Hackers and scammers are a constant threat online. Everything from social media accounts to email addresses can come under attack at any time. Older accounts can put your newer accounts at risk, so how can you tell if your accounts or passwords have ever been hacked? Below are the signs you need to look out for to tell if you’re at risk of hacking.
How to Check if You've Been Hacked and What to Do if You Are
Use ‘Have I Been Pwned?’

‘Have I Been Pwned?’ is one of the best tools for checking your email accounts’ safety. You should go to the website and enter each of your email addresses. The site will check if your account has ever been part of a data breach or if your account details have been pasted to the public online. If either of those things is true, you know the account is more at risk.
You should secure any accounts that are at risk. Use a password generator and password manager, and be sure not to open suspicious emails. It would help if you were vigilant for any suspicious activity on your email account. If you use the same password as the email account anywhere else, change it immediately.
Use ‘Dehashed’

Dehashed is another powerful tool for checking the safety of your online information. Unlike the above tool, Dehashed covers more than email addresses. You can enter any search term, such as an old username, and the site will trawl the internet to see if any of your information is publicly available. The site includes tools to help you remove any personal data entries you come across.
You should use Dehashed if you’re worried about old usernames you no longer use becoming compromised. It’s possible to search for your full legal name, address, and phone number. For security reasons, you’ll need to create an account before you can check the details of any data you come across.
Check For Hacked Sites

You should check sites you regularly use to ensure they’re safe. You can use free services, like Sucuri Site Checker, to ensure the sites you visit often are safe.
Go to Sucuri Site Checker and enter the address of any website. The site will provide you with a list of potential risks from the site you entered. If any sites you use regularly come back as risky, you should act immediately. It would be best if you changed any passwords associated with the breached site.
Monitor A Hacked Websites List

An essential step in checking if you’ve been hacked is to check on lists of hacked websites. ‘Have I Been Pwned’ offers a comprehensive list of all the websites that have ever been breached. There are other sites, such as Self Key, that offer lists of the most recent breaches. You should ensure you’re checking these lists frequently to ensure sites you use haven’t been the victim of a data breach.
Most sites inform their users when a breach occurs. However, it’s possible to miss those messages, and in some cases, websites fail to notify users in a timely fashion. For your own safety and peace of mind, you’re best checking these sites regularly yourself. If you want to keep updated, use an RSS reader like Newsflow and add the ‘Have I Been Pwned’ breached sites RSS feed. The feed will inform you whenever a new breach happens.
If you know you have been hacked, here’s what you should do
You might have noticed that your passwords have changed or that you have received suspicious login alert emails from the online services you are using. If you are locked out of your online account and cannot recover it, you could be hacked. Here are some immediate steps you need to take if your online account has been hacked.
If you need our expert help to recover your hacked account, you can order a recovery session with one of our experts.
Also read: If you are hacked, never hire a hacker or pay any ransom
First thing first: Notify your Friends, Family Members, and Followers
Your friends and family members must be aware that one or more of your accounts have been hacked. The reasons are:
- Most hackers hack for financial gain, and when they get access to your account, they will try to scam or blackmail you or attempt to scam your friends or followers of your hacked account. We have had multiple clients hacked by their own friends on, e.g., Facebook, as hackers already controlled their accounts. This is a continuous loop where the hacker keeps hacking friends of a hacked account and then repeats it. It’s called social engineering. Think about it, if you got a message from your dad, brother, or best friend, to send you a code from your phone, would you not do it?
- The second reason is that the hacker might post sensitive or violating content on your own profile. If you are an employee or have important positions, this might get you in serious trouble.
We have created a page with information that you can send to your friends, family members, and followers to ensure that they are kept safe and understand what you are going through. You can also have friends post this page on their profiles referring to your account specifically.
Never pay a ransom
If you have been hacked and the hackers have reached out to you demanding ransom, do not respond and definitely do not pay. By paying the hackers for their illegal activities, you are indirectly funding and supporting their operations, which means that they can continue hurting other people and businesses.
If hackers approach you and ask for a ransom, you should contact your local law enforcement and file a police report. You can also hire a third party who can talk to the hackers and not directly involve yourself.
What is important to know about most hackers is that they are in it for the money. The minute they understand you won’t give you any money, they will leave you alone and move onto their next victims. Most extortion attempts are shallow and won’t materialize.
