{"id":2051,"date":"2020-10-19T14:40:20","date_gmt":"2020-10-19T11:40:20","guid":{"rendered":"https:\/\/mailsafi.com\/blog\/?p=2051"},"modified":"2020-12-03T13:58:18","modified_gmt":"2020-12-03T10:58:18","slug":"how-to-recover-from-a-compromised-email-account","status":"publish","type":"post","link":"https:\/\/mailsafi.com\/blog\/how-to-recover-from-a-compromised-email-account\/","title":{"rendered":"How to Recover from a Compromised or Hacked Email Account"},"content":{"rendered":"\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_49 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"ez-toc-toggle-icon-1\"><label for=\"item-69de54cbb0816\" aria-label=\"Table of Content\"><span style=\"display: flex;align-items: center;width: 35px;height: 30px;justify-content: center;direction:ltr;\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/label><input  type=\"checkbox\" id=\"item-69de54cbb0816\"><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/mailsafi.com\/blog\/how-to-recover-from-a-compromised-email-account\/#1_What_is_a_compromised_or_hacked_email_account\" title=\"1. What is a compromised (or hacked) email account?\">1. What is a compromised (or hacked) email account?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/mailsafi.com\/blog\/how-to-recover-from-a-compromised-email-account\/#2_How_do_I_know_whether_my_email_has_been_compromised\" title=\"2. How do I know whether my email has been compromised?\">2. How do I know whether my email has been compromised?<\/a><ul class='ez-toc-list-level-4'><li class='ez-toc-heading-level-4'><ul class='ez-toc-list-level-4'><li class='ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/mailsafi.com\/blog\/how-to-recover-from-a-compromised-email-account\/#So%E2%80%A6\" title=\"So&#8230;\">So&#8230;<\/a><\/li><\/ul><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/mailsafi.com\/blog\/how-to-recover-from-a-compromised-email-account\/#4_My_email_account_has_been_compromised_What_should_I_do\" title=\"4. My email account has been compromised. What should I do?\">4. My email account has been compromised. What should I do?<\/a><ul class='ez-toc-list-level-3'><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/mailsafi.com\/blog\/how-to-recover-from-a-compromised-email-account\/#i_Check_and_update_your_computer%E2%80%99s_security\" title=\"i. Check (and update)&nbsp;your computer\u2019s security\">i. Check (and update)&nbsp;your computer\u2019s security<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/mailsafi.com\/blog\/how-to-recover-from-a-compromised-email-account\/#ii_Change_your_password\" title=\"ii. Change your password\">ii. Change your password<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/mailsafi.com\/blog\/how-to-recover-from-a-compromised-email-account\/#iii_Change_your_security_questions\" title=\"iii. Change your security question(s)\">iii. Change your security question(s)<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/mailsafi.com\/blog\/how-to-recover-from-a-compromised-email-account\/#iv_Warn_those_on_your_contact_list_that_you_have_been_hacked\" title=\"iv. Warn those on your contact list that you have been hacked\">iv. Warn those on your contact list that you have been hacked<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/mailsafi.com\/blog\/how-to-recover-from-a-compromised-email-account\/#v_Notify_your_email_provider_or_IT_administrator\" title=\"v. Notify your email provider or IT administrator \">v. Notify your email provider or IT administrator <\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/mailsafi.com\/blog\/how-to-recover-from-a-compromised-email-account\/#vi_Remove_backdoor_entries\" title=\"vi. Remove backdoor entries\">vi. Remove backdoor entries<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/mailsafi.com\/blog\/how-to-recover-from-a-compromised-email-account\/#5_How_do_I_prevent_my_email_from_being_compromised_again\" title=\"5. How do I prevent my email from being compromised again?\">5. How do I prevent my email from being compromised again?<\/a><ul class='ez-toc-list-level-4'><li class='ez-toc-heading-level-4'><ul class='ez-toc-list-level-4'><li class='ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-12\" href=\"https:\/\/mailsafi.com\/blog\/how-to-recover-from-a-compromised-email-account\/#_i_Use_a_reliable_spam_filtering_service\" title=\"&nbsp;i. Use a reliable spam filtering service \">&nbsp;i. Use a reliable spam filtering service <\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-13\" href=\"https:\/\/mailsafi.com\/blog\/how-to-recover-from-a-compromised-email-account\/#ii_Smarten_up_about_spam_phishing_spoofing_and_online_scams\" title=\"ii. Smarten up about spam, phishing, spoofing, and online scams\">ii. Smarten up about spam, phishing, spoofing, and online scams<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-14\" href=\"https:\/\/mailsafi.com\/blog\/how-to-recover-from-a-compromised-email-account\/#ii_Verify_that_content_is_legitimate_before_you_download\" title=\"ii. Verify that content is legitimate before you download \">ii. Verify that content is legitimate before you download <\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-15\" href=\"https:\/\/mailsafi.com\/blog\/how-to-recover-from-a-compromised-email-account\/#iii_Turn_on_Multi-factor_authentication_MFA\" title=\"iii. Turn on Multi-factor authentication (MFA)\">iii. Turn on Multi-factor authentication (MFA)<\/a><\/li><\/ul><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-16\" href=\"https:\/\/mailsafi.com\/blog\/how-to-recover-from-a-compromised-email-account\/#6_How_can_IT_administrators_help_minimize_cases_of_email_compromise\" title=\"6. How can IT administrators help minimize cases of email compromise?\">6. How can IT administrators help minimize cases of email compromise?