Topic
Account Hacked Help
A general playbook for compromised accounts across platforms. Focus on regaining control, revoking sessions, rotating credentials, and communicating clearly to reduce damage.

Regain Access
1
- Use official recovery flows with verified email/phone. Avoid third‑party tools.
- If MFA apps are unavailable, use backup codes or recovery contacts provided by the platform.

Revoke and Rotate
2
- Log out all sessions, revoke API tokens, and remove unknown connected apps.
- Change passwords and update recovery methods. Enable 2FA immediately.

Hygiene and Communication
3
- Scan devices for malware and remove suspicious extensions or profiles.
- Notify contacts about the incident and ask them to ignore unusual requests.

Evidence and Escalation
4
- Collect timestamps, IP addresses, and platform notices. Provide these to support for investigation.
- If funds or sensitive data were compromised, file formal reports with banks and relevant authorities.

Post‑Recovery Hardening
5
- Review privacy settings, notification previews, and sharing scopes across platforms.
- Enable login alerts and set up backup authentication methods cleanly.

Legal Follow‑up
6
- If identity theft occurred, file official reports and maintain case numbers.
- Consult consumer protection resources for guidance on remediation.

Monitoring
7
- Track account activity for a week after recovery to catch residual access.
- Rotate keys and tokens for integrations and third‑party apps.
Checklist
Work through these steps in order.
- Recover via official flows.
- Revoke sessions/tokens.
- Rotate passwords; enable 2FA.
- Preserve evidence; escalate.