Suspicious Logins
Today, most online services will let you know if you have been logged into their services with a different computer, IP, or browser. If you do not recognize a login, you should take immediate action and secure your account by:
- Changing the password
- Adding 2FA (Two-Factor Authentication)
- Adding additional security levels the service provides
Unable to log in to your services?
If the hackers have changed your password and/or email, and you are unable to log back into your own account, you should follow the service’s own protocol for hacked accounts. Often you can reset recent changes from the email alerts sent by the service. If that does not help, you should try to get in touch with the service’s customer support and see if they can help you.
Follow our Hacked Protocol
If you are certain that you have been hacked, you should follow our protocol:
- Change passwords on all online accounts you still got access to and secure these as fast as possible.
- Ensure that you have secured your main email account, changed the password, implemented a recovery email, and enabled Two-Factor Authentication.
- Let all your friends and family members know that you have been hacked to ensure that they are not scammed by the hackers pretending to be you.
- Do an assessment of which accounts have been hacked and what information the hackers have received about you and your network.
- Do not create a new profile or account on the same platform you were hacked using the same credentials like email or phone number. This makes it much harder to recover your account.
After you get the full overview of the situation and secure all other online accounts, you can recover your hacked accounts. Go through your emails and see if you can find security alerts from the service you’ve lost access to. Often they give you an option to reset recent changes to your account.
Try to reset your hacked account’s password, using both the email option and the SMS option where applicable.
If that doesn’t help, go to the service’s help portal and see if you can find a form to report a hacked account.
You can also try to contact the service directly if they have a phone number or support email.
When filing a hacked report form, it can take up to two weeks before you get a response. Meanwhile, it would be best to keep an eye out for changes on your account that has been hacked.
For the worst extortion attempts and hacking breaches,you should consider involving your local law enforcement and file a police report. Read more about that there.
If you want our expert assistance, please order the immediate help package here.
Our Tutorials:
Feel free to check out our tutorials on how to recover certain accounts:
- How To Recover a Hacked Snapchat Account
- How to Recover a Hacked Facebook Account
- How To Recover a Hacked Instagram Account
- How To Recover a Hacked PSN Account
- How To Recover a Hacked Google Account
Get more recovery articles here.
If you’re worried you’ve been hacked:
- Order a comprehensive security audit here.
Featured image by Suttipun from Shutterstock.com
FAQs
What is the first thing you do when you get hacked? ›
Step 1: Change your passwords
This is important because hackers are looking for any point of entry into a larger network, and may gain access through a weak password. On accounts or devices that contain sensitive information, make sure your password is strong, unique—and not easily guessable.
- Get a new username and password. Choose a strong password. ...
- Change your security questions. The hacker may have gotten access to your account by guessing the answers to security questions. ...
- Turn on two-step verification.
Use the code *#21# to see if hackers track your phone with malicious intent. You can also use this code to verify if your calls, messages, or other data are being diverted. It also shows your diverted information's status and the number to which the information is transferred.
Can hackers see what Im doing? ›Can hackers remotely access your computer? Yes, absolutely. In fact, that is one of the prime methods use by hackers to gain access to sensitive data.
How do we know if Iphone is hacked? ›Things like strange screen activity that occurs when you aren't using the phone, extremely slow startup or shutdown times, apps that suddenly shut down or a sudden spike in data usage can be indications of a compromised device.
Does changing your password get rid of hackers? ›Changing your passwords with other online accounts is critical as well. Payment-based accounts such as Amazon, Netflix, credit card companies, and even the local library need a reset. Be sure to update each of your passwords to prevent hackers from compromising these accounts as well.
What is the most common way to get hacked? ›- Phishing emails. Phishing emails are designed to get you to click a malicious link or divulge private information. ...
- Spam emails. ...
- Fake websites. ...
- Through social media pages. ...
- Advert hijacking. ...
- Fake software. ...
- Trojan horse malware.
Make sure you update your software and apps regularly and get rid of old apps you don't use. Use a password, lock code, or encryption. Be skeptical about links and attachments. If you're not sure about the source, don't use the link or open the attachment.