<\/a><\/li><\/ul><\/nav><\/div>\n<h2 class=\"has-vivid-red-color has-text-color wp-block-heading\" style=\"font-size:34px\"><span class=\"ez-toc-section\" id=\"1_What_is_a_compromised_or_hacked_email_account\"><\/span><strong>1. What is a compromised (or hacked) email account?<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Access to email accounts is mostly through the use of a username and password and\/or PIN. A username and password are intended to be kept secret. However, should a hacker (unauthorized person) gain access to these credentials and use them to access your email account, your email is said to be compromised or hacked.<\/p>\n\n\n\n<p>Upon gaining access to the email account, the hacker can then masquerade as the original user. He\/she may also have access to folders or files in your online storage.<\/p>\n\n\n\n<p>In this article, we will cover how to know whether your email account has been compromised, how it happened, what to do should your email be compromised, and how to prevent it from happening again.<\/p>\n\n\n\n<h2 class=\"has-vivid-red-color has-text-color wp-block-heading\" style=\"font-size:34px\"><span class=\"ez-toc-section\" id=\"2_How_do_I_know_whether_my_email_has_been_compromised\"><\/span><strong>2. How do I know whether my email has been compromised?<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>There are signs that would indicate that your email has been compromised, some more obvious than others. The most common are:-<\/p>\n\n\n\n<ul><li>You are unable to log into your account. In this case, a hacker may have changed your password. This is one of the first steps hackers take after compromising your email account.<\/li><li>Your colleagues or contacts are asking why you\u2019re sending them spam (and you\u2019re certain you did not).<\/li><li>Other users may claim to have received emails from you. However, the corresponding email will be missing from your <em>Sent<\/em> <em>Items<\/em> folder. For example, Paul Simba may claim to have received an email from you. However, in your <em>Sent<\/em> <em>Items <\/em>folder, there is no such email to Paul Simba.<\/li><li>Conversely, there may also be emails in your <em>Sent<\/em>&nbsp;<em>Items <\/em>folder that you did not send. This is a sign that someone gained access to your account and is using it to send potentially fraudulent messages.<\/li><li>Some of your emails are missing (deleted).<\/li><li>Your display name is changed in the global address book\/contacts list.<\/li><li>There are unusual changes to your profile such as name, number, or unusual signature.<\/li><li>Your mailbox may be blocked from sending emails.<\/li><li>The <em>Sent<\/em> or <em>Deleted<\/em>&nbsp;<em>Items<\/em> folders in your mailbox may contain common hacked-account messages such as \u201c<em>I need your help urgently!<\/em>\u201d<\/li><li>There are unusual credential changes such as multiple password-change requests.<\/li><li>There are new inbox rules that were not created by you or the administrator. These rules may for instance forward emails to unknown addresses or move them to the <em>Junkmail folder<\/em>.<\/li><li>For more technical users, you will notice several different IP addresses in your IP log. These may be different from where you normally access your emails \u2013 your home or office network. Usually, hackers will be logging into your email from different locations.<\/li><\/ul>\n\n\n\n<h4 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"So%E2%80%A6\"><\/span>So&#8230;<span class=\"ez-toc-section-end\"><\/span><\/h4>\n\n\n\n<p>If indeed your email has been compromised, you may be wondering, &#8220;<em>How did it happen?<\/em>&#8221; Well, let\u2019s discuss a few possible scenarios.<\/p>\n\n\n\n<p class=\"has-vivid-red-color has-text-color\" style=\"font-size:34px\"><strong>3. How was my email account compromised?<\/strong><\/p>\n\n\n\n<p>It is important to know that:<\/p>\n\n\n\n<figure class=\"wp-block-pullquote\"><blockquote><p> While a good spam filtering solution plays a critical role in ensuring the security of your email, it is not a silver bullet. <\/p><\/blockquote><\/figure>\n\n\n\n<p>There are other factors that go hand-in-hand with spam filtering and failure in any one of these aspects could lead to your email account(s) being compromised.<\/p>\n\n\n\n<p>If your email account has been compromised, it was most likely for one or more of the following reasons:<\/p>\n\n\n\n<ul><li>Your password was weak and therefore easily guessed by the hacker.<\/li><li>You wrote down your password somewhere (for example, in your notes on your phone or even on a piece of paper) and it ended up in the wrong hands (or should I say, eyes!).<\/li><li>You do not have security software installed on your computer\/server or your security software is not updated, therefore, a hacker managed to install a keylogger on your system. This allowed the hacker to capture your password as you typed it in.<\/li><li>You clicked on a malicious link in an email, chat conversation, social media, or on a website.<\/li><li>You unknowingly downloaded software, an app, a game, video, song, or attachment with malicious scripts or files attached to it.<\/li><li>Your email solution does not encrypt data in transit. This effectively means that a hacker can secretly intercept the communication between your computer and the server during authentication and capture your password.<\/li><\/ul>\n\n\n\n<h2 class=\"has-vivid-red-color has-text-color wp-block-heading\" style=\"font-size:34px\"><span class=\"ez-toc-section\" id=\"4_My_email_account_has_been_compromised_What_should_I_do\"><\/span>4. <strong>My email account has been compromised. What should I do?<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>You\u2019re probably wondering, \u201c<em>So what should I do if my email has been compromised?