How to recover a hacked Google account step by step

Last update: February 8th 2026
  • Always use the official Google account recovery page, providing as much information as possible to prove that you are the legitimate owner.
  • After regaining access, thoroughly review recent activity, connected devices, and security changes across all linked services.
  • Strengthen your security by enabling two-step verification, using strong passwords, and removing malicious software from your devices.
  • If you are unable to recover the account, create a new, well-protected one and take steps to minimize the impact and prevent future attacks.

Recover a hacked Google account

You're trying to log into Gmail, Google Photos, or any other Google service, and suddenly, Your access is blocked without prior notice.The login screen rejects you, your passwords no longer work, and you begin to suspect that someone has accessed your account without permission. It's a very distressing situation, especially if you store work emails, important documents, personal photos, or even banking information there.

The first thing to do is take a deep breath. Even if it seems like you've lost everything, Google has several mechanisms to recover a hacked account or with login problems. The process can be somewhat tedious and require several attempts, but if you follow the correct steps and provide as much information as possible, your chances of regaining control of the account increase significantly.

Why is losing a Google account so serious?

Beyond not being able to read your emails, A compromised Google account affects a lot of key servicesGmail, Google Drive, Google Photos, Calendar, YouTube, Google Pay, Chrome, Blogger, Google Ads, and many more. Losing access can leave you without work documents, files shared with others, mobile backups, family photos, and even financial information.

Furthermore, when an attacker gains access to your account, Not only can it delete or steal data, it can also impersonate you.They can send fraudulent emails using your name, upload videos to your YouTube channel, manipulate Google Ads campaigns, access forms with sensitive data, or even use saved information to impersonate you on other platforms.

If you add to that the fact that many people save passwords in their browser or in Google's password manager, A hack can open the door to the rest of your online accountsThat's why it's so important to act quickly, try to recover the account as soon as possible, and strengthen security measures to prevent further unauthorized access.

First step: Try logging in and using account recovery

When you notice something is wrong with your account, the first thing you should do is Try logging in as usual. on any Google service (for example, Gmail). If you find that your password no longer works or Google tells you that the account doesn't exist or has been deleted, you'll need to go directly to the official recovery tool.

Google offers a specific page called Recovery of the account, useful for recover a hacked email accountFrom there, the system will ask you a series of questions to verify that you are the legitimate user. It is essential that you answer as accurately as possible: the last passwords you remember, recovery information, approximate date the account was created, etc.

You should use this recovery page whether You don't remember the password, or you think someone has changed it.This is the official way to report any serious access issues, whether your phone number or alternate email address has been changed, your profile has been deleted, or you simply don't know why you can no longer log in.

If you're not even sure of the exact email, Google also lets you Try to recover your username by providing your recovery phone number or email address.along with your first and last name exactly as you entered them when you registered. If there are matches, you'll see a list of accounts associated with that information, which is very useful if you had multiple addresses and can't remember which one you used for a specific service.

How the Google recovery form works

Once you enter the recovery page, Google will ask you a series of questions designed to verify your identityIt's not just a simple form, but a system that analyzes everything you answer and compares it with the account's historical information (locations, usual devices, payment methods, etc.).

  How to set up a secure guest WiFi network on your router

Among the most common questions, they will ask you to Enter the last password you remember usingEven if it no longer works, it signals to Google that you had legitimate control of that account at some point. They may also ask you to confirm an alternate recovery phone number or email address associated with the account.

In some cases, Google will send a Verification code sent to your recovery phone number or email addressIf you still have access to any of those channels, you can enter that code and make significant progress in the process. The problem arises when the attacker has also changed this information, and the codes no longer reach you, but rather them.

If the account has been recently deleted, Google allows try to restore it through the same recovery systemIf not too much time has passed, it is possible that it will be recovered with almost all of its content intact (emails, files, photos…), although there is no absolute guarantee and it depends on many internal factors.

