What Should You Do If Your Online Account Gets Hacked?

A hacked account can feel like someone walked into your house and moved the furniture. It’s personal, unsettling, and easy to panic over. The good news is that quick action can cut off the damage.

Common warning signs include password reset emails you didn’t ask for, logins from devices you don’t know, posts or messages you never sent, changed recovery info, odd bank charges, or strange email forwarding rules. If any of that sounds familiar, move fast and work through the steps below.

Act fast to lock the hacker out

Speed matters most in the first hour. If the account is still open, try to sign in right away. Then change the password, use the platform’s recovery tool if you’re locked out, sign out of other sessions, and turn on two-factor authentication. If the hacked account is your email, treat it like a house key. Once someone has it, they can often reset other accounts too.

A good first stop is the FTC’s plain-English guide on what to do after an email or social media account is hacked. It matches the order that usually works best.

Start with the account that unlocks the others. In most cases, that’s your email.

Change your password and sign out of other sessions

Make the new password strong and unique. Don’t tweak the old one by adding a number. If your old password was BeachHouse22, then BeachHouse23 is still weak. Use a long passphrase or a password manager-generated password instead.

Next, revoke active sessions. Many people change a password but forget that phones, tablets, browsers, and smart TVs may still stay signed in. That leaves a side door open. Most major services let you review devices and sign out everywhere.

If the hacker changed the password first, don’t waste time guessing. Use the service’s official recovery flow. For Google accounts, Google’s secure a hacked or compromised account steps walk you through recovery and cleanup.

Check your recovery email, phone number, and security settings

After you regain access, look at the account settings like a mechanic checking under the hood. Hackers often change the backup email, phone number, trusted devices, and app connections so they can get back in later.

For email accounts, review forwarding rules and filters. This matters a lot in Gmail and Outlook. A criminal might set mail to auto-forward or hide messages from your bank. They may also create filters that send password reset emails straight to trash.

Also review linked apps and third-party access. If you see anything you don’t recognize, remove it. Turn login alerts on, and make sure the alerts go to a device you control.

Secure the accounts that could be hit next

One hacked account rarely stays alone. It often starts a chain reaction. A stolen email can lead to banking access. A social account can be used to trick friends. Cloud storage may hold tax forms, IDs, or saved passwords.

Protect these accounts in this order:

Account typeWhy it comes next
EmailIt resets other accounts
Bank and payment appsMoney can move fast
Cloud storagePrivate files may be exposed
Password managerIt may unlock everything else
Social mediaAttackers can scam your contacts

The pattern is simple. First protect what controls access. Then protect what holds money. After that, secure what holds personal data.

Protect your email first, then reset passwords on important accounts

Email is the center of the web for most people. That’s why it comes first. If your inbox was hacked, change that password before you touch anything else. Then reset passwords on banking apps, credit cards, payment apps, shopping sites, and any service that used the same or a similar password.

This is also the moment to stop reusing passwords. One leaked login can unlock five or ten accounts if you recycle it. Even a small overlap, like using the same base word with a different ending, creates risk.

If you can still access your Google account, Google’s account hijacking help page can help you confirm settings and recovery options.

Watch for fraud if money or personal info may be involved

If the account touches money, review recent activity right away. Look for card charges, transfers, purchases, password reset notices, or new payees. If something looks off, freeze or lock the card if your bank allows it, then call the bank or card issuer.

Fast reporting often improves your odds. Banks and payment services usually move quicker when you report the problem early and clearly. Keep the facts tight: what changed, when you noticed it, and which charges are not yours.

If the hack may involve identity theft, file a report through the FTC’s identity theft recovery page. That gives you a record and a recovery path if the problem grows.

Report the hack and recover each type of account

Use the platform’s official recovery tools, not random help pages, DMs, or paid “recovery experts.” When you’re stressed, it’s easy to grab the first result you see. That’s exactly when scammers move in.

