand what the attacker may have accessed and gives you useful details if you need to report the incident.

1779207224ccc2a92935eaa63422ab81520585c7efdb7869a8.jpegMizuno K on Pexels

Advertisement

10. Secure Your Email Account First

Your email account deserves special attention because it’s often the key to resetting passwords everywhere else. If a hacker controls your email, they may be able to take over banking, social media, shopping, and work accounts with password reset links. Change the email password, check forwarding rules, review filters, and make sure no unknown recovery options were added.

17792072411185f4a68680f2740263820bd8e77ca70c2bf423.jpgStephen Phillips - Hostreviews.co.uk on Unsplash

11. Contact Your Bank or Credit Card Company

If payment information may have been exposed, contact your bank or card issuer right away. Ask them to look for suspicious transactions, freeze or replace cards if needed, and explain what protections are available. It’s better to report the concern early than to wait until a fraudulent charge becomes harder to dispute.

17792072605f8d088bc8ca57322ae49989283463a6107e0fdc.jpgCardMapr.nl on Unsplash

12. Watch for Unauthorized Transactions

Review your bank accounts, credit cards, payment apps, and online shopping accounts for anything you don’t recognize. Small test charges can matter because attackers sometimes use them before attempting a larger purchase. Keep checking over the next few weeks, since suspicious activity may not appear immediately.

1779207294a952759ea2d805bb199b4e87e2e8a3a9c0f5b24a.jpegRDNE Stock project on Pexels

13. Warn Friends, Family, or Coworkers

If the hacker used your account to send messages, links, invoices, or requests for money, tell people not to click anything that came from you during the incident. A simple warning can prevent the attack from spreading to people who trust you. Be specific about what happened so they know what to ignore or report.

1779207418b55427ce1075b602c4ac4ffdb2c1a7f408cdb37a.jpegThirdman on Pexels

14. Report the Hack to the Platform

Use the official recovery or security page for the hacked service and report the compromise. Platforms may be able to reverse changes, lock suspicious activity, restore deleted content, or help you recover access. Avoid using links sent by strangers who claim they can "recover" your account, since those are often scams too.

1779207539fcc3605248a04f0ec48205315eba2e30cbd155a4.jpegNicola Barts on Pexels

15. Save Evidence of What Happened

Take screenshots of suspicious logins, strange messages, unauthorized purchases, password-change alerts, and any communication from the attacker. Save dates, times, email addresses, usernames, transaction numbers, and device information when you can. These details may help with account recovery, bank disputes, workplace reporting, or law enforcement complaints.

177920761943b7440b5d06eeb2aa69b59ae088fece262943cd.jpgEd Hardie on Unsplash

Advertisement

16. Check for Email Forwarding and Hidden Rules

Hackers sometimes create email rules that forward your messages to another address or hide security alerts in folders you rarely check. Look through forwarding settings, filters, blocked addresses, delegated access, and connected apps. Delete anything unfamiliar, because changing your password won’t always remove these hidden access points.

1779207647e96ace629eb0ea122e8965c8413e0cfb632fef4b.jpgSolen Feyissa on Unsplash

17. Remove Suspicious Apps and Account Connections

Many services let third-party apps connect to your account, and those connections can survive a password change. Review connected apps, browser extensions, integrations, and permissions for anything you don’t recognize or no longer use. Revoke access generously, especially for tools that can read email, access files, post content, or manage payments.

1779207830a8f4aee1cedb3cb50a7858651eb31404b664f108.jpgSolen Feyissa on Unsplash

18. Consider Freezing Your Credit

If your Social Security number or other sensitive personal information may have been exposed, consider placing a credit freeze with the major credit bureaus. A freeze can make it harder for someone to open new accounts in your name. It won’t stop every kind of fraud, but it’s a strong protective step when identity theft is a real concern.

1779208098f001ff857962da30a5e6c553ea83e80249379c0a.jpgCardMapr.nl on Unsplash

19. Restore from a Clean Backup If Needed

If your device is heavily infected or you can’t fully remove malware, restoring from a clean backup may be safer than trying to patch the problem piece by piece. Use a backup from before the compromise, and scan important files before bringing them back onto the device. Don’t restore unknown apps, strange downloads, or anything that may have been part of the attack.

177920812195b9ec38868f9c570cb8a1e19e665e83d4e083ff.jpgZulfugar Karimov on Unsplash

20. Keep Monitoring After You Regain Control

Even after everything looks fixed, keep watching your accounts for new signs of trouble. Attackers sometimes return later using old passwords, saved sessions, recovery options, or personal information they already collected. Check security alerts, account activity, and financial statements regularly so you can respond quickly if something resurfaces.

1779208156356d69dc5f5fd17bb50df0aa2e1c9597c719f52a.jpegAlexander Suhorucov on Pexels