Our Blog

Latest news and updates from HostingXtreme

First-Aid tips to recover a compromised email address.

Posted by at HostingXtreme on Comments Off on First-Aid tips to recover a compromised email address.

  1. Check password
    First-Aid tips to recover a compromised email address.

    First-Aid tips to recover a compromised email address.

    Check whether your are entering a correct password. Check if the caps lock key is not On. See if your keyboard is working properly. See whether every key is working properly and not typing anything faulty.

  2. Check for viruses and malware
    A virus or a malware keylogger can record your password or any text once you enter.If the scan detects any suspicious programs or applications, remove them immediately. Use updated & trusted Anti-Virus.
  3. Make sure your operating system is up to date
    Operating systems release patches to repair security vulnerabilities. Whether you use Windows or Mac OS, we recommend protecting your computer by enabling your automatic update setting, and updating when you get a notification.
  4. Make sure to perform regular software updates
    Some software updates aren’t included in your operating system updates, but they are just as important. Software such as Adobe Flash, Adobe PDF Reader, and Java release regular updates that may include repairs for security vulnerabilities.
  5. Make sure your browser is up to date
    An outdated browser is easier to hack. Virus and keylogger do connect with it easily. So update your browser for the repairs of security vulnerabilities.
  6. Check your browser for plug-ins, extensions, and third-party programs/tools 
    Plug-ins and extensions are downloadable computer programs that work with your browser to perform specific tasks. For example, you may have downloaded a plug-in or extension that checks your Email inbox for new messages. If those services are compromised, so is your Email password.
  7. Filters
    Check that no filters are sending your mail to Trash, Spam, or forwarding them to an unknown account.
  8. Check Reply-to Address
    Modern attackers, change the reply-to address of your email account. This means that when you send an email, and the recipient clicks the reply button, the email address that will appear in the To: field, will be the dummy address of the attacker.
    This is done so that all replies to your mails will go to the hacker. By doing this, they can keep a track of what mails you are sending out, even though you have changed your password.
  9. Mail Forwarding
    Check that your mail forwarding feature (if used) is not pointing to any suspicious address.
  10. Check Email Signature
    Check your email signature and make sure it doesn’t contain any spam links. Many a times, advertising links are placed in it.
  11. Auto Responder
    Check your auto-responder settings. A malicious auto responder set by the hacker may ask people to start sending email on a fake email address.
  12. Change Password
    Change password of all the accounts associated with the email address, including net banking passwords, hosting accounts etc. Set a strong and secure password with a mix of numbers and alphabets.
  13. Check your Sent Mails
    Check your sent mail folder to see whether your account was misused.
  14. Check your Inbox
    Check your recent incoming mails to see if you have clicked on a phishing link by mistake. You might have clicked on a suspicious link which asked you to login with your email address and password and you might have fallen for that.
  15. Send a clarification
    If you find any suspicious mail sent out then send a clarification to all those whom it may have gone out to. Tell them the situation and to keep their eyes open for any suspicious mails or activity in their account, as they may also have become a victim through the mails sent from your email address.


Note: It is important that you follow the above steps in this order only.

Eg: If you change your password first, it is very likely that the new password will be obtained by the hacker, through any virus or spyware on your machine, making your efforts wasted.

Comments are closed.