Security

    How to Check If Your Email Has Been Hacked (And What to Do About It)

    8 min read

    Your email is the master key to your digital life. If it's compromised, attackers can reset passwords on every other account you own—banking, social media, shopping, everything. Yet most people have no idea their email has been breached until it's too late. This definitive 2025 guide will show you exactly how to check if your email is compromised, what to do if it is, and how to prevent future breaches.

    Warning Signs Your Email Has Been Hacked

    Most email breaches are silent. Attackers don't want you to know they have access. However, certain signs indicate compromise:

    Obvious Red Flags

    • Emails you didn't send: Spam or phishing emails sent from your account to your contacts
    • Password reset emails you didn't request: For services you actually use
    • Missing emails: Important messages deleted or moved to trash without your action
    • Unknown login alerts: Notifications of account access from unfamiliar locations
    • Changed account settings: Forwarding rules, signature changes, or filter modifications you didn't make
    • Locked out of your account: Your password no longer works, or you're told your account doesn't exist

    Subtle Warning Signs

    • Friends reporting strange emails: From you, even if you don't see them in your sent folder
    • Unusual account activity: Login attempts from foreign countries or strange IP addresses
    • Changes to recovery options: Phone number or recovery email modified without your knowledge
    • New devices linked: Unfamiliar devices showing in your account's connected devices list
    • Bounce-back messages: For emails you never sent

    The Silent Breach Problem:

    Sophisticated attackers won't trigger obvious alerts. They'll read your emails silently, harvest information, and use it for targeted attacks or sell access on the dark web. You might be compromised for months without knowing. This is why proactive checking is essential.

    Method 1: Check Against Breach Databases (Free & Essential)

    Have I Been Pwned: Your First Stop

    Have I Been Pwned is the most comprehensive breach database, maintained by security researcher Troy Hunt. It contains over 12 billion compromised accounts from hundreds of major breaches.

    How to use it:

    1. Visit haveibeenpwned.com

      The site is completely safe and doesn't store or track your queries.

    2. Enter your email address

      Type your email into the search box at the top of the page.

    3. Review the results

      If your email appears in breaches, you'll see a list of compromised services and what data was exposed.

    4. Check all your email addresses

      Don't forget old emails, work emails, or aliases you've used over the years.

    Understanding Your Results

    When your email appears in a breach, Have I Been Pwned shows:

    • The breached service: Which website or service was compromised
    • The breach date: When the breach occurred
    • Compromised data types: What specific information was exposed (passwords, names, addresses, etc.)
    • Breach sensitivity: Whether the breach data is sensitive or publicly searchable

    Don't panic if you find results. Appearing in a breach doesn't automatically mean your account is currently hacked—it means your data was exposed at some point. The critical question is what you do next.

    Set Up Monitoring

    Have I Been Pwned offers a free notification service. Enter your email, and you'll be alerted immediately when it appears in future breaches. This is essential for staying ahead of threats.

    Method 2: Review Your Account Activity

    Gmail Security Checkup

    If you use Gmail, Google provides comprehensive security tools:

    1. Visit myaccount.google.com/security

      This is Google's centralized security dashboard.

    2. Review "Recent security activity"

      Look for unfamiliar devices, locations, or activities. Pay special attention to password changes or recovery information updates.

    3. Check "Your devices"

      Verify you recognize all devices with account access. Remove any you don't recognize.

    4. Review "Third-party apps with account access"

      Remove old apps or services you no longer use. Compromised third-party apps are a common attack vector.

    5. Enable Security Checkup alerts

      Google will notify you of suspicious activity automatically.

    Outlook/Microsoft Account Security

    For Outlook or Microsoft accounts:

    1. Visit account.microsoft.com/security

      Microsoft's security dashboard provides similar functionality to Google.

    2. Review "Recent activity"

      Check for unusual sign-ins, password changes, or security info updates.

    3. Check "Sign-in activity"

      Look for unexpected locations or devices accessing your account.

    4. Review connected apps and services

      Remove anything you don't recognize or no longer use.

    Other Email Providers

    Most email providers offer similar security features. Look for sections labeled "Security," "Activity," "Devices," or "Recent Activity" in your account settings. Common providers include:

    • Yahoo Mail: Check account.yahoo.com/account/security
    • ProtonMail: Review account settings and security logs
    • Apple iCloud: Visit appleid.apple.com and check devices and security

    Method 3: Check for Email Forwarding Rules

    A sophisticated attack technique involves creating hidden email forwarding rules. Attackers set your emails to automatically forward to their address, allowing them to monitor everything you receive without triggering obvious alerts.

    How to Check Gmail Forwarding

    1. Open Gmail settings (gear icon → "See all settings")
    2. Click the "Forwarding and POP/IMAP" tab
    3. Check if any forwarding addresses are listed
    4. If you see unfamiliar addresses, delete them immediately and change your password

    How to Check Outlook Forwarding

    1. Open Outlook settings (gear icon → "View all Outlook settings")
    2. Navigate to "Mail" → "Forwarding"
    3. Verify forwarding is disabled or only forwarding to addresses you recognize
    4. Check "Inbox rules" under "Mail" → "Rules" for automated forwarding

    Method 4: Password Reset Requests as Detection

    This method is counterintuitive but effective for detecting if attackers have changed your password or recovery information:

    1. Initiate a password reset on your own account

      Go through the "forgot password" process for your email account.

