Got Hacked? Here's What to Do in the First 24 Hours — and What to Install After
Account compromised or device hacked? Follow this step-by-step 24-hour action plan to stop the damage, secure your accounts, and protect yourself going forward.
Chief Editor
Getting hacked feels like a crisis, but a calm and methodical response in the first 24 hours contains most of the damage. Panic is the attacker’s best friend.
What brought you here today?
Got Hacked? Here's What to Do in the First 24 Hours — and What to Install After
Finding out your account has been compromised is a gut-punch moment. The inbox you can't log into. The unfamiliar login notification from a country you've never visited. The bank alert about a purchase you didn't make. Whatever form it took, the feeling is the same: violated, panicked, and unsure where to start.
Here's the thing — acting fast and acting in the right order matters enormously. The first 24 hours determine how much damage gets contained versus how far it spreads. This guide lays out a clear, sequential action plan, explains why each step comes in that order, and ends with a short list of tools worth installing once the immediate crisis is resolved.
Who This Is For
Someone who just got an unauthorized access notification. You received an email saying someone logged into your account from an unrecognized device or location. The login may already have happened. You need to act now.
Someone whose email or social account was taken over. You can't log in, recovery options have been changed, and you're trying to regain access while also containing the damage to other accounts.
Someone whose device showed unusual behavior. Your computer is running strange processes, your browser is doing things you didn't ask it to do, or your security software flagged something significant.
What to Look For in Recovery Tools
Immediate Threat Removal
Before installing security software you don't already have, you need to know whether the device you're working from is clean. Running a scan with a reputable on-demand malware scanner is the starting point. Look for tools that can run without requiring a full installation if your system is potentially compromised.
Credential Management
The majority of account compromises happen because credentials stolen from one site are tried against others. A password manager that can help you rapidly reset and replace passwords across multiple accounts is essential in the recovery process.
Ongoing Monitoring
After the immediate crisis, breach monitoring tools that watch for your email addresses and credentials appearing in new data dumps will alert you to future exposures before they become crises.
Step-by-Step: The First 24 Hours
Hour 0–1: Understand the Scope
Before changing anything, take 10 minutes to assess what actually happened. Read the notification carefully. Did someone log in to one account? Are there outgoing emails you didn't send? Are there financial transactions you don't recognize?
Write down — physically, on paper — the accounts and platforms involved. You'll need this list to work through systematically. Panicking and jumping between platforms without a list guarantees you'll miss something.
Do not use the compromised device for recovery steps if you suspect it has malware. Use a different device — a phone on mobile data, a friend's computer, or a work machine — for password changes and account recovery when possible.
Hour 1–2: Secure Your Email Account First
Your email account is the master key to virtually everything else. Password reset emails for every other service go there. If an attacker controls your email, they control account recovery for your bank, your streaming services, your social media — everything.
Steps:
- Change your email password immediately. Make it long, unique, and not used anywhere else.
- Enable two-factor authentication if it isn't already on. Use an authenticator app, not SMS, if possible — SMS-based 2FA can be circumvented through SIM swapping.
- Check your email filters and forwarding rules. Attackers commonly add forwarding rules to quietly mirror all incoming email to an address they control. Delete any rules you didn't create.
- Review connected apps and revoke access to anything unfamiliar.
Hour 2–4: Change Passwords on High-Value Accounts
With your email secured, work through your list in order of impact:
- Financial accounts: Online banking, investment platforms, payment services. Change passwords, check for unrecognized transactions, and notify your bank if anything looks suspicious.
- Work accounts: If you use a work email or access company systems from a personal device, notify your IT department immediately. Many organizations have incident response procedures that need to be triggered.
- Other email accounts: If you have secondary email addresses, secure those too.
- Social media: Revoke active sessions on all devices you don't recognize, change passwords, and review recently published posts or messages for anything you didn't write.
For each account, use a different, strong password. If the sheer volume of changes feels unmanageable, this is the moment to start using a password manager — let it generate and store the new credentials as you go.
Hour 4–6: Run a Malware Scan
Once your critical accounts are secured, address your device. Download a reputable on-demand malware scanner and run a full system scan. If the scan finds something, follow the tool's remediation instructions carefully. Most threats can be quarantined and removed automatically.
If a scan finds a rootkit, advanced persistent malware, or the tool cannot complete remediation, the safest path is a full operating system reinstall. This is painful but definitive — a compromised system with residual malware is not truly clean.
Hour 6–12: Audit What Was Exposed
Go back through the compromised account's activity logs. Most platforms maintain logs of recent logins, messages sent, and actions taken. Look for:
- Emails sent from your account you didn't write
- Files accessed or downloaded
- Payment method changes or purchases
- Profile information changes (recovery email, phone number, security questions)
If personal information was exposed — your name, address, Social Security or government ID number, financial data — you may need to take additional steps including credit monitoring, fraud alerts, or filing reports with relevant authorities.
Hour 12–24: Notify Affected Parties and Document
If attackers sent messages from your accounts to your contacts, notify those people directly so they don't click malicious links. Be straightforward — brief honest notification is better than letting a phishing message spread under your name.
Document everything: what happened, when you noticed it, what accounts were affected, what actions you took, and what you found in activity logs. This documentation matters if you need to dispute fraudulent transactions, report identity theft, or involve law enforcement.
