- Scan your devices for malware and change your passwords to unique, long, and strong keys.
- Check your email settings (forwarding, filters, security) and always enable two-step verification.
- Change the passwords for other linked services, notify your contacts, and use password managers.
- Avoid phishing, unsecured public Wi-Fi networks, and keep your systems and antivirus software up to date to prevent new attacks.
Discovering that your email has been hacked It's one of those things that makes your heart race: strange messages sent in your name, people warning you about suspicious emails, or simply not being able to access your inbox. Beyond the initial shock, the problem is that your email is often the key to accessing your bank, social media, online stores, and much more.
The good news is that, if you react quickly and intelligentlyIt is possible to recover a hacked email account and stop data or money theft in time. In this complete guide, you will see, step by step, what to do to clean your devicesRegain control of your email, protect your other accounts, and shield yourself from future attacks.
Why is it so serious when your email is hacked?
A compromised email is a real treasure. For any cybercriminal. From that account they can request password changes on your social media, streaming platforms, online stores, or even your bank, and take advantage of the situation to steal money, personal data, or impersonate you.
Think about how many services you have linked to your primary email.Online banking, PayPal or other payment methods, Amazon and other stores, social networks, transport apps, subscription services… If the attacker can read your messages, they have a pretty clear map of your digital life and all the accounts they can try to hijack.
Plus, with your contact list in handCybercriminals can launch very convincing phishing campaigns by impersonating you. Your friends, family, or coworkers tend to trust a message that appears to come from your address, so the attack easily spreads.
That's why it's so important to act quickly As soon as you see the slightest sign of hacking: the longer the attacker maintains control of the email, the greater their chances of accessing other accounts, stealing money, or selling your data on the dark web.

Clear signs that your email may have been hacked
It's not always obvious at first glance that someone has accessed your email.Sometimes the only clue is unusual behavior that, if you're not paying attention, can easily go unnoticed. These are the most common signs that your account may have been compromised.
1. Your password suddenly stops working
The clearest sign of all is that you can no longer log in You enter your usual password and the system tells you it's incorrect. If you're absolutely sure you're typing it correctly, it's very likely the attacker changed it to block your access.
In many cases, the cybercriminal's first move This involves changing the password so you can't log in, reverse changes, or see what's being done with your account. Therefore, if you can't access your account, you must assume someone else has control and proceed with the recovery steps as soon as possible.
2. Sent messages that you don't remember
Another very typical sign is finding emails in the "Sent" folder. that you didn't write. They're usually messages with strange links, suspicious attachments, or text in other languages. It's also common to see password reset emails for services you didn't request.
If you notice activity in your inbox that you don't recognize (mass mailings, strange responses, password change notifications from other platforms), it is quite likely that someone is using your account in the background to phish or open the door to other hacks.
3. Have your contacts notify you of strange messages
Many people only find out about the hack when they receive notifications. From friends, family, or clients: “Hey, I received a very strange email from your address,” “Why are you asking me to click on this link?”, “You sent me a suspicious file.” If this happens, you should assume your account has been compromised.
At this point, the attacker has probably already launched A spam or phishing campaign using your identity, so it's crucial to regain control of your email and warn your contacts yourself to break the chain and prevent more people from falling for it.
4. Sudden session closures and strange notifications
Another very important clue is unexpected session closures. on your devices. If your session closes by itself repeatedly, or the system forces you to enter your password for no reason, the attacker may be changing the password or logging in from another location.
Many email providers send alerts When they detect a login from a new location, an unknown device, or a strange IP address. If you start receiving these types of notifications and it wasn't you, something strange is happening and you should react quickly.
5. Unknown configuration changes, forwarding, and filters
The most sophisticated cybercriminals don't always change the password at the beginning.Sometimes they prefer to keep you inside but control things from the shadows. To do this, they usually tweak the settings: filtering rules, automatic replies, or forwarding messages to addresses you don't recognize.
If your email starts behaving strangely (messages that disappear, automatic forwarding to other accounts, changes in signature, languages or personal data that you have not modified), it is quite likely that an attacker has been messing with your settings.
