HackWatch

Recovery guide

What to do if you clicked a phishing link

This page is built for the first urgent question most readers have after a phishing hit: am I exposed, and what should I do right now before the incident spreads into full account takeover or fraud?

Use it when you opened a suspicious login page, tapped a fake courier or bank message, approved a push prompt or think a malicious site may already have captured your credentials, session or device context.

First response checklist

  1. Stop interacting with the message, tab or fake login page immediately.
  2. Move to a clean device before changing passwords or opening recovery links.
  3. Reset the exposed password and any reused passwords tied to the same mailbox.
  4. Review MFA, recovery email and recovery phone settings for changes you did not make.
  5. Sign out suspicious sessions and remove unknown devices or delegated mailbox access.
  6. Check inbox rules, forwarding and app permissions for persistence.

Why the first 15 minutes matter

Attackers often move fast after a phishing click. They may test the stolen password, add mailbox rules, pivot into password resets or trigger payment fraud before the victim even realizes what happened.

What to check before you feel safe again

A password change is not enough on its own. Review sessions, devices, recovery methods, inbox forwarding, app access and every high-value account that depends on the same mailbox or reused credential.

Use the matching HackWatch workflows next