\u201d<\/em>&nbsp;Well, if your email account has been compromised, here are some steps you can take&nbsp;to fix the problem:-<\/p>\n\n\n\n<h3 class=\"has-black-color has-text-color has-medium-font-size wp-block-heading\"><span class=\"ez-toc-section\" id=\"i_Check_and_update_your_computer%E2%80%99s_security\"><\/span><strong>i. Check (and update)&nbsp;your computer\u2019s security<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<ul><li>Most hackers collect passwords using malware that has been installed on your server, computer, or other device (tablet, smartphone). Therefore, be sure your antivirus and antimalware software are up-to-date.<\/li><li>Make sure&nbsp;your antivirus and antimalware software is set to <em>automatically update<\/em> when new security fixes are available.&nbsp;This will ensure you are protected from new attacks.<\/li><li>Check to see that all operating system patches and updates are also installed.<\/li><li>Set your computer to automatically download and update the operating system any time there are new security features. This will ensure you are protected from new attacks.<\/li><li>Once your antivirus, antimalware, and operating system are updated, run a complete scan of your system.<\/li><\/ul>\n\n\n\n<h3 class=\"has-black-color has-text-color has-medium-font-size wp-block-heading\"><span class=\"ez-toc-section\" id=\"ii_Change_your_password\"><\/span>ii. <strong>Change your password<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<ul id=\"strong-password-tips\"><li>Next, you should change the password on your email account. This should stop the hacker from continuing to masquerade as you.\u00a0<em>It is important to do this<\/em>\u00a0<em>after your antivirus, antimalware, and operating system have been updated; otherwise<\/em>, hackers may collect your new password as well.<\/li><li><strong>Set strong passwords<\/strong>.<ul><li>Reset to a strong password with uppercase letters, lowercase letters, at least one number, and at least one special character.<\/li><li>If new passwords are being set by an administrator, do not send the new password to the intended user through email as the attacker still has access to the mailbox at this point.<\/li><li>Do not reuse any of your last five passwords \u2013 to ensure that it will not be something the hacker can still guess again.<\/li><li>Do not use words that can be found in the dictionary. These are easily hacked even if spelled backward.<\/li><li>Do not use common names of people.<\/li><li>Avoid patterns, for example, 123123 or repetitions of numbers or letters such as aaaaa or 666666. Also, avoid numbers or letters that are next to each other on the keyboard like qwerty.<\/li><li>Do not use information about yourself or someone close to you like name, date of birth, or age.<\/li><li>Ensure your password is long &#8211; at least 10 or more characters.<\/li><li>Text messaging short forms can help you make strong passwords and remember them. E.g., 1AmH@ppy<\/li><li>Enable<strong><a href=\"https:\/\/mailsafi.com\/blog\/two-factor-2fa-authentication-why-you-should-use-it\/\" target=\"_blank\" rel=\"noreferrer noopener\"><span class=\"has-inline-color has-vivid-cyan-blue-color\"> two-factor authentication (2FA)<\/span><\/a><\/strong> or multi-factor authentication (MFA). This will minimize the risk of compromise. This is particularly important for administrator accounts.<\/li><li>If you are accessing your email via a third-party application such as Outlook, Thunderbird, etc., use<span class=\"has-inline-color has-vivid-cyan-blue-color\"> <\/span><strong><a href=\"https:\/\/mailsafi.com\/blog\/application-specific-passwords\/\" target=\"_blank\" rel=\"noreferrer noopener\"><span class=\"has-inline-color has-vivid-cyan-blue-color\">app-specific passwords<\/span><\/a><\/strong><span class=\"has-inline-color has-vivid-cyan-blue-color\"><strong> <\/strong><\/span>to protect your primary password. In Microsoft accounts, be sure to reset app passwords as these aren\u2019t automatically revoked when a user account password is reset.<\/li><\/ul><\/li><li>Change the password of any other online accounts that use your email address, for instance, online banking.<strong>\u00a0<\/strong><\/li><\/ul>\n\n\n\n<h3 class=\"has-black-color has-text-color has-medium-font-size wp-block-heading\"><span class=\"ez-toc-section\" id=\"iii_Change_your_security_questions\"><\/span><strong>iii. Change your security question(s)<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Change your security questions to ensure they are not easily guessed.<\/p>\n\n\n\n<p>If your email account was hacked from a device or location not matching your normal usage patterns, it is possible the hacker most likely had to correctly answer a security question. If your question and answer are common (for example, what is your dog\u2019s name? Answer: Simba), that may not have been a difficult challenge.<\/p>\n\n\n\n<h3 class=\"has-black-color has-text-color has-medium-font-size wp-block-heading\"><span class=\"ez-toc-section\" id=\"iv_Warn_those_on_your_contact_list_that_you_have_been_hacked\"><\/span><strong>iv. Warn those on your contact list that you have been hacked<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Warn those on your contact list that your email account has been compromised.&nbsp;You can start by checking your sent items in your Sent folder to see if there are any emails you did not send appearing there. If so, start by informing these contacts that your email account was compromised. This might prevent them from opening fraudulent emails and clicking on potentially harmful links (containing malware). The attacker may have asked them for money, spoofing, for example, that you were stranded in a different country and needed money, or the attacker may send them a virus to also hijack their email or computers.