What are hackers looking for? ›The goal might be financial gain, disrupting a competitor or enemy, or theft of valuable data or intellectual property. Their clients might be nation-states, companies interested in corporate espionage, or other criminal groups looking to resell what the hackers steal.
Should I delete my email if it was hacked? ›Should I delete my email after it's hacked? No, don't delete your email, even after it's been hacked. This is because most email providers will recycle old and deleted email addresses. If you're concerned, stop using your email for sending or receiving messages, but don't delete it.
Can you fix a hacked phone? ›
Can you fix a hacked Android phone? Yes. You can fix a hacked Android phone by deleting any suspicious apps, files, or widgets you don't recognize as well as revoking admin access in your settings and regularly clearing your cache. If this doesn't work, you may need to perform a full factory reboot.
Can you Unhack a phone? ›Fix a hacked Android phone with a factory reset
A factory reset is a simple procedure that completely cleans your phone's internal storage. A factory reset deletes not only your photos, videos, messages, and other personal data, but also wipes out malware that lets hackers in.
Phone hacking can range from stealing personal details to listening in on phone conversations. There are several ways someone can hack a phone, including using phishing attacks, tracking software, and unsecured Wi-Fi networks.
What can phone hackers see? ›“Therefore, if someone hacks your phone, they would have access to the following information: email addresses and phone numbers (from your contacts list), pictures, videos, documents, and text messages.” Additionally, he warns, hackers can monitor every keystroke you type on the phone's keyboard.
Can hackers see your screen? ›Hackers can gain access to your computer monitor — a cybersecurity expert shows us how easy it is.
Can hackers see through your camera? ›Plenty of spy and stalkerware exists that could compromise your device, and anyone with the right software and expertise could realistically use your phone's camera to spy on you. On top of that, popular app developers aren't immune to accusations of watching you through your phone's camera.
Can you track down a hacker? ›Most hackers will understand that they can be tracked down by authorities identifying their IP address, so advanced hackers will attempt to make it as difficult as possible for you to find out their identity.
Can hackers see me through my iPhone? ›Webcam hacking is a known privacy problem for laptops and pcs. However, iPhone cameras may also be susceptible to “camfecting” or camera hacking. Camfecting refers to when a hacker remotely controls the camera on your device, states David Cook, a Computer and Security expert, in an article for The Conversation.
Can hackers see through your iPhone? ›While the iPhone is equipped with state-of-the-art security and anti-hacking measures, it's still possible for hackers to take advantage of vulnerabilities in the latest iOS updates or obtain your information through spyware or phishing links.
What causes you to get hacked? ›There are two big reasons why people get hacked. Flaws in software and flaws in human behaviour. While there's not much you can do yourself about coding vulnerabilities, you can change your own behaviour and bad habits.
What prevents you from being hacked? ›
Using secure passwords is the most important way to prevent network intrusions. The more secure your passwords are, the harder it is for a hacker to invade your system. More secure often means longer and more complex.
What can hackers take from you? ›What is Hacking? Hackers illegally access devices or websites to steal peoples' personal information, which they use to commit the crimes like theft. Many people shop, bank, and pay bills online. People also store financial information, like credit card or bank account numbers, on their devices.
What accounts are most likely to be hacked? ›...
Netflix And Spotify Users Are The Most Likely To Be Hacked -- Here's What To Do.
Following an attack, many will turn to hacker's forums to brag about their exploits and this often provides police with the vital clues they need to start identifying the person responsible. Honeypots have also proved an effective way to lure cybercriminals in and find out more about how they operate and who they are.
What is the likelihood of being hacked? ›Characteristic | Likely | Unlikely |
---|---|---|
United States | 37% | 42% |
Sweden | 36% | 48% |
Australia | 33% | 47% |
Canada | 33% | 43% |
If someone steals your phone number, they become you — for all intents and purposes. With your phone number, a hacker can start hijacking your accounts one by one by having a password reset sent to your phone. They can trick automated systems — like your bank — into thinking they're you when you call customer service.
What information do hackers need to steal your identity? ›What they want are account numbers, passwords, Social Security numbers, and other confidential information that they can use to loot your checking account or run up bills on your credit cards. Identity thieves can take out loans or obtain credit cards and even driver's licenses in your name.