What to Install After the Crisis
Once your immediate situation is stabilized, these tools address the root causes and prevent recurrence:
ShieldCore Antivirus Pro — Ongoing malware protection
Install a real-time antivirus suite that monitors your system continuously, not just when you remember to scan. Choose one with ransomware behavior detection so future threats don't get a foothold before the scan catches them.
VaultKey Premium — Password management
The single most impactful habit change after a compromise is unique passwords for every account. A premium password manager makes this practical rather than theoretical. Start by importing existing passwords, then replace the weakest ones first using the built-in breach alert feature.
CipherLock Essential — Breach monitoring
Connect your email addresses to a breach monitoring service. You'll receive alerts when your credentials appear in newly discovered data dumps, giving you time to change affected passwords before attackers do anything with them.
PrivacyRoute VPN — Network protection
If your compromise happened or could have happened through a public network, a VPN on all your devices prevents passive interception of your traffic on untrusted connections. It's particularly valuable if you travel or work from cafes and co-working spaces.
FAQ
How did this happen if I didn't click anything suspicious? Many compromises don't require any action on your part. If a service you use suffered a data breach, your email and hashed password may be sold in bulk. Attackers then run automated attacks, trying those credentials against major platforms. You may have done nothing wrong and still been caught in someone else's breach. This is exactly why unique passwords for every site matter so much.
Should I contact the police? For account takeovers, the practical value is limited unless financial theft occurred. If money was taken from a financial account, contact your bank immediately and file a report with local law enforcement — this documentation is often required for fraud claims. If your identity was used to open new credit accounts or for other large-scale fraud, a report with your national fraud reporting agency creates a paper trail.
How long does recovery typically take? The immediate crisis — securing accounts and removing malware — can mostly be resolved in 24 to 48 hours for most people. The longer tail involves monitoring for fraud, responding to any downstream effects (emails your contacts received, any financial transactions in dispute), and building better habits going forward. Treat the first week as active recovery and the first month as settling back to normal.
Do I need to replace my device? Only in extreme cases — typically when scanning tools find a rootkit or other deeply embedded malware that cannot be removed without a full OS reinstall. For most compromises originating from account credential theft rather than device malware, a thorough scan and clean is sufficient.
Will changing my passwords be enough? Password changes are necessary but not always sufficient on their own. Equally important are enabling two-factor authentication on all critical accounts, removing unauthorized connected apps, checking email forwarding rules, and — if your device may have been involved — running a malware scan. Doing all of these together closes the common re-entry points attackers use.
Frequently Asked Questions
Several warning signs indicate a compromised email account. You may notice login notifications from devices or locations you do not recognize, emails in your sent folder that you did not write, password reset requests you did not initiate, or contacts telling you they received suspicious messages from your address. Check your account's recent activity or login history page, which most major email providers offer. Also inspect your forwarding rules and connected applications, as attackers frequently add silent forwarding to an external address so they continue receiving copies of your email even after you change your password. If any of these signs are present, treat the account as compromised and begin the recovery steps immediately.
Security experts and law enforcement agencies consistently advise against paying ransomware demands. Payment does not guarantee that the attacker will provide a working decryption key, and it directly funds criminal operations, encouraging further attacks. Some ransomware variants have known decryption tools developed by security researchers and made available for free. Before considering any payment, search for your specific ransomware strain on reputable security databases to check whether a free solution exists. The best protection against ransomware is prevention through regular offline backups. If your important files are backed up to an external drive or cloud service that the ransomware cannot reach, you can restore without engaging the attacker at all.
Prevention starts with three foundational habits. First, use a password manager to generate and store a unique, strong password for every account, eliminating the credential reuse that enables most account compromises. Second, enable two-factor authentication on every account that supports it, prioritizing email, financial, and work accounts. Third, keep your operating system, browser, and applications updated because security patches close the vulnerabilities that attackers exploit. Beyond those fundamentals, be cautious with email attachments and links even from known contacts, use a reputable antivirus suite with real-time protection, and avoid conducting sensitive transactions on public Wi-Fi without a VPN.
Changing your password alone does not always revoke active sessions. Many platforms maintain existing login sessions even after a password change, meaning an attacker who is already logged in may remain connected. After changing your password, explicitly log out of all active sessions using the security settings page available on most major platforms. Additionally, check for connected third-party applications and revoke access to any you do not recognize. If the attacker added a recovery email address or phone number to your account, remove those as well. Without completing these additional steps, a password change may not fully close the door on an active compromise.
Final Verdict
There is no comfortable version of being hacked, but a calm and methodical response in the first 24 hours can contain most of the damage. Prioritize your email account above everything else, work down from highest-value accounts to lower ones, and don't assume the threat is isolated to the account where you first noticed it.
Once the immediate situation is resolved, convert the experience into better long-term habits: VaultKey Premium for unique passwords at scale, ShieldCore Antivirus Pro for ongoing device protection, CipherLock Essential for proactive breach alerts, and PrivacyRoute VPN for network-level privacy on untrusted connections. The goal isn't to live in fear — it's to make the boring, habitual use of good tools so routine that a future attempt finds nothing worth taking.
Learn how we evaluate products in this category: Our Security Testing Methodology
About the author
Chief Editor
The Nanozon Insights team researches, tests, and reviews products across every category to help you make smarter buying decisions.