<\/p>\n\n\n\n<h3 class=\"has-black-color has-text-color has-medium-font-size wp-block-heading\"><span class=\"ez-toc-section\" id=\"v_Notify_your_email_provider_or_IT_administrator\"><\/span>v. <strong>Notify your email provider or IT administrato<\/strong>r <span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Let your email provider or IT administrator know that your account has been compromised. They may offer additional guidance on how else you can ensure security.<\/p>\n\n\n\n<h3 class=\"has-black-color has-text-color has-medium-font-size wp-block-heading\"><span class=\"ez-toc-section\" id=\"vi_Remove_backdoor_entries\"><\/span><strong>vi. Remove backdoor entries<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Even after you&#8217;ve regained access to your account, the hacker may have added back-door entries that enable the hacker to regain control of the account. Perform the following steps to regain access to your account. The sooner the better to make sure that the hacker doesn&#8217;t regain control of your account. These steps help you remove any back-door entries that may have been added to your account.<\/p>\n\n\n\n<ul><li>Remove any suspicious email forwarding addresses.<\/li><li>Disable any suspicious inbox rules.<\/li><li>If the suspected compromised email account was used to send <strong><a href=\"https:\/\/mailsafi.com\/blog\/email-spam-and-spam-filtering\/\" target=\"_blank\" rel=\"noreferrer noopener\"><span class=\"has-inline-color has-vivid-cyan-blue-color\">spam<\/span><\/a><\/strong>, the mailbox has likely been blocked from sending mail. You will therefore need to unblock the user from sending mail.<\/li><\/ul>\n\n\n\n<p class=\"has-vivid-red-color has-text-color\"><strong>Optional steps<\/strong><\/p>\n\n\n\n<ul><li>Block the suspected compromised account from signing in until you believe it is safe to re-enable access.<\/li><li>Remove the suspected compromised account from all administrative role groups. Administrative role group membership can be restored after the account has been secured.<\/li><\/ul>\n\n\n\n<p>After you perform these steps, we recommend that you run a full virus scan to make sure that your computer isn&#8217;t compromised.<\/p>\n\n\n\n<h2 class=\"has-vivid-red-color has-text-color wp-block-heading\" style=\"font-size:34px\"><span class=\"ez-toc-section\" id=\"5_How_do_I_prevent_my_email_from_being_compromised_again\"><\/span><strong>5. How do I prevent my email from being compromised again?<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<h4 class=\"has-black-color has-text-color has-medium-font-size wp-block-heading\"><span class=\"ez-toc-section\" id=\"_i_Use_a_reliable_spam_filtering_service\"><\/span><strong>&nbsp;i. Use a reliable spam filtering service <\/strong><span class=\"ez-toc-section-end\"><\/span><\/h4>\n\n\n\n<p>If you aren&#8217;t already doing so, <\/p>\n\n\n\n<figure class=\"wp-block-pullquote\"><blockquote><p>Consider outsourcing your email security and spam filtering to a<span class=\"has-inline-color has-vivid-cyan-blue-color\"> <\/span><strong><a rel=\"noreferrer noopener\" href=\"https:\/\/www.mailsafi.com\/\" target=\"_blank\"><span class=\"has-inline-color has-vivid-cyan-blue-color\">reliable email security provider<\/span><\/a><\/strong>. <\/p><\/blockquote><\/figure>\n\n\n\n<p>This will ensure that your emails are filtered and spam is stopped before it ever gets to your server or network. See more reasons why you should consider a third-party provider for your spam filtering <strong><a rel=\"noreferrer noopener\" href=\"https:\/\/mailsafi.com\/blog\/8-reasons-why-you-should-outsource-your-spam-filtering\/\" target=\"_blank\"><span class=\"has-inline-color has-vivid-cyan-blue-color\">here<\/span><\/a><\/strong>.  <\/p>\n\n\n\n<p>However, as discussed above, third-party spam filtering on its own is not a silver bullet to preventing email hacking or compromise. Read more below on other important factors to put in place for added security.<\/p>\n\n\n\n<h4 class=\"has-black-color has-text-color has-medium-font-size wp-block-heading\"><span class=\"ez-toc-section\" id=\"ii_Smarten_up_about_spam_phishing_spoofing_and_online_scams\"><\/span>ii. <strong>Smarten up about spam, phishing, spoofing, and online scams<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h4>\n\n\n\n<p><strong><a href=\"https:\/\/mailsafi.com\/blog\/email-spam-and-spam-filtering\/\" target=\"_blank\" rel=\"noreferrer noopener\"><span class=\"has-inline-color has-vivid-cyan-blue-color\">Spam <\/span><\/a><\/strong>comes at us from various sources; in your email inbox, via instant messaging, social media, chats, forums, websites, and sadly, now also on your smartphone. It is important to be on your guard for phishing scams.<\/p>\n\n\n\n<figure class=\"wp-block-pullquote\"><blockquote><p>Use common sense when reading your email<\/p><\/blockquote><\/figure>\n\n\n\n<ul><li>You do not have a rich uncle you\u2019ve never heard of in some foreign country trying to send you money. You have not won the lottery. No stranger is going to give you money for no reason, and if there was a miracle weight loss cure, it would be front-page news and on every TV station.<\/li><li>You might see an email in your account that looks like it&#8217;s from your bank. If that email asks you to send your username and password to verify your account, stop. This is almost certainly a scam.<\/li><li>Your bank or other financial institutions will never ask for your personal information via email. Before sending this information, call your bank or financial institution at their published customer service number to verify whether it requested this personal info.<\/li><li>Don&#8217;t click on links in emails unless you know who sent the message to you and you&#8217;re expecting this person to send you a link. Don&#8217;t click even if you know the sender if you\u2019re not expecting that link. These fraudulent links often lead to spoofed websites that look like they\u2019re run by a bank or credit card provider. However, they are created by fraudsters to scam you out of your personal information. If you get an email with a link to one of these sites, don\u2019t use it; instead, use your search engine to find the site yourself and then log in.