Can I check if my email has been hacked? ›How Do I Know if My Email Has Been Hacked? You can't sign into your email account. Hackers will often lock you out of your account as soon as they get access. If your normal email password isn't working, there's a good chance you've been hacked. There are strange messages in your “Sent” folder.
Can I tell if my email has been hacked? ›Many email services offer the ability to check your login activity and show the IP addresses or locations where your account has been accessed from. It may also show the browsers and/or devices used. If you see locations or devices you don't recognize, it's possible someone is tampering with your account.
Can someone hack you just by opening an email? ›Yes. There are some types of emails that can cause damage immediately upon opening, but if you know what to look for, you'll usually be able to avoid them. This typically happens when an email allows scripting, which allows the hacker to insert a virus or malware directly into the email.
Does turning off your phone stop hackers? ›
The short answer is no, your phone cannot be hacked while it's turned off. Phone hacking, even remotely, only works if the device being targeted is on.
Does resetting phone remove hacker? ›Reset your phone
The majority of malware can be removed with a factory reset of your phone. This will, however, wipe any data stored on your device, such as photos, notes, and contacts, so it's important to back up this data before resetting your device. Follow the instructions below to reset your iPhone or Android.
A common scam circulating among both Android and iOS users is the fake virus alert, a pop-up window that tells the user their device is infected.
Should I change my phone number if I have been hacked? ›If you've experienced identity theft, you should probably change your phone number. It's a massive inconvenience, but the pros will outweigh the cons. Let's understand why. Most people upgrade their smartphone every two years — especially if they're on a contract plan.
Can hackers see you through your phone camera? ›Unfortunately in the modern day, it is possible for your phone camera to be hacked (although still extremely unlikely). This is especially true if you're connect to public wi-fi, which is much less stable and secure than using the wifi network in your own home.
How can you tell if your phone is being monitored by someone else? ›- Unfamiliar Applications. ...
- Your Device is 'Rooted' or 'Jailbroken' ...
- The Battery Is Draining Fast. ...
- Your Phone Is Getting Very Hot. ...
- Unusually High Data Usage. ...
- Strange Activity In Standby Mode. ...
- Issues With Shutting Down the Phone. ...
- Odd SMS Messages.
How to Tell if Your Phone Has Been Hacked
How to unhack your phone | Certo
Cell Phone Hacking: Can Your Phone Be Hacked?
- Phishing emails. Phishing emails are designed to get you to click a malicious link or divulge private information. ...
- Spam emails. ...
- Fake websites. ...
- Through social media pages. ...
- Advert hijacking. ...
- Fake software. ...
- Trojan horse malware.
This can be really serious, hackers can use your identity details to open bank accounts, get credit cards, order products in your name, take over existing accounts and take out mobile phone contracts. Hackers could even get genuine documents such as passports and driving licenses in your name once they have stolen your ...
Why am I suddenly getting hacked? ›There are two big reasons why people get hacked. Flaws in software and flaws in human behaviour. While there's not much you can do yourself about coding vulnerabilities, you can change your own behaviour and bad habits. The risks are just as real for the average person – even if the stakes aren't quite so high.
What are 3 ways you can ensure your safety if you get hacked? ›
Make sure you update your software and apps regularly and get rid of old apps you don't use. Use a password, lock code, or encryption. Be skeptical about links and attachments. If you're not sure about the source, don't use the link or open the attachment.
How does a person get hacked? ›One way is to try to obtain information directly from an Internet-connected device by installing spyware, which sends information from your device to others without your knowledge or consent. Hackers may install spyware by tricking you into opening spam email, or into “clicking” on attachments, images, and links in ...
Does resetting your phone get rid of hackers? ›Reset your phone
The majority of malware can be removed with a factory reset of your phone. This will, however, wipe any data stored on your device, such as photos, notes, and contacts, so it's important to back up this data before resetting your device. Follow the instructions below to reset your iPhone or Android.
The goal might be financial gain, disrupting a competitor or enemy, or theft of valuable data or intellectual property. Their clients might be nation-states, companies interested in corporate espionage, or other criminal groups looking to resell what the hackers steal.
Should I delete my email if it was hacked? ›Should I delete my email after it's hacked? No, don't delete your email, even after it's been hacked. This is because most email providers will recycle old and deleted email addresses. If you're concerned, stop using your email for sending or receiving messages, but don't delete it.
› computer-tips › 5-sign... ›