Active Incident? 24/7 Response →
Witness

For Individuals & Families

Is Your Email Hacked? 10 Signs and How to Verify Forensically

Most people change their password and assume the problem is over. The attacker is usually still there. Here is what to actually check.

All articles·7 min read·April 26, 2026

Read this first

Most people change their password the moment they suspect a hack and assume the problem is over. The attacker is usually still there — through a saved session token, an OAuth grant, a forwarding rule, or a recovery method they added before you noticed. The password is downstream of the actual fix.

Ten forensic signs your email is compromised

  1. Login alerts you cannot place. Sign-ins from cities, browsers, or devices you do not recognize. Always check the IP and city, not just the device name (which the attacker can spoof).
  2. Forwarding rules you did not create. The single most common attacker persistence move on Gmail and Microsoft 365: a rule that quietly forwards every incoming email to an attacker-controlled address. Check Settings → Forwarding and POP/IMAP (Gmail) or Outlook → Mail → Rules.
  3. Filters that auto-delete or auto-archive. Attackers hide their tracks by filtering security alerts straight to trash. Check filter rules — anything that filters on words like "security", "Apple", "Microsoft", "PayPal", or "verification" is suspicious.
  4. Sent items you did not send. Especially small "Hi, are you free?" type emails to your contacts — that is the early stage of a friend-asking-for-money scam using your account.
  5. Unfamiliar OAuth grants. Apps with access to your email. Gmail: Manage your Google Account → Security → "Your connections to third-party apps and services." Microsoft 365: My Account → Security → Apps & services that can access your data. Revoke anything you do not recognize.
  6. Recovery email or phone changed. Without your knowledge. This is how an attacker locks you out permanently.
  7. Sessions on devices you no longer own. Especially old phones, work laptops, or shared computers. Active sessions live for months unless explicitly revoked.
  8. 2FA codes arriving when you did not log in. Indicates the attacker has your password and is trying to bypass 2FA.
  9. Account creation emails for services you did not sign up for. The attacker is using your inbox to set up accounts elsewhere.
  10. Password reset emails you did not request. The attacker is trying to pivot from your email into your bank, social, or work accounts.

What the platform "Security" tab will not show you

The order of operations to actually clean up

  1. From a clean device (not the suspected compromised one), change your password.
  2. Sign out of all sessions everywhere — Gmail "Sign out of all other Gmail web sessions"; Microsoft 365 admin → revoke all sessions.
  3. Re-enroll in MFA on a new device. Generate new backup codes.
  4. Audit and remove every forwarding rule and filter you do not recognize.
  5. Audit and revoke OAuth grants.
  6. Reset recovery email and recovery phone.
  7. Audit downstream accounts — bank, social, work, password manager — that share that email for password resets.
  8. Pull a forensic timeline if there is any chance you'll need to prove what happened (litigation, employment, identity theft case).

When to call an investigator

If any of these apply, do not DIY:

We run account compromise investigation and forensic recovery for individuals and businesses — including evidence-of-access timelines that hold up in litigation. If your case overlaps with identity theft, we coordinate the two engagements together.


Related services

Meet Your Practitioner

Quinnlan Varcoe

Founder & CEO

With operational experience across Fortune 50 security programs and the defense industrial base, Quinnlan founded Witness in 2022 to provide clients with the caliber of expertise typically reserved for the largest enterprises. Her work in threat intelligence and digital forensics has earned the trust of 26,000+ cybersecurity professionals who follow her analysis.

“26,000 professionals follow my work because I say what others won't — and I can back it up technically.”

Fortune 50 BackgroundDefense IndustryThreat IntelligenceDigital PrivacyIncident Response
Quinnlan Varcoe, Founder & CEO

Compromised email: frequent questions

Certified Expertise

GIAC · AWS · Splunk · CompTIA

Trusted by partners across the practice

DAS Health
Exhibit A Cyber
Ally Security
KIRO Group
Black Mirage
Kalles Group
Gridware
CQR
Archstone Security
Cyvergence
Sentinel Cyber
Cloud Underground
Seron Security
Hexen
Koru Risk Management
DAS Health
Exhibit A Cyber
Ally Security
KIRO Group
Black Mirage
Kalles Group
Gridware
CQR
Archstone Security
Cyvergence
Sentinel Cyber
Cloud Underground
Seron Security
Hexen
Koru Risk Management