Urgent first steps: how to stop the attack
Before you start changing passwords like crazyIt's important to follow a logical order. If the infection comes from a virus or a keylogger (a program that records everything you type), changing your password won't help if the malware is still installed: the attacker will see your new passwords immediately.
1. Scan your device with a good antivirus program.
The first thing is to make sure your computer or mobile phone is cleanIf you're using Windows 10 or 11 and don't have another antivirus program, you have Windows Defender built in. Make sure it's up to date and run a full system scan, not just a quick scan. On other systems, use a reliable and regularly updated security solution.
A thorough analysis helps locate malware of all typesTrojans, spyware, keyloggers, and potentially unwanted applications may be stealing your credentials or spying on your activity. If your antivirus detects anything, remove the threats and restart your computer before proceeding with password changes.
2. Change your email password
Once the device is clean, it's time to change the password. From the hacked account, access it from a trusted device. Go to your email provider's settings (Gmail, Outlook, Yahoo, etc.) and look for the security or "Password" section.
The new password must be strong and different from any other. Choose a password that is at least 12 characters long, combining uppercase letters, lowercase letters, numbers, and symbols. Avoid names, birthdates, obvious words, or patterns like "1234" or "qwerty". If possible, use a password manager to generate random passwords and save them without having to memorize them.
3. Regain access if you can no longer log in
If the attacker has already changed the password and won't let you inYou'll need to use the "I forgot my password" or "Account recovery" options offered by your email provider. There, you'll be asked to verify your identity with security questions, a code sent via SMS, or a backup email.
Answer calmly and use the last password you remember when they ask you to. Many services have specific account recovery pages where, if you pass the checks, you can set a new password and ban the attacker.
4. Check the device again and change the password again.
If the hack occurred because there was malware on your computer (For example, if a keylogger captured your password), the most prudent recommendation is to change your password again after removing the virus. First, clean your computer, then change your password, and then, once you're sure there's no trace of malware left, change it again.
This double key change may seem excessiveBut it's the most reliable way to ensure that the malware hasn't also been able to steal your new password while it was still active.
Review your email settings and secure your other accounts.
Once you've regained access to your email, don't let your guard down just yet.The attacker may have left "backdoors" in your settings or used that account to access other platforms. A thorough review is necessary.
1. Check forwarding, filters, and automatic replies
Go into your account settings and review all the key sectionsConnected accounts, email forwarding, filters, inbox rules, automatic replies, and authorized addresses. The goal is to detect any changes you didn't make, and consider use different browsers for review (avoid extensions or compromised sessions).
If you see forwards to unknown addressesIf you have rules that send your messages to hidden folders or automatic replies that you haven't set up, remove them immediately. Otherwise, the attacker could continue to receive your emails even after you change your password.
2. Change the security questions and recovery data.
Security questions are another very common entry pointIf the attacker has already figured out the answers (because they're public or easy to deduce), they could still infiltrate the system. Change those questions and use "fake" but memorable answers, just for yourself.
Take this opportunity to also check your phone and alternate email address. that you have configured as recovery methods. If you see a number or address you don't recognize, delete it and enter your own. This will prevent the cybercriminal from resetting the password on their own later.
3. Enable two-step verification (2FA)
Two-factor authentication is one of the best defenses for your email. With it, in addition to the password, you will need a second code (usually sent by SMS, generated in an app, or sent to another address) each time you log in on a new device.
Even if an attacker gets your password, without that second factor You won't be able to log in. Make sure you activate two-step verification on both your email and your most sensitive accounts: bank, social media, payment services, etc.
4. Change the passwords for other linked services
The next step is to go beyond email and check your other accounts.Start with those that contain financial information or particularly sensitive data: banking, credit cards, PayPal, Amazon, Netflix, social networks, and any online store where you have a card saved.
Change the passwords on all those platforms.creating a unique key for each one. If you were reusing the same password on multiple sites, it's crucial to break that pattern, because a single breach could give an attacker access to your entire digital ecosystem.
5. Notify your contacts that you have been hacked
Don't hesitate to tell friends, family, and colleagues. that your email has been hacked. Explain to them that they may have received fake messages from your address and advise them not to click on strange links or download suspicious attachments that have your name on them.
