Someone Took Over Your Account Here Is How To Take It Back
Gmail, Microsoft 365, Outlook, iCloud, Facebook, Instagram, X, LinkedIn, TikTok, Coinbase, PayPal, Venmo, bank portals. Whatever the service, the first hour of a compromised account is the most important one. Petronella Technology Group walks you through recovery, preserves evidence, and helps you understand how the attacker got in so it does not happen again.
Can A Forensics Firm Actually Recover A Hacked Account For You?
We do not log into accounts we do not own. Here is what we actually do to help, and why that model protects you better than anything else.
Not directly. Only the platform can return the account to you. Google, Apple, Microsoft, Meta, X, and every bank or exchange own their recovery process. What a forensics firm does is accelerate that recovery, preserve the evidence needed to prove account ownership, contain damage, and rebuild your security posture. Anyone promising direct account recovery through back channels is lying or breaking the law.
You will see a lot of paid ads promising fast account recovery. Many are scams. Some are worse. No reputable firm is going to ask for your password, your backup codes, or remote control of your device in order to recover a hacked account. Anyone who does is either incompetent or fraudulent.
What Petronella Technology Group does instead is coach you through the recovery workflow the platform itself publishes, preserve the evidence trail needed for insurance, police, or civil action, examine any compromised devices for the root cause, and help you lock the attacker out of everything they might still touch. The actual account recovery request goes in from your hands using your identity documents on the vendor portals. That model is slower than a magic wand but it is the only one that actually works and does not expose you to follow on fraud.
If you hold your own seed phrase for a cryptocurrency wallet, we do not ask for that either. Anyone asking for a seed phrase is stealing the wallet.
What Are The First Five Actions After An Account Takeover?
Do not sit on the same laptop or phone the attacker may have touched. Grab a device the attacker has no relationship with, and start here.
Work from a clean device the attacker has never touched. Change passwords from a password manager, enable hardware-based MFA, review active sessions and authorized apps, audit recovery email and phone, and tell your bank, employer, or insurer depending on what was in the account. If money was wired, also see our business email compromise recovery page.
Move to a clean device. Borrow a family member's phone if you need to.
Change the password and log out all active sessions on the compromised account.
Check and remove unknown recovery email addresses, phone numbers, and app passwords.
Turn on hardware key or authenticator app based MFA. Remove SMS MFA if you can.
Screenshot every unfamiliar activity before revoking it. Preserve evidence first.
For Microsoft, the My Sign Ins portal at myaccount.microsoft.com lets you review recent activity. For Google, look at myaccount.google.com/security. For Apple iCloud, Settings, your name, then Password and Security. For Meta services (Facebook, Instagram), Settings, Security and Login, Where You're Logged In. Most platforms now offer a one click Sign Out Everywhere option. Use it.
Which Accounts Should You Check When One Account Gets Hacked?
One compromised inbox is rarely the only problem. The first day is about mapping the blast radius.
Work outward in a clear pattern. Start with email because email resets everything. Then move to financial accounts, cloud storage, password managers, social media, and work accounts. Check every account that used the compromised email for password resets, and rotate all passwords that were reused. See our cyber-security pillar for the full account-hardening checklist.
List every service linked to the compromised email. Password managers, bank logins, investment accounts, crypto exchanges, cloud storage, payroll, shopping accounts. Anything that uses the compromised email for password resets is also compromised until proven otherwise.
Change passwords on every linked account from the clean device. Generate long random passwords stored in a password manager. Do not reuse a password you have ever used anywhere else.
Enable MFA on every account that supports it. Use an authenticator app or a hardware security key. If the only option is SMS, enable it for now, but plan to upgrade as soon as the service adds a stronger factor.
Check financial accounts. Look at bank transactions, investment account orders, credit card activity, PayPal and Venmo, crypto exchange withdrawal activity, and loyalty point balances. Attackers cash out airline miles, hotel points, and gift card balances almost as often as bank accounts.
Pull credit reports and consider a freeze. A credit freeze at Experian, Equifax, and TransUnion is free and stops new credit from being opened in your name. You can thaw it when you need credit.
