Email Security

    How to Tell If Your Email Has Been Hacked

    Universal warning signs that apply to any email provider โ€” Gmail, Outlook, Yahoo, iCloud, Proton Mail, and beyond.

    ๐Ÿ“… March 2026 ยท ๐Ÿ• 8 min read

    Email is the master key to your digital life โ€” it is connected to your bank, social media, cloud storage, and more. If an attacker gains access, they can reset passwords, intercept sensitive messages, and impersonate you. Knowing the warning signs early can mean the difference between a close call and a full-blown identity crisis.

    โฑ Act fast: If you suspect your email has been hacked, every minute counts. Attackers typically set up persistence mechanisms (forwarding rules, app passwords) within the first hour.

    Warning Signs Your Email Has Been Hacked

    Not every sign is obvious. Some are subtle and easy to miss. Here are the most common red flags, grouped by severity:

    ๐Ÿ”ด Critical โ€” Act Immediately

    • Your password no longer works and you did not change it
    • You received a password reset confirmation you did not request
    • Your recovery phone number or backup email has been changed
    • Two-factor authentication has been disabled without your knowledge
    • You have been locked out of your account entirely

    ๐ŸŸ  Serious โ€” Investigate Now

    • Emails appear in your Sent folder that you did not write
    • Contacts report receiving spam, phishing, or strange messages from you
    • You see login alerts from unfamiliar locations, devices, or IP addresses
    • New email forwarding rules or filters have been created without your knowledge
    • Unfamiliar apps or services have been granted access to your account

    ๐ŸŸก Suspicious โ€” Worth Checking

    • You stop receiving emails you normally get (attacker may have set up filters to delete or redirect them)
    • Read receipts show emails were opened before you saw them
    • Your email signature, display name, or profile photo has changed
    • You see unfamiliar calendar invites or contact additions
    • Password reset emails from other services you did not request (attacker may be trying to pivot)

    How to Check If You Have Been Compromised

    1. Review Login Activity

    Every major email provider keeps a log of recent sign-ins. Check for logins from devices, browsers, or locations you do not recognise. Look for activity at unusual hours.

    • Gmail: myaccount.google.com/security โ†’ Recent security activity
    • Outlook: account.microsoft.com โ†’ Security โ†’ Sign-in activity
    • Yahoo: login.yahoo.com โ†’ Recent activity
    • iCloud: appleid.apple.com โ†’ Devices
    • Proton Mail: Settings โ†’ Security and privacy โ†’ Session management

    2. Check Email Forwarding Rules

    This is one of the most common persistence techniques. Attackers create a forwarding rule so they continue receiving copies of your emails even after you change your password. Check your email settings for any forwarding addresses or filters that redirect, auto-delete, or label messages you did not set up.

    ๐Ÿ” Pro tip: Check both mail forwarding and filter rules. Attackers sometimes use filters to auto-delete security alerts or forward only specific emails (e.g., containing "bank" or "password").

    3. Audit Connected Apps and Devices

    Review which third-party apps, services, and devices have access to your email account. Revoke access for anything you do not recognise. Attackers may install OAuth apps that retain access even after a password change.

    4. Check haveibeenpwned.com

    Visit haveibeenpwned.com and enter your email address. This free service checks whether your email or password appeared in known data breaches. If your credentials were exposed in a breach, attackers may have used them to access your email.

    5. Check Recovery Settings

    Verify that your recovery phone number, backup email address, and security questions have not been changed. Attackers often modify these to maintain access and block your recovery attempts.

    More from Email Security

    No image

    How to Recover Your Email Account After Being Hacked

    Locked out of your email? A generic guide to the main recovery pathways for getting back into a hacked email account, with notes on how options vary by provider.

    No image

    How to Migrate to Proton Mail from Any Email Provider

    Complete guide to migrating your email, contacts, and calendar to Proton Mail using Easy Switch or manual import methods.

    No image

    How to Secure Your Email Account

    A comprehensive, provider-agnostic guide to hardening your email account against hackers โ€” covering 2FA, app passwords, recovery settings, phishing defence, and ongoing monitoring.