When the problem isn't related to the password, the username, or a hacking attempt, but rather to technical login errors, strange lockouts, or authentication failures, you can always Consult the Google login help section, where they compile solutions for other, less common types of incidents.

What to do if your Google account has been hacked

If you are certain that someone has accessed your account without permission, or you seriously suspect that this has happened, Google offers a specific itinerary for compromised accountsFrom the same recovery page, you can indicate that your account has been intercepted, and that opens a security flow that is somewhat different from that of a simple forgotten password.

The first thing Google tries to do in those cases is Reset password and close all active sessionsThis means that if you manage to complete the process, the person who hacked you will be immediately banned from the account on all devices where it is logged in.

After regaining access, it's crucial that you log into your Google account and review the security section. Check your devices, recent activity, and any changes to your settings.Anything you don't recognize could be a clue to what happened and whether there's still something strange about your profile.

Google recommends you activate the two step verification (also called two-factor authentication) so that the next time someone tries to log in with your password, they'll also need an additional code sent to your mobile phone, a security key, or a physical code that only you possess. This way, even if your password is stolen, your account will remain much more secure. It's also advisable to consider using password and passkey as alternative authentication methods.

In more serious situations, where the hacking could involve financial data or highly sensitive documents, it's a good idea contact your bank or the authoritiesIf you have saved cards, tax information, photos of official documents, or passport data in your Google Pay account, Chrome, or emails, there may be a risk of financial fraud or identity theft.

How to check for suspicious activity on your account

Once you manage to log in (or if you can still do so even if you suspect a hack), it is crucial that Review the activity and recent transactions in your accountFrom your Google account, in the Security section you will find a panel with the "Recent security-related activity".

From that panel you can View recent logins, password changes, and add new recovery methods and other relevant actions. If you see anything unusual, such as connections from unfamiliar locations, unknown devices, or settings you don't recall changing, you should mark them as "No, it wasn't me" and follow Google's instructions to secure your account.

You also have a section called “Your devices” within the Google accountThis shows a list of mobile phones, tablets, computers, and other devices where you've logged in to your account. If you see any you don't recognize, you can tap on them and use the "I don't recognize this device" option to force a logout and review your security settings again.

  Windows Terminal commands for troubleshooting PC problems

Even if you recognize all the devices, it's a good idea to check the notifications of unusual activity that Google may have sent you. These can appear as notifications of a "new device", password changes, payment method updates, or modifications to sensitive settings. If you receive an email or SMS informing you of a change you didn't make, act immediately.

When Google detects something particularly suspicious, it may show a red bar at the top of the screen with messages like “We’ve detected suspicious activity on your account.” It may also send alerts to your registered phone or recovery email to ensure you’re notified promptly; for example, you’ll receive a suspicious login alert.

Signs that your Google account may be compromised

There are several signs that can help you identify if someone is using your account without your permission. One of the clearest is finding unexpected changes in the most important security settings: password changed without your knowledge, verification methods removed or added, different recovery phone number, or changed alternate email address.

Another critical sign is detecting unauthorized financial activityIf you have cards linked to Google Pay, Play Store purchases, subscription services, or Google Ads campaigns, review your transactions carefully. Ads you don't remember creating, increased spending, or changes in Google Ads ownership or administrators are all signs that something is wrong.

In Gmail, YouTube, Google Drive, Photos, Blogger, and Google Ads, there are also very clear clues. For example, on YouTube, Videos you haven't uploaded, strange comments, or changes to your channel name or profile pictureOn Blogger, posts you never wrote or a blog email that has magically changed without you touching it.

In Google Drive and Google Photos, although it can sometimes go unnoticed, it's worth checking if New files appear or documents and photos have been deleted without your interventionYou don't need to check every single one of your files, but you should check the most sensitive folders or those shared with others.

You should also keep in mind that if Google suspects something, It will notify you through different channelsThese notifications might appear on your phone, in your recovery email, or when you log in. Ignoring these messages or dismissing them as "mistakes" can actually worsen the problem without you realizing it.