Preserve logs and screenshots for the record. Forwarding rules, unfamiliar devices, unfamiliar IP addresses, outbound messages sent during the compromise, and notifications of password changes you did not make. This evidence matters for insurance claims, FBI IC3 filings, and any civil action.
What Does A Full Hacked Account Engagement Look Like Beyond The First Day?
Week one is about making sure the attacker cannot walk back in through a side door.
Day one is containment. Days two through seven are investigation, platform recovery follow through, and systematic hardening. We review how the attacker got in, what they accessed, and what they left behind. The engagement closes with documented posture improvements you can maintain on your own.
Forensic check of your devices. If the compromise started with malware on your laptop or phone, simply changing passwords does not fix it. Petronella Technology Group can examine the device for keyloggers, info stealers, clipboard hijackers, malicious browser extensions, and remote access tools. Often we find a browser extension that was the pivot point and did not look suspicious to the user.
Review OAuth and app permissions. Look at every third party app that has access to your Google or Microsoft account and revoke anything you do not actively use. A common persistence technique is to authorize a third party mail reader so that even after the password changes, the attacker still has a session token.
Check out of band communication channels. Attackers often change the phone number on the account while they are in so that the victim cannot get SMS recovery codes. Verify that your phone number, recovery email, and security questions are actually yours.
Report to the platform and to law enforcement. Most major platforms have a compromised account reporting form. File FBI IC3 at ic3.gov. If identity theft is involved, also file with identitytheft.gov, an FTC resource that produces an identity theft report you can send to creditors.
Notify your network. If the compromised account was used to message contacts, send a short note letting people know the account was compromised, what dates are affected, and what messages to ignore. Many follow on attacks use the victim's hijacked trust to attack friends and colleagues.
Swap to a password manager permanently. If you were not already using one, start now. 1Password, Bitwarden, and Dashlane are all reasonable options. Turn on biometric unlock and a strong master password.
Which Platform Recovery Process Should You Start For Each Major Account Type?
Bookmark this section. Most victims lose time hunting for the right recovery form.
For Google use google.com/accounts/recovery, for Apple use iforgot.apple.com, for Microsoft use account.live.com/acsr, for Meta use facebook.com/hacked, for X use help.x.com, for crypto exchanges contact the exchange's security team with photo ID. Petronella Technology Group helps you assemble ownership evidence and escalate each of these, but we do not replace the platform's process.
Google and Gmail. Start at accounts.google.com/signin/recovery. If you have lost access and recovery email and phone have been changed, you can still submit an account recovery form. Answer as many questions as possible from memory, including old passwords and creation date.
Microsoft 365 and Outlook. Start at account.live.com/acsr for personal Microsoft accounts. For work or school accounts, your tenant administrator must initiate recovery.
Apple iCloud and Apple ID. iforgot.apple.com. If you have trusted devices, account recovery can take a day or more for security.
Facebook and Instagram. facebook.com/hacked. Instagram has a similar flow inside the app. Meta now requires identity verification for recovery.
X (formerly Twitter). help.x.com/en/forms/account-access/regain-access.
LinkedIn. LinkedIn compromised account help.
TikTok. In app, Profile, Settings, Report a Problem, Account and Profile, Compromised Account.
Financial accounts. Always call the bank or exchange directly using the phone number on the back of your card or the official app, not a phone number from an email. The fraud team has dedicated workflows for unauthorized access.
Crypto exchanges. For Coinbase, Kraken, Binance US, and other regulated exchanges, open a support case and expect identity verification. If funds have already moved, see our crypto forensics page.
Common Ways Accounts Get Taken Over
Password Reuse
A service you used years ago got breached, the password list ended up on a credential stuffing site, and attackers ran it against Gmail, your bank, and a hundred other services. If you still reuse a password, you are already compromised. You just do not know it yet.
Phishing Page
A link in a text message or email led to a realistic looking login page. Modern phishing kits steal the session cookie right after a legitimate MFA approval, so even MFA does not always stop them. Hardware security keys do.
SIM Swap
Attacker convinces the mobile carrier to port your number to their device, then sweeps SMS recovery codes. See SIM swap recovery for the full playbook.
