top of page
it support sheffield

Email Account Security

What to Do When Your Email Has Been Hacked

What does it mean if your email has been hacked?

An email account is considered “hacked” when an unauthorised party gains access and can read, send, delete, or manipulate messages. This often happens after a phishing attack, password reuse, or compromised credentials.


Because email is the gateway to many other systems, a hacked inbox can quickly lead to:

  • Data theft

  • Invoice and payment fraud

  • Internal phishing

  • Wider account compromise across cloud services


Common signs your email has been compromised

You may notice:

  • Emails sent that you didn’t write

  • Password reset notifications you didn’t request

  • Missing or deleted emails

  • New mailbox rules or auto-forwarding

  • Login alerts from unfamiliar locations

  • Contacts reporting suspicious messages from you


Even subtle signs should be taken seriously.


Immediate actions (first 15 minutes)

  1. Change the email password immediately Use a strong, unique password that isn’t used anywhere else.

  2. Revoke active sessions Force sign-out across all devices to remove attacker access.

  3. Enable or confirm MFA Check that MFA is active and review registered methods (apps, phone numbers).

  4. Preserve evidence Save examples of suspicious emails, login alerts, and rule changes.Note the time the issue was first noticed.


Check for silent persistence (critical step)

Attackers often try to maintain access even after a password reset.


Check for:

  • Mailbox rules that auto-delete or forward emails

  • Email forwarding to external addresses

  • OAuth / third-party app access you don’t recognise

  • Recovery email or phone number changes

  • Admin role changes (for business accounts)


This step is frequently missed — and it’s how attackers regain access later.


Assess what else may be affected

A hacked email account is often used to pivot into other systems.


Review:

  • Cloud storage (OneDrive, SharePoint)

  • CRM and finance platforms

  • Password reset activity for other services

  • Internal systems that rely on email for authentication

  • Recent invoices, payment details, or supplier communications


If email was used for password resets elsewhere, those accounts should be treated as compromised too.


What NOT to do

  • Don’t assume it’s fixed after changing the password.

  • Don’t ignore forwarding rules or app permissions.

  • Don’t delay internal communication. Silence increases risk to others.


Containment and remediation

Once immediate access is removed:

  • Reset passwords for any linked or reused credentials

  • Remove unauthorised rules, forwarding, and app access

  • Review MFA and conditional access policies

  • Monitor login activity closely for several days

  • Scan endpoints used by the affected user


Do you need to tell anyone?

You may need to notify:

  • Internal teams if internal phishing was sent

  • Clients or suppliers if they may receive fraudulent messages

  • Compliance/legal teams if sensitive or personal data was accessed

Whether external reporting is required depends on the data involved and confirmed exposure.


Preventing future email compromises

Most email hacks exploit:

  • Weak or reused passwords

  • Missing MFA

  • Poor visibility into account activity


Key preventative measures include:

  • MFA for all email accounts

  • Conditional access policies

  • Regular mailbox and sign-in reviews

  • User awareness around phishing

  • Monitoring for suspicious rules and app access


Signs the attacker may still have access

After remediation, watch for:

  • Rules or forwarding reappearing

  • Repeated MFA prompts

  • Unexpected password resets

  • Login attempts from unfamiliar locations

  • Continued reports of suspicious emails


Any of these should be treated as an active incident.


People Also Ask

How serious is a hacked email account?

Very. Email is often the entry point to other systems and can be used for fraud, data theft, and internal phishing.


Can attackers still access my email after I change the password?

Yes — if mailbox rules, OAuth apps, or recovery details aren’t checked and removed.


Should I tell clients if my email was hacked?

If there’s a risk they may receive fraudulent messages, it’s usually better to warn them early.


Can email hacks lead to ransomware?

Yes. Compromised email accounts are commonly used to distribute malware or gain access to wider systems.


How long should monitoring continue after an email hack?

At least several days to a few weeks, depending on severity and what access the attacker had.

TL;DR

  • Act immediately: assume the attacker still has access until proven otherwise.

  • Change passwords and revoke sessions for the affected email account.

  • Check for silent abuse: mailbox rules, forwarding, and OAuth app access.

  • Warn contacts: hacked email accounts are often used for follow-on scams.

  • Review connected systems: CRM, finance, cloud storage, and password resets.

  • Strengthen controls: MFA, conditional access, and monitoring reduce repeat attacks.

Email Hack Response
steve harper

Written by:

Steve Harper

Commercial Director

Sources

NCSC (UK), Microsoft Security documentation, CISA guidance, ENISA email security guidance, NIST incident handling framework, industry email-security best practices.

Relating Insights

So, why IT Desk?

deceleration.png

Proactive & Reactive Support

In 2024, we achieved an average response time of 13 seconds. Most IT support providers respond anywhere between 30 seconds and 1 minute.

Not only this, 99.5% of our feedback we received was rated 4 out of 4, making this one of our best years yet!

trophy.png

Award Winning

Recognised by Three Best Rated as one of the 'Three Best Rated' IT Service Providers in the Rotherham area. Our feedback definitely reflects this!

Acknowledged by Barnsley & Rotherham Chamber of Commerce over the years for Excellence in Customer Service and Commitment to People Development.

certified.png

Experienced & Certified

Awarded the 'Investors in People' certification, which is an industry standard that shows IT Desk as being actively committed to developing and supporting it's employees.

 

From apprentices to managers to solution engineers, our team of people is truly unique - often described by them as a 'family'!

Reliable & Consistent

Founded in Rotherham in 2006, we started out offering IT support to local businesses. Over the years, we've expanded to serve clients throughout the UK.

With over a decade of experience, we offer exceptional localised IT support, particularly in South Yorkshire, and specialise in assisting SMEs.

Innovative Solutions for Businesses

19+

Years of Experience

A legacy of excellence IT services.

70%

Increase in Efficiency

Streamlined operations and improved workflow.

99.9%

Client Satisfaction Rate

Trusted by businesses across all sectors for superior service.

1200+

Projects Completed

Delivering cutting-edge solutions for a seamless digital future.

Chris W.png
Steve Harper.png
BG---Name---Chloe-Day.png
BG---Name---Morgan-C.png

Experts in the field. Driven by success.

Speak to our team today.

IT Desk are a leader in business growth through consultancy. Contact us today for a no-obligation chat. Your Success, We’re Part of IT.

Book a meeting with our team.

Click below to see our live calendar and book a meeting with our team of experts.

bottom of page