Read this first
Most people change their password the moment they suspect a hack and assume the problem is over. The attacker is usually still there — through a saved session token, an OAuth grant, a forwarding rule, or a recovery method they added before you noticed. The password is downstream of the actual fix.
Ten forensic signs your email is compromised
- Login alerts you cannot place. Sign-ins from cities, browsers, or devices you do not recognize. Always check the IP and city, not just the device name (which the attacker can spoof).
- Forwarding rules you did not create. The single most common attacker persistence move on Gmail and Microsoft 365: a rule that quietly forwards every incoming email to an attacker-controlled address. Check Settings → Forwarding and POP/IMAP (Gmail) or Outlook → Mail → Rules.
- Filters that auto-delete or auto-archive. Attackers hide their tracks by filtering security alerts straight to trash. Check filter rules — anything that filters on words like "security", "Apple", "Microsoft", "PayPal", or "verification" is suspicious.
- Sent items you did not send. Especially small "Hi, are you free?" type emails to your contacts — that is the early stage of a friend-asking-for-money scam using your account.
- Unfamiliar OAuth grants. Apps with access to your email. Gmail: Manage your Google Account → Security → "Your connections to third-party apps and services." Microsoft 365: My Account → Security → Apps & services that can access your data. Revoke anything you do not recognize.
- Recovery email or phone changed. Without your knowledge. This is how an attacker locks you out permanently.
- Sessions on devices you no longer own. Especially old phones, work laptops, or shared computers. Active sessions live for months unless explicitly revoked.
- 2FA codes arriving when you did not log in. Indicates the attacker has your password and is trying to bypass 2FA.
- Account creation emails for services you did not sign up for. The attacker is using your inbox to set up accounts elsewhere.
- Password reset emails you did not request. The attacker is trying to pivot from your email into your bank, social, or work accounts.
What the platform "Security" tab will not show you
- Saved session tokens on devices the attacker controls
- Forwarding rules hidden behind nested filters
- OAuth tokens granted to malicious apps with broad scopes
- Mailbox-level data exfiltration via IMAP scrapes
- Recovery method changes made more than 30 days ago
The order of operations to actually clean up
- From a clean device (not the suspected compromised one), change your password.
- Sign out of all sessions everywhere — Gmail "Sign out of all other Gmail web sessions"; Microsoft 365 admin → revoke all sessions.
- Re-enroll in MFA on a new device. Generate new backup codes.
- Audit and remove every forwarding rule and filter you do not recognize.
- Audit and revoke OAuth grants.
- Reset recovery email and recovery phone.
- Audit downstream accounts — bank, social, work, password manager — that share that email for password resets.
- Pull a forensic timeline if there is any chance you'll need to prove what happened (litigation, employment, identity theft case).
When to call an investigator
If any of these apply, do not DIY:
- The compromise affected a business email and litigation, regulatory, or insurance claims may follow
- You suspect the attacker is someone you know (intimate partner, ex, former employee)
- Money or assets were moved as a result of the compromise
- You need a court-admissible record of what was accessed and exfiltrated
We run account compromise investigation and forensic recovery for individuals and businesses — including evidence-of-access timelines that hold up in litigation. If your case overlaps with identity theft, we coordinate the two engagements together.