Info Stealer Malware
A malicious browser extension, cracked software download, or game mod installs malware that exfiltrates saved passwords and session tokens. Device forensics is the only way to know for sure.
Help Desk Social Engineering
Common against high value targets. Attacker calls the service's support line pretending to be you, supplies just enough breached personal information to be believable, and gets a password reset.
Insider Or Former Partner
Someone who once had legitimate access never got deprovisioned. Ex employees, ex spouses, and former MSPs show up in these cases more often than people expect.
Forensic Findings From A Typical Engagement
When you hire Petronella Technology Group to investigate a hacked account, typical forensic deliverables include a timeline of compromise, the likely initial access vector with supporting evidence, a list of indicators of compromise (malicious IP addresses, app consent grants, user agents), a list of data accessed or downloaded during the compromise, a list of outbound messages sent from the account, and a prioritized remediation plan.
For Microsoft 365 business accounts we pull the unified audit log, Azure AD sign in logs, mailbox audit logs, and any MDCA or defender telemetry. For Google Workspace we pull the admin audit log and the user's login and mail delegation history. For personal accounts the data is more limited, but combined with local device forensics we usually have enough to answer the key questions.
If the incident turns into a civil matter (for example, a wire fraud case headed to a bank dispute, or an attempted extortion), we deliver the findings in a format counsel can use as an exhibit. We maintain chain of custody on any imaged devices.
How To Stay Recovered
Getting the account back is not the same as being secure. These steps close the usual follow on risks.
Stop using SMS as your primary second factor. SMS is still better than nothing, and some banks and brokerages still require it. But wherever an authenticator app or hardware security key is available, switch to it. A pair of YubiKeys (one primary, one backup) on your email account solves a class of attacks that authenticator apps alone cannot.
Separate your email accounts by purpose. The email address you use to sign up for newsletters and shopping accounts should not be the same address on your bank account, crypto exchange, or medical portal. This is one of the highest leverage security habits a consumer can adopt. If your shopping address gets breached, your financial life is not in the fallout.
Turn on breach alerts. Services like Have I Been Pwned will email you when your address appears in a new credential dump. Most password managers now have this built in. Be ready to act the same day.
Review linked devices quarterly. Make a thirty minute calendar event every three months to walk through active sessions on Google, Microsoft, Apple, and your social accounts. Kick off any device you no longer own or recognize. This is a low effort habit that catches persistence attempts early.
Make a recovery plan for the people in your household. A short printed list of which accounts you hold, where the backup codes live, and who to call if you are incapacitated prevents the panicked version of this same situation later. For families and small businesses this is genuinely underrated.
Protect the phone number itself. Add a carrier PIN or port out protection on your mobile line. Most major US carriers now offer this free, and it is one of the single best defenses against SIM swap attacks that target your accounts through SMS recovery. See our SIM swap recovery page for the full procedure.
What To Do If The Attacker Used Your Identity
Account compromise is sometimes the first signal that broader identity theft is already underway. These steps matter even if no money has moved yet.
File an FTC identity theft report. Go to identitytheft.gov. The site produces an official identity theft report and a personalized action plan. Banks, creditors, and the major credit bureaus all recognize this document.
Place a fraud alert or security freeze on your credit. A fraud alert is a one year warning that anyone extending credit in your name must verify your identity. A security freeze blocks new credit entirely until you lift it. Both are free at Experian, Equifax, and TransUnion. You can apply either online or by calling the number on each bureau website.
Review your Social Security Administration account. Log in at ssa.gov/myaccount. Attackers sometimes redirect benefits or change contact information to intercept future fraud signals.
Check IRS filings. File an IRS Identity Theft Affidavit, Form 14039, if you suspect a tax related identity theft. You can also request an Identity Protection PIN, a six digit number that must accompany any tax return filed in your name.
Watch for secondary scams. Identity theft victims are aggressively targeted for follow on fraud under the guise of recovery help. Petronella Technology Group will never ask you to send cryptocurrency, gift cards, or wire transfers as part of a recovery. No legitimate firm does.
