Skip to main content

So, your account was hacked. What now?

 So, your account was hacked. What now?

What to do if an account is hijacked: How to minimize damage, restore your Digital Comfort Zone, and avoid getting bamboozled.

What to do if an account is hijacked: How to minimize damage, restore your Digital Comfort Zone, and avoid getting bamboozled


Finding out one of your accounts has been hacked can be pretty stressful — more so if it’s one you actively use to chat with friends, make purchases, or store files.

Instead of reacting emotionally, it’s important at this early stage to focus on minimizing consequences. Rescue your money and data, protect your friends from scammers, regain control of your account — generally, reverse or at least halt the damage. We will tell you what steps to take.

If you can’t sign in at all

In many cases, users first learn they’ve been hacked by suddenly becoming unable to log in to an account. That’s because in many cases, the first thing hackers do is change the password, locking out the victim and gaining complete control over the stolen account.

Don’t panic: You can still do plenty. Take a deep breath. It is important to do everything quickly and prioritize your actions.

  • Try resetting your password. If you act quickly enough, the attackers may not yet have had time to disassociate your e-mail from your account.
  • Warn as many people as possible that your account was hacked. Get in touch with friends and loved ones. Post a message on social networks. If people know your account was hacked, they will be less likely to fall for the scammers’ tricks if attackers start sending requests in your name, for example telling everyone in your address book that you have an emergency and desperately need cash.
  • Call your bank or other financial service if the scammers hacked an account in a payment system or one with an associated credit card.
  • Scan your computer using antivirus software to make sure that it is free of any malware that could be used to steal account passwords.
  • Make a list of the most important services associated with your hacked account. Recall all of the services that you log in to using this account as well as any that send password reset e-mails to this account.
  • Try logging in to those services and unlinking them from the hacked account.
  • Contact account service support and try to restore access to the affected account. See the instructions for FacebookGoogleInstagram, and Twitter.

What to do if you receive notification about suspicious activity

Many online services warn users if their accounts are used to perform certain significant actions. The actions may include changing your password, linking a new phone or e-mail address to the account, and logging in from a new device or location. If you didn’t perform those actions and still received such a message, then you should be concerned.

  • Try to log in to your account, but not using any links in the notification. Phishing messages seeking login credentials can look a lot like official account notifications. The best practice is to manually enter the address in your browser or open the app.
  • Check your login history if the account allows it, and if you see any unfamiliar devices or places on the list, immediately log out all other users.
  • Check all of your account details including e-mail address, phone number, and security questions.
  • Change your password. Make sure that it is strong and substantially different from the old one. If you are afraid that you will forget your new password, use a password manager to safely store all of your passwords.
  • Change the password in all accounts where you used the compromised one, as well as in accounts associated with the compromised login (for example, accounts at all online stores where you logged in using a hacked social network login).

What to do if you receive a ransom letter from hackers

Sometimes, attackers get in touch, claiming to have gotten into your account, infected your computer with terrible malware, recorded a compromising video using your webcam, copied your messages, or the like. The malefactors typically threaten to publish the collected data if you don’t pay a ransom.

In fact, it is unlikely that anyone hacked your device. Scammers have been known to send extortion letters in all sorts of circumstances, including to the addresses in some spam database. If you want to play it safe, go ahead and change the password for the account that was allegedly hacked — it’s not a bad thing to do that every so often anyway. Again, if you are afraid that you will forget your new password, install Kaspersky Password Manager, which will remember everything for you.

How to avoid falling victim to hackers

Of course, it’s best to keep scammers out of your accounts to begin with. Therefore, even if you are not the victim of a hack, make sure your accounts are protected:

  • Activate two-factor authentication;
  • Install a reliable protective solution on all of your devices. It is important to choose a package that will not only catch malware, but also warn you if the credentials for any service that you use have been leaked.

              Comments

              Popular posts from this blog

              Student surprise: Malware masked as textbooks and essays

              Student surprise: Malware masked as textbooks and essays By- Kaspersky Malware can masquerade not only as games and TV shows, but also as educational materials. We help you understand what this malware is and how to avoid being infected. It is far too easy to pick up nasty stuff when you try to download   popular TV shows   or   game cheats . However, cybercriminals do not limit themselves to tainting entertainment; you can also stumble upon a virus when looking for work- or study-related materials. This is particularly important to keep in mind as the academic year starts, because the cost of textbooks and other materials for K–12 and college students often leads to many looking for more affordable and free alternatives online. Download an essay, get some malware thrown in Wanting to find out how frequently malicious content is encountered among materials that are posted for free access, we checked how many infections Kaspersky solutions identified in files with school- and student-re

              Five regular checks for SMBs

              Five regular checks for SMBs By- Aarti Jatan Five things that, if neglected, can cost SMBs dearly. It is not always economically viable for small and medium-size businesses to maintain a dedicated IT security team, so it often happens that one person is in charge of monitoring the entire infrastructure. Sometimes he or she is not even a permanent, full-time employee. Sure, a good administrator can do a lot, but even a pro might miss something, particularly if issues are mounting and time is short. So, it’s worth establishing a few habits. Here are our Top 5 regular checks. Renew the corporate site security certificate Any website that requests or processes user data must have an SSL certificate. It protects information entered by visitors from being intercepted, and almost all modern browsers  warn  users that sites without an SSL certificate are insecure. That can scare off potential customers. Your website most likely has an SSL certificate, but its validity period is limited. Depend

              10 tips for Zoom security and privacy

              10 tips for Zoom security and privacy By- Aarti Jatan Gain full control over your Zoom video conferences, family gatherings, and online bar crawls . With social distancing and quarantine measures implemented around the globe, people quickly started searching for effective means of communicating with each other. With its reported ease of use and attractive pricing, Zoom quickly rose in popularity — and people quickly figured out that Zoom’s developers weren’t fully prepared for the level of scrutiny it would receive. With so much use, Zoom’s flaws came rapidly to light. The company handled the tremendous increase of workload seamlessly and quickly reacted to security researchers’ discoveries. However, just like with each and every service, code updates will not address every complaint, but some issues are very much worth keeping in mind. So, here we offer 10 security and privacy tips for Zoom users. 1. Protect your account A Zoom account is just another account, and in setting yours up,