Skip to content

Account Compromise

Someone has gained unauthorized access to your email, social media, cloud storage, or other online accounts. This often leads to further attacks like business email compromise or data theft.

Immediate Actions (First Hour)

  1. Regain access if possible - Use "forgot password" with a known-safe recovery method
  2. Enable 2FA immediately - Even if you regain access, enable two-factor authentication
  3. Check for forwarding rules - Attackers often set up email forwarding to maintain access
  4. Review connected apps - Revoke access for any suspicious third-party applications
  5. Alert your organization - Others may have received malicious emails from your account

Account-Specific Recovery Guides

Google / Gmail

Microsoft 365 / Outlook

Apple ID / iCloud

Social Media Platforms

Facebook/Meta: - Hacked account: facebook.com/hacked - Security checkup: facebook.com/privacy/checkup

Instagram: - Hacked account: help.instagram.com/368191326593075 - Security: Settings → Security → Login Activity

LinkedIn: - Hacked account: linkedin.com/help/linkedin/answer/56363 - Sessions: Settings → Sign in & security → Where you're signed in

Twitter/X: - Hacked account: help.twitter.com/en/safety-and-security/twitter-account-hacked - Apps: Settings → Security and account access → Apps

Check If Your Credentials Were Leaked

Have I Been Pwned

  • Website: haveibeenpwned.com
  • Check if your email appears in known data breaches
  • Sign up for notifications of future breaches

Firefox Monitor

DeHashed (Advanced)

  • Website: dehashed.com
  • Search by email, username, IP, name, etc.
  • Some features require subscription

Securing Your Account After Recovery

Enable Strong Two-Factor Authentication

Best to worst options:

  1. Hardware security key (YubiKey, Google Titan) - Phishing resistant
  2. Authenticator app (Google Authenticator, Microsoft Authenticator, Authy)
  3. SMS codes - Better than nothing, but vulnerable to SIM swapping

Free Security Keys

Password Manager Setup

What Attackers Do With Compromised Accounts

Be vigilant for these follow-on attacks:

  • Business Email Compromise (BEC) - Sending fraudulent invoices or payment requests
  • Lateral movement - Using your account to attack colleagues
  • Data theft - Accessing files, contacts, sensitive information
  • Reputation damage - Posting inappropriate content
  • Password reset attacks - Resetting passwords on other services

Evidence to Preserve

  • [ ] Login activity logs (screenshots)
  • [ ] Forwarding rules or filters (before removing them)
  • [ ] Connected apps list
  • [ ] Any messages sent by the attacker
  • [ ] Timestamps of suspicious activity

Guides & Documentation

EFF Surveillance Self-Defense

  • Account Security: ssd.eff.org
  • Comprehensive account protection guide

Security in a Box

Google Advanced Protection Program

Need Help?

If you're a Swedish organization dealing with account compromise affecting your business:

Apply to HackAid - Our volunteers can help investigate the scope and impact.


Last updated: 2026-01