Common Questions About Hacked Accounts
Will you just log into my account and take it back?
No. Any firm that offers to log into your account is either dangerous or fraudulent. The account provider needs you to recover it using your identity documents. We coach you through the process, preserve evidence, and investigate root cause. That is the correct and safe model.
How long does account recovery take?
Anywhere from minutes to weeks depending on the platform, how much information the attacker changed, and whether you have trusted devices remaining. Apple and Google recoveries can take several days by design, as a security measure. A forensic engagement with Petronella Technology Group runs in parallel with the recovery request so time is not wasted.
What if the attacker used my account to scam others?
Document everything, notify those affected, file with FBI IC3 at ic3.gov, and talk to your attorney about any liability or notification obligations under state law. We help with the factual evidence record.
Do I need to call the police?
If money was lost, if identity theft is involved, or if the matter may escalate to a civil or criminal case, yes. A police report is often required by banks, insurance carriers, and some platforms before they will fully engage. FBI IC3 filings run in parallel with local law enforcement.
Will my cyber insurance cover personal account hacks?
Personal cyber insurance exists and is increasingly common as a homeowner or umbrella policy rider. Business cyber insurance covers compromised executive accounts when they relate to company operations. Check your declarations page and call your agent.
My account belongs to my small business. Can you help our whole tenant?
Yes. Business account compromise is often the entry point for a larger attack. We engage the full tenant, review all privileged accounts, check for OAuth persistence and malicious inbox rules, and help you decide whether wider notification is required.
What about parents helping a teenager who was compromised?
We work with parents regularly on social media, gaming account, and sextortion cases involving minors. If exploitation of a minor is involved, report to the NCMEC CyberTipline at report.cybertip.org and local law enforcement immediately.
Compromised Microsoft 365 Or Google Workspace Tenant
When the compromised account is a business mailbox inside a shared tenant, the response is different. It escalates to a full incident.
A single compromised Microsoft 365 or Google Workspace account is rarely the end of the story. Attackers routinely use a toehold account to send phishing across the organization, set up inbox rules that forward financial keywords to external addresses, authorize OAuth applications that maintain access even after password reset, and move laterally into SharePoint, OneDrive, and Teams. By the time the user realizes something is wrong, the footprint inside the tenant has often been in place for weeks.
If the account is inside a business tenant, contact the global administrator or your managed service provider first. If you are the owner and there is no IT staff, Petronella Technology Group can be engaged directly as an incident response firm. We will request temporary delegated access to the tenant, pull the audit log, identify every account that was touched, kill active session tokens across the tenant, and remove persistence.
We also review conditional access policies, MFA enforcement, OAuth application consent settings, and mailbox forwarding rules, and we flag weak areas that were almost certainly the way in. Most tenants we see have legacy authentication still enabled somewhere, or have exception users who were excluded from MFA years ago and never reenrolled. That is usually where the breach started.
For regulated organizations (medical practices, defense contractors, financial advisors, law firms), a compromised business email account frequently triggers HIPAA, FINRA, state breach notification, or DFARS reporting obligations. Our incident report is structured so breach counsel can make those decisions from the same evidence pack.
One more thing worth knowing. Attackers who compromise a business email account often sit quietly for weeks watching how the organization invoices, which vendors are in the rotation, and how executives speak to staff. Only then do they send the perfectly timed wire fraud email impersonating a vendor or an executive. By the time you discover the initial compromise, the real target may have been a customer or partner further downstream. Widening the investigation beyond the first victim account is usually the right call, and it costs less than a second breach.
Training your staff on the specific tactics we saw in the incident is another high leverage action. Attackers rarely change their playbook across tenants. The inbox rule that hid the vendor fraud emails, the lookalike domain they registered, and the wording of the malicious messages are all useful teaching artifacts. We include redacted versions in the post incident briefing so your team internalizes what the attack actually looked like, not a generic awareness video.
Related Recovery Guides
Take Back Your Account Without Taking A Second Hit
A cautious, evidence preserving recovery is worth more than a fast one. Call Petronella Technology Group at (919) 348-4912 and we will walk through it with you.