<\/li><\/ul>\n\n\n\n<h4 class=\"has-medium-font-size wp-block-heading\"><span class=\"ez-toc-section\" id=\"ii_Verify_that_content_is_legitimate_before_you_download\"><\/span>ii. <strong>Verify t<\/strong>hat <strong>content is legitimate before you download <\/strong><span class=\"ez-toc-section-end\"><\/span><\/h4>\n\n\n\n<p>Only download content that you have read good reviews about from sites you can trust.&nbsp;If the content is pirated, free, or comes to you anonymously, it is safer to assume it may contain malware.<\/p>\n\n\n\n<p>A good antivirus software will be set to scan any downloads to your computer. This can serve as a warning should you accidentally download potentially malicious content.<\/p>\n\n\n\n<h4 class=\"has-medium-font-size wp-block-heading\"><span class=\"ez-toc-section\" id=\"iii_Turn_on_Multi-factor_authentication_MFA\"><\/span>iii. <strong>Turn on Multi-factor authentication (MFA)<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h4>\n\n\n\n<p>If your email provider offers multi-factor authentication (MFA), enable it as an additional security measure. All<span class=\"has-inline-color has-vivid-cyan-blue-color\"> <\/span><a href=\"https:\/\/www.mailsafi.com\/email-hosting#hosting-price\" target=\"_blank\" rel=\"noreferrer noopener\"><strong><span class=\"has-inline-color has-vivid-cyan-blue-color\">MailSafi email hosting solutions <\/span><\/strong><\/a>offer two-factor authentication (2FA).<\/p>\n\n\n\n<p>With MFA\/2FA, you must first log into your email with your username and password and then wait for a code\/PIN&nbsp;usually sent to your mobile phone.  And then you have to enter that code\/PIN to gain access to your account.&nbsp;Even though this adds an extra step to logging into your email account, it provides an extra layer of protection.<\/p>\n\n\n\n<h2 class=\"has-vivid-red-color has-text-color wp-block-heading\" style=\"font-size:34px\"><span class=\"ez-toc-section\" id=\"6_How_can_IT_administrators_help_minimize_cases_of_email_compromise\"><\/span>6. <strong>How can IT administrators help minimize cases of email compromise?<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<figure class=\"wp-block-pullquote\"><blockquote><p>Make computer and email security a priority<\/p><\/blockquote><\/figure>\n\n\n\n<ol><li>Constantly educate your employees on email compromise causes and prevention. You can read more tips specifically about email security in our article on<span class=\"has-inline-color has-vivid-cyan-blue-color\"> <\/span><strong><a rel=\"noreferrer noopener\" href=\"https:\/\/mailsafi.com\/blog\/the-role-of-your-employees-in-your-fight-against-spam\/\" target=\"_blank\"><span class=\"has-inline-color has-vivid-cyan-blue-color\">The Role of Employees in your Fight Against Spam<\/span><\/a><\/strong>. Additionally, keep your staff updated on new techniques or patterns that would help them identify these risks.<\/li><li>Test staff with incident scenarios. Test controls and encourage staff to report any suspicious incidents.<\/li><li>Review, refine, and retest your incident management and phishing reporting systems.<\/li><li>Review existing processes, procedures, and separation of duties for financial transfers and other important transactions such as sending sensitive data in bulk to external entities. This is necessary to help you identify insider threats.<\/li><\/ol>\n\n\n\n<p class=\"has-light-green-cyan-background-color has-background\">A good first step in protecting your email is to get the right email service provider and email security for your business. <strong><a href=\"https:\/\/www.mailsafi.com\/contact-us\" target=\"_blank\" rel=\"noreferrer noopener\"><span class=\"has-inline-color has-vivid-cyan-blue-color\">Contact us<\/span> <\/a><\/strong>for more information on our<span class=\"has-inline-color has-vivid-cyan-blue-color\"> <\/span><strong><a href=\"https:\/\/www.mailsafi.com\/email-hosting\" target=\"_blank\" rel=\"noreferrer noopener\"><span class=\"has-inline-color has-vivid-cyan-blue-color\">cloud email hosting<\/span><\/a><\/strong><span class=\"has-inline-color has-vivid-cyan-blue-color\"> <\/span>and <strong><a href=\"https:\/\/www.mailsafi.com\/\" target=\"_blank\" rel=\"noreferrer noopener\"><span class=\"has-inline-color has-vivid-cyan-blue-color\">email security<\/span><\/a><\/strong> services. <\/p>\n\n\n\n<p class=\"has-light-green-cyan-background-color has-background\">Our solutions are compatible with multiple applications, operating systems, as well as with Microsoft 365 and Google Workspace. <\/p>\n<div class=\"pvc_clear\"><\/div><p id=\"pvc_stats_2051\" class=\"pvc_stats all  \" data-element-id=\"2051\" style=\"\"><i class=\"pvc-stats-icon large\" aria-hidden=\"true\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" version=\"1.0\" viewBox=\"0 0 502 315\" preserveAspectRatio=\"xMidYMid meet\"><g transform=\"translate(0,332) scale(0.1,-0.1)\" fill=\"\" stroke=\"none\"><path d=\"M2394 3279 l-29 -30 -3 -207 c-2 -182 0 -211 15 -242 39 -76 157 -76 196 0 15 31 17 60 15 243 l-3 209 -33 29 c-26 23 -41 29 -80 29 -41 0 -53 -5 -78 -31z\"\/><path d=\"M3085 3251 c-45 -19 -58 -50 -96 -229 -47 -217 -49 -260 -13 -295 52 -53 146 -42 177 20 16 31 87 366 87 410 0 70 -86 122 -155 94z\"\/><path d=\"M1751 3234 c-13 -9 -29 -31 -37 -50 -12 -29 -10 -49 21 -204 19 -94 39 -189 45 -210 14 -50 54 -80 110 -80 34 0 48 6 76 34 21 21 34 44 34 59 0 14 -18 113 -40 219 -37 178 -43 195 -70 221 -36 32 -101 37 -139 11z\"\/><path d=\"M1163 3073 c-36 -7 -73 -59 -73 -102 0 -56 133 -378 171 -413 34 -32 83 -37 129 -13 70 36 67 87 -16 290 -86 209 -89 214 -129 231 -35 14 -42 15 -82 7z\"\/><path d=\"M3689 3066 c-15 -9 -33 -30 -42 -48 -48 -103 -147 -355 -147 -375 0 -98 131 -148 192 -74 13 15 57 108 97 206 80 196 84 226 37 273 -30 30 -99 39 -137 18z\"\/><path d=\"M583 2784 c-38 -19 -67 -74 -58 -113 9 -42 211 -354 242 -373 16 -10 45 -18 66 -18 51 0 107 52 107 100 0 39 -1 41 -124 234 -80 126 -108 162 -133 173 -41 17 -61 16 -100 -3z\"\/><path d=\"M4250 2784 c-14 -9 -74 -91 -133 -183 -95 -150 -107 -173 -107 -213 0 -55 33 -94 87 -104 67 -13 90 8 211 198 130 202 137 225 78 284 -27 27 -42 34 -72 34 -22 0 -50 -8 -64 -16z\"\/><path d=\"M2275 2693 c-553 -48 -1095 -270 -1585 -649 -135 -104 -459 -423 -483 -476 -23 -49 -22 -139 2 -186 73 -142 361 -457 571 -626 285 -228 642 -407 990 -497 242 -63 336 -73 660 -74 310 0 370 5 595 52 535 111 1045 392 1455 803 122 121 250 273 275 326 19 41 19 137 0 174 -41 79 -309 363 -465 492 -447 370 -946 591 -1479 653 -113 14 -422 18 -536 8z m395 -428 c171 -34 330 -124 456 -258 112 -119 167 -219 211 -378 27 -96 24 -300 -5 -401 -72 -255 -236 -447 -474 -557 -132 -62 -201 -76 -368 -76 -167 0 -236 14 -368 76 -213 98 -373 271 -451 485 -162 444 86 934 547 1084 153 49 292 57 452 25z m909 -232 c222 -123 408 -262 593 -441 76 -74 138 -139 138 -144 0 -16 -233 -242 -330 -319 -155 -123 -309 -223 -461 -299 l-81 -41 32 46 c18 26 49 83 70 128 143 306 141 649 -6 957 -25 52 -61 116 -79 142 l-34 47 45 -20 c26 -10 76 -36 113 -56z m-2057 25 c-40 -58 -105 -190 -130 -263 -110 -324 -59 -707 132 -981 25 -35 42 -64 37 -64 -19 0 -241 119 -326 174 -188 122 -406 314 -532 468 l-58 71 108 103 c185 178 428 349 672 473 66 33 121 60 123 61 2 0 -10 -19 -26 -42z\"\/><path d=\"M2375 1950 c-198 -44 -350 -190 -395 -379 -18 -76 -8 -221 19 -290 114 -284 457 -406 731 -260 98 52 188 154 231 260 27 69 37 214 19 290 -38 163 -166 304 -326 360 -67 23 -215 33 -279 19z\"\/><\/g><\/svg><\/i> <img loading=\"lazy\" decoding=\"async\" width=\"16\" height=\"16\" alt=\"Loading\" src=\"https:\/\/mailsafi.com\/blog\/wp-content\/plugins\/page-views-count\/ajax-loader-2x.gif\" border=0 \/><\/p><div class=\"pvc_clear\"><\/div>","protected":false},"excerpt":{"rendered":"<p>1. What is a compromised (or hacked) email account? Access to email accounts is mostly through the use of a username and password and\/or PIN. A username and password are intended to be kept secret. However, should a hacker (unauthorized person) gain access to these credentials and use them to access your email account, your [&hellip;]<\/p>\n<div class=\"pvc_clear\"><\/div>\n<p id=\"pvc_stats_2051\" class=\"pvc_stats all  \" data-element-id=\"2051\" style=\"\"><i class=\"pvc-stats-icon large\" aria-hidden=\"true\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" version=\"1.0\" viewBox=\"0 0 502 315\" preserveAspectRatio=\"xMidYMid meet\"><g transform=\"translate(0,332) scale(0.1,-0.1)\" fill=\"\" stroke=\"none\"><path d=\"M2394 3279 l-29 -30 -3 -207 c-2 -182 0 -211 15 -242 39 -76 157 -76 196 0 15 31 17 60 15 243 l-3 209 -33 29 c-26 23 -41 29 -80 29 -41 0 -53 -5 -78 -31z\"\/><path d=\"M3085 3251 c-45 -19 -58 -50 -96 -229 -47 -217 -49 -260 -13 -295 52 -53 146 -42 177 20 16 31 87 366 87 410 0 70 -86 122 -155 94z\"\/><path d=\"M1751 3234 c-13 -9 -29 -31 -37 -50 -12 -29 -10 -49 21 -204 19 -94 39 -189 45 -210 14 -50 54 -80 110 -80 34 0 48 6 76 34 21 21 34 44 34 59 0 14 -18 113 -40 219 -37 178 -43 195 -70 221 -36 32 -101 37 -139 11z\"\/><path d=\"M1163 3073 c-36 -7 -73 -59 -73 -102 0 -56 133 -378 171 -413 34 -32 83 -37 129 -13 70 36 67 87 -16 290 -86 209 -89 214 -129 231 -35 14 -42 15 -82 7z\"\/><path d=\"M3689 3066 c-15 -9 -33 -30 -42 -48 -48 -103 -147 -355 -147 -375 0 -98 131 -148 192 -74 13 15 57 108 97 206 80 196 84 226 37 273 -30 30 -99 39 -137 18z\"\/><path d=\"M583 2784 c-38 -19 -67 -74 -58 -113 9 -42 211 -354 242 -373 16 -10 45 -18 66 -18 51 0 107 52 107 100 0 39 -1 41 -124 234 -80 126 -108 162 -133 173 -41 17 -61 16 -100 -3z\"\/><path d=\"M4250 2784 c-14 -9 -74 -91 -133 -183 -95 -150 -107 -173 -107 -213 0 -55 33 -94 87 -104 67 -13 90 8 211 198 130 202 137 225 78 284 -27 27 -42 34 -72 34 -22 0 -50 -8 -64 -16z\"\/><path d=\"M2275 2693 c-553 -48 -1095 -270 -1585 -649 -135 -104 -459 -423 -483 -476 -23 -49 -22 -139 2 -186 73 -142 361 -457 571 -626 285 -228 642 -407 990 -497 242 -63 336 -73 660 -74 310 0 370 5 595 52 535 111 1045 392 1455 803 122 121 250 273 275 326 19 41 19 137 0 174 -41 79 -309 363 -465 492 -447 370 -946 591 -1479 653 -113 14 -422 18 -536 8z m395 -428 c171 -34 330 -124 456 -258 112 -119 167 -219 211 -378 27 -96 24 -300 -5 -401 -72 -255 -236 -447 -474 -557 -132 -62 -201 -76 -368 -76 -167 0 -236 14 -368 76 -213 98 -373 271 -451 485 -162 444 86 934 547 1084 153 49 292 57 452 25z m909 -232 c222 -123 408 -262 593 -441 76 -74 138 -139 138 -144 0 -16 -233 -242 -330 -319 -155 -123 -309 -223 -461 -299 l-81 -41 32 46 c18 26 49 83 70 128 143 306 141 649 -6 957 -25 52 -61 116 -79 142 l-34 47 45 -20 c26 -10 76 -36 113 -56z m-2057 25 c-40 -58 -105 -190 -130 -263 -110 -324 -59 -707 132 -981 25 -35 42 -64 37 -64 -19 0 -241 119 -326 174 -188 122 -406 314 -532 468 l-58 71 108 103 c185 178 428 349 672 473 66 33 121 60 123 61 2 0 -10 -19 -26 -42z\"\/><path d=\"M2375 1950 c-198 -44 -350 -190 -395 -379 -18 -76 -8 -221 19 -290 114 -284 457 -406 731 -260 98 52 188 154 231 260 27 69 37 214 19 290 -38 163 -166 304 -326 360 -67 23 -215 33 -279 19z\"\/><\/g><\/svg><\/i> <img loading=\"lazy\" decoding=\"async\" width=\"16\" height=\"16\" alt=\"Loading\" src=\"https:\/\/mailsafi.com\/blog\/wp-content\/plugins\/page-views-count\/ajax-loader-2x.gif\" border=0 \/><\/p>\n<div class=\"pvc_clear\"><\/div>\n","protected":false},"author":1,"featured_media":2070,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[3],"tags":[107,213],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Compromised email or hacked email account: How to fix it | MailSafi<\/title>\n<meta name=\"description\" content=\"Learn the signs that your email account has been compromised (hacked), how it happened, what to do, and how to prevent it from recurring.