Use a clean computer or phone to reset credentials for any account even potentially exposed. Begin with primary email, because it unlocks password resets elsewhere. Create unique, long passphrases through a reputable password manager to prevent reuse across services. If work accounts might be involved, follow company policies and involve IT promptly. Avoid using the compromised browser session for resets. Confirm each change by verifying recent sign‑ins and checking for unfamiliar forwarding rules or filters.
Attackers often rely on stolen session cookies or malicious app access, not just passwords. In Google, Microsoft, Apple, and similar accounts, sign out of all sessions, review devices, and remove anything unrecognized. Audit OAuth permissions and deauthorize shady apps that gained access. Regenerate API keys where applicable. In password managers, invalidate emergency access or shared vault links you do not recognize. These revocations sever behind‑the‑scenes footholds that persist even after password changes are completed.
Strengthen defenses as you recover. Enable authenticator‑based or hardware security key multifactor, favoring app codes or keys over SMS. Update recovery email, phone, and security questions to values only you control. Download and safely store backup codes for travel or emergencies. Remove outdated devices and disable old phone numbers. Where available, enable advanced protections, like passkeys or phishing‑resistant security keys. These steps reduce the chance a similar click compromises you again through account recovery loopholes.