Additional measures: antivirus, secure browser and password protection

When an account has been hacked, simply changing the password isn't enough. Often the cause is that Your device had malicious software (malware) or some type of virus who stole your credentials. If you don't clean up the source of the problem, you risk them getting back in.

It is highly recommended that you install and run a reliable antivirus for your computer and mobile phonePerform a full system scan, remove any detected threats, and keep your antivirus databases up to date. In extreme cases, you might consider restoring your device to factory settings and reinstalling the operating system from scratch.

It is also advisable to use a modern and secure browserThis is because some older or poorly maintained browsers have security vulnerabilities that can allow malicious extensions or fraudulent websites to infiltrate them. Google suggests using Chrome, but in any case, the important thing is that the browser receives frequent updates.

Another interesting layer is installing tools for detect password theft attempts (phishing)For example, Google Chrome's "Password Protection Alert" extension warns you if you enter your Google password on a non-Google page, helping you detect fake pages that mimic the appearance of the official login.

In addition to protecting your main account, remember that You need to check which apps and devices have access to Google services. From your account, in the security section, you can see the third-party applications with permissions and revoke those you don't recognize or no longer use.

When you can't use the phone or recovery email

One of the most complicated cases is when the attackers They manage to change both the password and the recovery methods (phone number and alternate email address). In that situation, the verification codes that Google sends to confirm your identity no longer reach you, but them.

  Advanced RAM diagnostics: a complete guide to detecting real failures

If this happens to you, the recovery tool will still be your only option, but you will have to make the most of any detail you can still remember.: last passwords used, approximate dates you created the account, Google services you usually access, cities you usually log in from, etc.

The problem is that, once the attacker has changed all the contact details, The chances of recovering the account decrease considerably.In many cases, Google does not offer one-on-one support via chat or phone for standard users, and there is no magic email address to write to and have someone return it to you "by hand".

Given such an extreme situation, the most pragmatic course of action might be give up on the account and focus on minimizing damageChange passwords for other services where you use the same email address, warn your contacts to ignore any suspicious messages from that address, and if there's a financial risk or identity theft, contact your bank and, if necessary, the authorities. It's also a good idea to update critical services like your Outlook or Microsoft account if she was linked.

At this point, it's worth considering creating a New Google account with much more protection from the startRecovery number, alternate email, two-step verification, regular security reviews, and strict policies when sharing data or installing apps from dubious sources.

When to create a new Google account and how to protect it

If, after several recovery attempts, you see that there is no way to regain control, the wisest thing to do is assume that the account is out of your reach and Set up your new digital “command center” on another accountIt's a hassle, but it's better to build something new and secure than to remain trapped in a hijacked account.

When creating a new profile, don't just use any email address and password. It's essential. Register a recovery phone number and an alternate email addressThey are your lifelines in case you forget your password again or someone tries to enter without permission.

Activate from day one two step verificationYou can configure it to receive codes via SMS, use an authenticator app, receive alerts on your mobile phone, or use physical security keys. Combining something you know (your password) with something you have (your mobile phone, your key) makes the attackers' job much more difficult.

It is equally important that you use long, unique, and hard-to-guess passwordsMix uppercase and lowercase letters, numbers, and symbols. Avoid birthdays, pet names, or obvious combinations. You can use a reliable password manager to avoid the frustration of remembering them all.

Finally, be systematically suspicious of anyone who offers you Recover your Google account in exchange for money or sensitive dataGoogle clearly states that it does not work with third-party companies for these cases. If someone asks for your password, verification codes, or remote access to your computer to "help" you, it's most likely another scam.

Recovering a hacked Google account can be a long, frustrating process with an uncertain outcome, but Follow official procedures, thoroughly review activity, remove malware, and strengthen security It makes the difference between losing control forever and regaining it. While you can't always recover the original account, you can learn from the experience, secure your new logins, and minimize the chances of such a scare happening again.

How to recover a hacked email account
Related article:
How to recover a hacked email account and secure your email