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/mailsafi.com\/blog\/how-to-recover-from-a-compromised-email-account\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Compromised email or hacked email account: How to fix it | MailSafi\" \/>\n<meta property=\"og:description\" content=\"Learn the signs that your email account has been compromised (hacked), how it happened, what to do, and how to prevent it from recurring.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/mailsafi.com\/blog\/how-to-recover-from-a-compromised-email-account\/\" \/>\n<meta property=\"og:site_name\" content=\"The MailSafi Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/msgafricaltd\/\" \/>\n<meta property=\"article:published_time\" content=\"2020-10-19T11:40:20+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-12-03T10:58:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2020\/10\/email-hacked-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"300\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"the_leaders\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@msgafricaltd\" \/>\n<meta name=\"twitter:site\" content=\"@msgafricaltd\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"the_leaders\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"12 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/mailsafi.com\/blog\/how-to-recover-from-a-compromised-email-account\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/mailsafi.com\/blog\/how-to-recover-from-a-compromised-email-account\/\"},\"author\":{\"name\":\"the_leaders\",\"@id\":\"https:\/\/mailsafi.com\/blog\/#\/schema\/person\/d2ec682ba327149927593938af3f9d14\"},\"headline\":\"How to Recover from a Compromised or Hacked Email Account\",\"datePublished\":\"2020-10-19T11:40:20+00:00\",\"dateModified\":\"2020-12-03T10:58:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/mailsafi.com\/blog\/how-to-recover-from-a-compromised-email-account\/\"},\"wordCount\":2348,\"publisher\":{\"@id\":\"https:\/\/mailsafi.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/mailsafi.com\/blog\/how-to-recover-from-a-compromised-email-account\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2020\/10\/email-hacked-image.jpg\",\"keywords\":[\"business email compromise\",\"hacked email\"],\"articleSection\":[\"Email Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/mailsafi.com\/blog\/how-to-recover-from-a-compromised-email-account\/\",\"url\":\"https:\/\/mailsafi.com\/blog\/how-to-recover-from-a-compromised-email-account\/\",\"name\":\"Compromised email or hacked email account: How to fix it | MailSafi\",\"isPartOf\":{\"@id\":\"https:\/\/mailsafi.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/mailsafi.com\/blog\/how-to-recover-from-a-compromised-email-account\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/mailsafi.com\/blog\/how-to-recover-from-a-compromised-email-account\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2020\/10\/email-hacked-image.jpg\",\"datePublished\":\"2020-10-19T11:40:20+00:00\",\"dateModified\":\"2020-12-03T10:58:18+00:00\",\"description\":\"Learn the signs that your email account has been compromised (hacked), how it happened, what to do, and how to prevent it from recurring.\",\"breadcrumb\":{\"@id\":\"https:\/\/mailsafi.com\/blog\/how-to-recover-from-a-compromised-email-account\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/mailsafi.com\/blog\/how-to-recover-from-a-compromised-email-account\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/mailsafi.com\/blog\/how-to-recover-from-a-compromised-email-account\/#primaryimage\",\"url\":\"https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2020\/10\/email-hacked-image.jpg\",\"contentUrl\":\"https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2020\/10\/email-hacked-image.jpg\",\"width\":600,\"height\":300,\"caption\":\"A compromised or hacked email account\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/mailsafi.com\/blog\/how-to-recover-from-a-compromised-email-account\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/mailsafi.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to Recover from a Compromised or Hacked Email Account\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/mailsafi.com\/blog\/#website\",\"url\":\"https:\/\/mailsafi.com\/blog\/\",\"name\":\"The MailSafi Blog\",\"description\":\"We Stop Spam\",\"publisher\":{\"@id\":\"https:\/\/mailsafi.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/mailsafi.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/mailsafi.com\/blog\/#organization\",\"name\":\"Message Labs Africa\",\"url\":\"https:\/\/mailsafi.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/mailsafi.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Message Labs Africa\"},\"image\":{\"@id\":\"https:\/\/mailsafi.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/msgafricaltd\/\",\"https:\/\/x.com\/msgafricaltd\",\"https:\/\/www.linkedin.com\/feed\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/mailsafi.com\/blog\/#\/schema\/person\/d2ec682ba327149927593938af3f9d14\",\"name\":\"the_leaders\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/mailsafi.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/7ca448387530cb3177261ca8cd87ff2a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/7ca448387530cb3177261ca8cd87ff2a?s=96&d=mm&r=g\",\"caption\":\"the_leaders\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Compromised email or hacked email account: How to fix it | MailSafi","description":"Learn the signs that your email account has been compromised (hacked), how it happened, what to do, and how to prevent it from recurring.