If you also use social media or messaging apps (WhatsApp, Telegram, etc.), report it through those platforms, because the attacker may have also tried to compromise those platforms or impersonate you on them.
How to recover specific accounts if they have been hacked
In many cases, the problem is not limited to emailThe same attack may have affected your Apple ID, your Google account, or your social media accounts. Each service has its own recovery procedure, but the underlying idea is always the same: to prove that you are the rightful owner.
Recover an Apple account (Apple ID)
If you notice your iCloud photos disappearingIf you see content that you haven't uploaded or your iPhone suddenly asks you to log in and doesn't accept your password, your Apple ID may have been compromised.
The best course of action is to contact Apple support directly.You can use the support website, the Apple Support app, or call customer service to have an agent review your case, verify your identity, and help you restore access to your account and devices.
Recovering a Google account (Gmail and other services)
If you can't access Gmail, Google Drive, or Google Photos Or if you start seeing strange activity (emails you didn't send, weird notifications, etc.), go to the Google account recovery page.
Enter your compromised email address and the last password you remember. If you had a recovery mobile number or email address set up, Google will send you codes or links to verify your identity and allow you to create a new, secure password.
Recover messaging accounts: WhatsApp and Telegram
In the case of WhatsApp, the account is linked to your number.which greatly simplifies the process. To recover it, you just need to install the app on your mobile (or another device), enter your number, and enter the 6-digit verification code that will be sent to you via SMS, and if you suspect that Your mobile phone has been hacked Follow the recommended steps to secure the device.
Once recovered, activate two-step verification Go to WhatsApp settings and check the "Devices" section to see which sessions are open on WhatsApp Web or the desktop app. Close any you don't recognize.
The process is very similar on Telegram.You log in with your number and use the code received via SMS. Afterwards, it's recommended to set an additional password in your account and check the "Devices" section to close any open sessions on devices that aren't yours.
Each social network has its own form for compromised accountsThey usually ask for your linked email or phone number, the last password you remember, and in some cases, a photo of your ID card or passport to prove you are the owner.
On Facebook, for example, you can use the specific page For compromised accounts, follow the instructions. On Instagram, in addition to trying to log in with Facebook if they were linked, there are support forms for hacking cases. Twitter and TikTok also have help pages and contact emails where you can explain your case in detail.
How to hack an email account: most common methods
Understand how they were able to access your account This is key to avoiding repeating the same mistake. Most email attacks rely on a few frequently repeated, albeit increasingly sophisticated, methods.
1. Phishing: fake emails that impersonate legitimate services
Phishing is probably the most widespread methodIt involves sending you an email that appears to be from your bank, your email provider, a well-known store, or a payment service, asking you to confirm your password or details.
The message usually includes a link to a cloned website which mimics the original. If you enter your username and password on that fake page, the attacker will steal your credentials. Emails of this type are becoming increasingly credible, so it's wise to be wary of any message that asks for sensitive information.
2. Data breaches and reused passwords
Another common method is to exploit security vulnerabilities in large online services. When a website suffers a data breach, thousands or millions of email and password combinations are exposed, which are then sold or shared on the dark web.
If you use the same password on multiple sites (something very common), all it takes is for one of those pages to be hacked for a cybercriminal to be able to try that email and password combination on your email, your social networks or your online banking.
3. Malware and keyloggers on your device
Malware attacks often come disguised in suspicious email attachments or seemingly innocent downloads or in browser extensionsIf you open the infected file, the malicious program will install itself without you noticing.
Keyloggers record everything you type.including usernames and passwords, and send that information to the attacker. Other types of spyware can steal session cookies, data saved in the browser, or even screenshots.
4. Open sessions on public or shared computers
Using public computers (libraries, internet cafes, hotels) Checking your email can be very risky if you don't log out properly. The next user could directly access your accounts or see your data if you haven't logged out correctly.
Furthermore, these devices are usually less well protected. And it's relatively common for them to be infected with spyware or keyloggers. Whenever possible, avoid logging into sensitive services from devices you don't control.
5. Open and unencrypted Wi-Fi networks
Public Wi-Fi networks without a password or poorly configured They are another weak point. If the connection is not encrypted, it is relatively easy to intercept the traffic passing through the network and capture data in plain text, including usernames and passwords.