What to do if your email account was hacked

For Gmail, use Google’s official recovery steps, then check recent activity, devices, recovery info, filters, forwarding, and sent mail. If scam emails went out from your inbox, tell your contacts fast so they don’t click links or send money.

For Outlook or other email services, follow the same pattern. Recover access, change the password, remove unknown devices, and inspect inbox rules. Hidden forwarding rules are one of the easiest ways for a hacker to keep spying after you think the problem is fixed.

Also search your sent folder, trash, and archive. That helps you spot what the attacker did and who may need a warning.

What to do if your social media account was hacked

For Facebook, use the official Facebook hacked account recovery page. It’s safer than trusting a search result or a message from someone claiming they can help.

For Instagram, X, and similar platforms, stick to the service’s own recovery tools inside the app or help center. Once you’re back in, change the password, remove unknown devices, review connected apps, and turn on two-factor authentication.

Then clean up the damage. Delete fake posts if you can. Check DMs for scam links or money requests sent to friends. If the attacker changed your bio, profile photo, or contact info, switch those back too. Your followers may trust your account more than they trust a stranger, which makes a hacked profile useful to scammers.

What to do if your banking or payment account was hacked

Call the bank or app first, not last. Most services can lock the account, freeze the card, or block new transfers while they review activity. If money moved without your approval, dispute the charge or transfer right away.

A practical consumer guide from Discover explains what to do if your bank account gets hacked. The exact steps vary by bank, but the basics stay the same: secure access, report fraud, and document everything.

Take screenshots before anything disappears. Save alerts, notices, case numbers, and chat logs.

Tell the right people and keep records

A hack can spread beyond your account. Friends may get scam links. Co-workers may receive fake invoices. Your bank may ask for dates. Good records turn a messy story into a clear timeline.

Warn your contacts if the hacker may use your account to scam others

Send a short warning through a trusted channel, like text or a call. Keep it simple: “My account was hacked. Don’t click recent links from me, send money, or trust odd requests until I confirm I’m back in.”

That one message can stop a second round of damage. It also protects your reputation. People are less likely to fall for a scam if they hear from you first.

If the hacked account was work-related, tell your employer or IT team right away. A personal delay can turn into a company problem fast.

Save proof of what happened in case you need it later

Keep screenshots of login alerts, changed settings, weird messages, unauthorized charges, support emails, and each recovery step you took. Write down dates and times too. If you spoke to support or your bank, save case numbers and the name of the person you spoke with.

This record helps if you need to reopen a claim, prove fraud, or file a police report. It also keeps you from forgetting what you already changed.

Think of it like leaving trail markers in the woods. If the recovery gets confusing, your notes help you find the way back.

Make your accounts harder to hack next time

Most account takeovers start the same way. A reused password gets exposed. A phishing message tricks you. Recovery settings stay weak. Two-factor authentication never gets turned on.

The fix doesn’t need to be fancy. It needs to be consistent.

Use a password manager and unique passwords for every account

A password manager removes the pressure to remember dozens of strong passwords. More important, it helps you make every password different. That way, one leak doesn’t become ten hacked accounts.

Start with your email, bank, payment apps, and social accounts. Those create the most damage if someone gets in. Then work outward.

If changing everything at once feels like too much, pick the top five accounts today. Progress beats delay.

Turn on two-factor authentication and learn to spot phishing

Two-factor authentication adds a second lock to the door. App-based codes and security keys are stronger than text messages when those options are available. Use them on email, banking, and any account tied to money or personal data.

Phishing still catches smart people because it creates panic. So slow down when a message says your account will close, your payment failed, or you must act now. Check the sender closely. Don’t trust links in surprise messages. If needed, go to the site yourself instead of tapping the link.

That pause can save hours of cleanup later.

A hacked account feels urgent because it is. Still, you don’t need to fix everything at once. Focus on the account that opens the most doors, lock it down, and move to the next one.

The strongest next step is also the simplest: start now. Change the password, secure your email, and keep a record of what you do.

Small actions taken quickly beat perfect plans delayed too long.

Leave a Comment