    2. Check where the reset link is sent

      If it goes to an email or phone number you don't recognize, your recovery information has been changed by an attacker.

    3. Verify security questions still match

      If you can't answer your own security questions, they may have been changed.

    If you discover modified recovery information, act immediately. Contact the email provider's support team—you may need to verify your identity to regain full control.

    What to Do If Your Email Is Compromised

    Immediate Actions (First Hour)

    Critical First Steps:

    1. Change your password immediately: Use a completely unique, strong password. Generate one with our AI password generator.
    2. Remove unauthorized devices: Revoke access to any devices or locations you don't recognize.
    3. Delete forwarding rules: Remove any email forwarding, filters, or rules you didn't create.
    4. Update recovery information: Ensure your backup email and phone number are correct and under your control.
    5. Enable two-factor authentication: If not already enabled, do this immediately. If already enabled, check that it wasn't disabled.

    Secondary Actions (First 24 Hours)

    1. Change passwords on all critical accounts

      Prioritize banking, shopping, social media, and work accounts. Assume attackers used your email to reset passwords elsewhere.

    2. Notify your contacts

      If spam was sent from your account, alert your contacts so they don't fall for phishing attempts.

    3. Review sent emails

      Check if anything was sent without your knowledge. This reveals what the attacker did with access.

    4. Check connected services

      Review accounts that use this email for login or recovery and secure them.

    5. Monitor financial accounts

      Watch for unauthorized transactions or account changes.

    Long-Term Recovery (First Week)

    1. Implement a password manager

      Ensure every account has a unique password. Read our password manager guide.

    2. Enable 2FA everywhere

      Add two-factor authentication to every service that supports it. See our 2FA implementation guide.

    3. Review and limit third-party app access

      Only grant email access to apps you actively use and trust.

    4. Consider email aliases

      Services like SimpleLogin or Apple's Hide My Email let you use different email addresses for each service, limiting breach impact.

    Prevention: Stop Email Hacks Before They Happen

    Essential Prevention Measures:

    • Use a unique, strong password: 16+ characters, generated randomly. Never reuse passwords.
    • Enable two-factor authentication: Preferably with an authenticator app, not SMS.
    • Keep recovery information current: Ensure backup email and phone number are accessible and secure.
    • Be suspicious of phishing: Email providers will never ask for your password via email.
    • Use official apps only: Don't enter credentials into third-party apps or websites.
    • Monitor breach databases: Set up alerts on Have I Been Pwned.
    • Review account activity regularly: Check security logs monthly for unusual access.
    • Keep software updated: Install security updates promptly on all devices.

    Advanced Protection: Security Keys

    For maximum security, consider hardware security keys (like YubiKey or Google Titan). These physical devices provide phishing-resistant two-factor authentication. Even if attackers steal your password, they can't access your account without physical possession of the key.

    Special Considerations for Different Email Types

    Personal Email

    Your personal email likely links to shopping, social media, and entertainment accounts. A breach here can lead to financial fraud and identity theft. Priority actions:

    • Enable 2FA immediately
    • Use a unique password generated by a password manager
    • Monitor connected financial accounts closely
    • Set up breach alerts

    Work Email

    Compromised work email can expose sensitive company data and customer information. Additional considerations:

    • Report to IT security immediately if compromised
    • Follow company security policies strictly
    • Never use work email for personal services
    • Be especially vigilant about phishing attempts

    Recovery Email

    If your backup/recovery email is compromised, attackers can reset passwords on your primary accounts. Secure it with the same rigor as your primary email—or better. Consider using a completely separate email provider for recovery emails.

    Understanding the Attack Landscape

    How Emails Get Compromised

    Understanding attack methods helps you protect yourself:

    • Data breaches: Third-party services you used got hacked, exposing your email and password
    • Phishing: You entered credentials into a fake login page that looked legitimate
    • Malware: Keyloggers or spyware on your device captured your password
    • Password reuse: You used the same password on a compromised site and your email
    • Weak passwords: Your password was guessed or cracked through brute force
    • Social engineering: Attackers tricked you or customer support into revealing information

    Learn more about these attack vectors in our articles on social engineering and credential stuffing.

    The Bottom Line

    Your email is the master key to your digital identity. Checking if it's been compromised should be a regular habit, not a one-time action. Use Have I Been Pwned quarterly, review account activity monthly, and stay alert to warning signs.

    If you discover your email was breached, act immediately following the steps outlined above. The faster you respond, the less damage attackers can do.

    Most importantly, implement prevention measures today. A strong unique password, two-factor authentication, and regular monitoring make your email exponentially harder to compromise. The few minutes invested in security today could save you months of identity theft recovery tomorrow.

    Take action now: Check your email at haveibeenpwned.com and generate a secure password using our AI password generator. Don't wait until it's too late.

    Related Security Articles

    Explore All Security Topics

    Browse our complete collection of cybersecurity insights and password protection guides.

    Try Our Password Generator

    Generate secure passwords with our AI-powered tool and advanced security features.