To reduce risks, only connect to trusted networks And if you need to use public Wi-Fi, always do so through a VPN that encrypts all your traffic, in addition to verifying that you access websites via HTTPS.
What can hackers do with your email address
Even if they only have your email address (without even having accessed your inbox yet), cybercriminals already have a significant piece of the puzzle. They can launch customized phishing attacks, test combinations of leaked passwords, or attempt to force logins to various services.
If they manage to get into your email, the reach increases significantly.They can review your messages looking for personal data, invoices, bank statements, scanned identity documents, or information that allows them to steal your identity and commit fraud in your name.
They can also use your email to reset passwords They can access your accounts, deleting your data, taking out loans, using your cards, or selling your information on the black market. All while sending spam and phishing campaigns to your contacts, impersonating you.
Measures to prevent future email hacks
After having been hacked (or to avoid it)It's worth strengthening your digital security with a series of best practices. They aren't complicated and can save you a lot of trouble.
1. Use long, unique, and difficult-to-guess passwords
Forget about using the same password for everything and use short, simple passwords. Ideally, each account should have its own password, at least 12 characters long, mixing letters, numbers, and symbols. The longer and more random, the better.
A password manager allows you to manage this system Without driving yourself crazy. It generates strong passwords, stores them encrypted, and you only need to remember one master password to access the rest.
2. Activate two-step verification whenever possible
Two-factor authentication (2FA) adds an extra layer That makes all the difference. Even if someone steals your password, without the code sent to your mobile phone or generated by your authenticator app, they won't be able to log in.
Activate 2FA on your email and social media accountsOnline banking, payment services, and any platform that allows it. It's a very effective barrier against unauthorized access attempts.
3. Keep your devices and programs always up to date
System and application updates They're not just for adding new features. Most of them fix security vulnerabilities that cybercriminals can exploit.
Configure your devices to install security patches Automatically whenever possible and keep your antivirus updated and active, with regular full scans.
4. Avoid unsecured public networks and other people's equipment
Whenever you connect from outside your home or workplaceTry using password-protected and encrypted networks. Open Wi-Fi networks are convenient, but they carry a significant risk, especially if you're accessing email, banking, or other critical services.
If you have no other option than to use public Wi-FiUse a reliable VPN and avoid performing sensitive transactions. And remember: don't leave sessions open on other people's computers and always close your accounts when you're finished; when using other people's computers, use the incognito mode to reduce risks.
5. Strengthen spam filtering and anti-phishing solutions
Anti-spam filters and anti-phishing solutions They act as the first line of defense against malicious emails. Properly configure your email provider's filter to block suspicious messages.
In business environments, there are advanced tools Based on artificial intelligence, these systems analyze incoming emails and block phishing attempts before they reach the user's inbox. Complementing these solutions with phishing simulations and employee training is essential to reducing the "human factor."
6. Consider digital identity and monitoring services
If you have suffered a serious attack or handle highly sensitive dataIt may make sense to hire identity protection services that monitor your email and other accounts for leaks or fraudulent use.
Many internet security packages already include functions include monitoring data breaches, early warnings, and specialized assistance in case of identity theft or mass hacking.
Take email security seriously And reacting quickly when something goes wrong is key to preventing a scare from turning into a serious problem. With clean devices, strong passwords, two-step verification, and a healthy dose of skepticism toward emails and public networks, you're much better off keeping cybercriminals at bay and maintaining control over your digital life.
Table of Contents
- Why is it so serious when your email is hacked?
- Clear signs that your email may have been hacked
- Urgent first steps: how to stop the attack
- Review your email settings and secure your other accounts.
- How to recover specific accounts if they have been hacked
- How to hack an email account: most common methods
- What can hackers do with your email address
- Measures to prevent future email hacks
- 1. Use long, unique, and difficult-to-guess passwords
- 2. Activate two-step verification whenever possible
- 3. Keep your devices and programs always up to date
- 4. Avoid unsecured public networks and other people's equipment
- 5. Strengthen spam filtering and anti-phishing solutions
- 6. Consider digital identity and monitoring services


