CT
🛡️Protecting YourselfBeginner

My Email Was Hacked — Step-by-Step Recovery Guide

A hacked email account is serious — attackers can reset every other account you own using it. Here's exactly what to do in the first 30 minutes to limit the damage.

March 2, 2026
8 min read
CyberTimes Team
Your email account is the master key to your digital life. With access to it, an attacker can reset the password to your bank, social media, shopping accounts, and anything else tied to that email address. If you think your email has been hacked — or you've confirmed it — every minute counts. This guide walks you through exactly what to do, in order, to regain control and limit the damage. Signs your email may be hacked: password stopped working, friends received strange emails from you, you see emails in your sent folder you didn't send, or you received a security alert from your email provider.

Step 1: Try to Regain Access Immediately

If your password still works: - Log in right now from a trusted device - Go to Security Settings immediately - Change your password to something long and unique (use a password manager) If your password no longer works (attacker changed it): - Go to the login page and click 'Forgot Password' or 'Account Recovery' - Use a recovery phone number or backup email if you set one up - Gmail: accounts.google.com/signin/recovery - Outlook: account.live.com/acsr - If recovery options don't work, contact the provider's support — have account creation details ready to verify your identity Do this before anything else. You can't secure the account without access.

Step 2: Secure the Account (Do All of These)

Once you're back in, do all of the following immediately: 1. Change your password — make it at least 16 characters, unique, not used anywhere else 2. Enable MFA immediately — add an authenticator app (Google Authenticator, Authy) not just SMS if possible 3. Check and remove recovery options you don't recognize — attackers often add their own phone number or backup email to lock you out again 4. Review connected apps — go to Security > Connected Apps and remove anything suspicious or you don't recognize 5. Check email forwarding rules — attackers often set up silent forwarding rules to receive copies of all your emails even after you change your password. Delete any rules you didn't create 6. Check your profile — make sure your name, recovery email, and phone number haven't been changed to the attacker's details 7. Sign out all other sessions — most email providers have a 'Sign out of all devices' option. Use it.

Step 3: Assess the Damage

Check what the attacker may have accessed or done: Search your sent folder for emails sent during the compromise period — did they email your contacts asking for money or spreading phishing links? Check your inbox for password reset emails — did the attacker use your email to reset passwords on other accounts? Check for banks, PayPal, Amazon, social media. Look for new account creation confirmations — attackers sometimes create new accounts using your email address. Check if sensitive information was accessed — search your email for terms like 'password', 'account', 'bank', 'SSN', 'invoice' to see what may have been read.

Step 4: Secure Every Connected Account

This is the most important step that most people skip: Any account that uses this email address for login or password recovery is now potentially compromised. Priority order: 1. Banking and financial accounts — change passwords immediately, check for unauthorized transactions 2. PayPal, Venmo, Cash App 3. Amazon, eBay (saved payment methods) 4. Social media accounts 5. Work accounts 6. Everything else For each one: change the password, enable MFA, and check for any account activity you don't recognize. This is exhausting but essential. Consider using a password manager going forward — it makes changing many passwords much faster.

Step 5: Notify People Who May Have Been Targeted

If the attacker sent emails from your account to your contacts: 1. Send an email from your now-secured account warning your contacts that your email was compromised and to ignore any unusual messages 2. If the attacker asked for money or gift cards, contact those people directly by phone to make sure they didn't send anything 3. If the attack involved your work email, notify your IT department immediately — corporate networks may be at risk 4. Consider filing a report with the FBI's Internet Crime Complaint Center (IC3) at ic3.gov, especially if money was stolen

Key Takeaways

  • Act immediately — every minute gives attackers more time to reset your other accounts
  • Check for forwarding rules and recovery option changes — attackers use these to maintain access
  • Every account using that email for login or password recovery needs to be secured
  • Notify your contacts if the attacker sent emails from your account
  • Enable MFA on your email account — this prevents most hacks in the first place

Frequently Asked Questions

Most commonly: your password was exposed in a data breach and reused, you clicked a phishing link, or you used a weak/guessable password. Check haveibeenpwned.com to see if your email appeared in known breaches.

Usually not necessary if you follow the recovery steps. Deleting your account creates more problems — you lose email history and have to update your address everywhere. Securing and cleaning the existing account is better.

Yes, most major providers have account recovery processes. Be prepared to verify your identity with information like your account creation date, previous passwords, or billing information.

Use a unique strong password for your email (never reused), enable MFA with an authenticator app, and check haveibeenpwned.com regularly to see if your credentials have appeared in breaches.

What's Next?

Once you've recovered your account, set up a password manager so every account has a unique password. And read our MFA guide — enabling it on your email account would have prevented this attack in most cases.