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/mailsafi.com\/blog\/how-to-recover-from-a-compromised-email-account\/","og_locale":"en_US","og_type":"article","og_title":"Compromised email or hacked email account: How to fix it | MailSafi","og_description":"Learn the signs that your email account has been compromised (hacked), how it happened, what to do, and how to prevent it from recurring.","og_url":"https:\/\/mailsafi.com\/blog\/how-to-recover-from-a-compromised-email-account\/","og_site_name":"The MailSafi Blog","article_publisher":"https:\/\/www.facebook.com\/msgafricaltd\/","article_published_time":"2020-10-19T11:40:20+00:00","article_modified_time":"2020-12-03T10:58:18+00:00","og_image":[{"width":600,"height":300,"url":"https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2020\/10\/email-hacked-image.jpg","type":"image\/jpeg"}],"author":"the_leaders","twitter_card":"summary_large_image","twitter_creator":"@msgafricaltd","twitter_site":"@msgafricaltd","twitter_misc":{"Written by":"the_leaders","Est. reading time":"12 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/mailsafi.com\/blog\/how-to-recover-from-a-compromised-email-account\/#article","isPartOf":{"@id":"https:\/\/mailsafi.com\/blog\/how-to-recover-from-a-compromised-email-account\/"},"author":{"name":"the_leaders","@id":"https:\/\/mailsafi.com\/blog\/#\/schema\/person\/d2ec682ba327149927593938af3f9d14"},"headline":"How to Recover from a Compromised or Hacked Email Account","datePublished":"2020-10-19T11:40:20+00:00","dateModified":"2020-12-03T10:58:18+00:00","mainEntityOfPage":{"@id":"https:\/\/mailsafi.com\/blog\/how-to-recover-from-a-compromised-email-account\/"},"wordCount":2348,"publisher":{"@id":"https:\/\/mailsafi.com\/blog\/#organization"},"image":{"@id":"https:\/\/mailsafi.com\/blog\/how-to-recover-from-a-compromised-email-account\/#primaryimage"},"thumbnailUrl":"https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2020\/10\/email-hacked-image.jpg","keywords":["business email compromise","hacked email"],"articleSection":["Email Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/mailsafi.com\/blog\/how-to-recover-from-a-compromised-email-account\/","url":"https:\/\/mailsafi.com\/blog\/how-to-recover-from-a-compromised-email-account\/","name":"Compromised email or hacked email account: How to fix it | MailSafi","isPartOf":{"@id":"https:\/\/mailsafi.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/mailsafi.com\/blog\/how-to-recover-from-a-compromised-email-account\/#primaryimage"},"image":{"@id":"https:\/\/mailsafi.com\/blog\/how-to-recover-from-a-compromised-email-account\/#primaryimage"},"thumbnailUrl":"https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2020\/10\/email-hacked-image.jpg","datePublished":"2020-10-19T11:40:20+00:00","dateModified":"2020-12-03T10:58:18+00:00","description":"Learn the signs that your email account has been compromised (hacked), how it happened, what to do, and how to prevent it from recurring.","breadcrumb":{"@id":"https:\/\/mailsafi.com\/blog\/how-to-recover-from-a-compromised-email-account\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/mailsafi.com\/blog\/how-to-recover-from-a-compromised-email-account\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mailsafi.com\/blog\/how-to-recover-from-a-compromised-email-account\/#primaryimage","url":"https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2020\/10\/email-hacked-image.jpg","contentUrl":"https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2020\/10\/email-hacked-image.jpg","width":600,"height":300,"caption":"A compromised or hacked email account"},{"@type":"BreadcrumbList","@id":"https:\/\/mailsafi.com\/blog\/how-to-recover-from-a-compromised-email-account\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/mailsafi.com\/blog\/"},{"@type":"ListItem","position":2,"name":"How to Recover from a Compromised or Hacked Email Account"}]},{"@type":"WebSite","@id":"https:\/\/mailsafi.com\/blog\/#website","url":"https:\/\/mailsafi.com\/blog\/","name":"The MailSafi Blog","description":"We Stop Spam","publisher":{"@id":"https:\/\/mailsafi.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/mailsafi.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/mailsafi.com\/blog\/#organization","name":"Message Labs Africa","url":"https:\/\/mailsafi.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mailsafi.com\/blog\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Message Labs Africa"},"image":{"@id":"https:\/\/mailsafi.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/msgafricaltd\/","https:\/\/x.com\/msgafricaltd","https:\/\/www.linkedin.com\/feed\/"]},{"@type":"Person","@id":"https:\/\/mailsafi.com\/blog\/#\/schema\/person\/d2ec682ba327149927593938af3f9d14","name":"the_leaders","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mailsafi.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/7ca448387530cb3177261ca8cd87ff2a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7ca448387530cb3177261ca8cd87ff2a?s=96&d=mm&r=g","caption":"the_leaders"}}]}},"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/mailsafi.com\/blog\/wp-json\/wp\/v2\/posts\/2051"}],"collection":[{"href":"https:\/\/mailsafi.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mailsafi.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mailsafi.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mailsafi.com\/blog\/wp-json\/wp\/v2\/comments?post=2051"}],"version-history":[{"count":38,"href":"https:\/\/mailsafi.com\/blog\/wp-json\/wp\/v2\/posts\/2051\/revisions"}],"predecessor-version":[{"id":2483,"href":"https:\/\/mailsafi.com\/blog\/wp-json\/wp\/v2\/posts\/2051\/revisions\/2483"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/mailsafi.com\/blog\/wp-json\/wp\/v2\/media\/2070"}],"wp:attachment":[{"href":"https:\/\/mailsafi.com\/blog\/wp-json\/wp\/v2\/media?parent=2051"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mailsafi.com\/blog\/wp-json\/wp\/v2\/categories?post=2051"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mailsafi.com\/blog\/wp-json\/wp\/v2\/tags?post=2051"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}