Skip to content
Logo-HubKub
  • AI (43)
  • Comparisons (17)
  • Deep Dive (15)
  • Dev / IT Ops (30)
  • Downloads (62)
    • Business (5)
    • Developer (20)
    • Drivers (5)
    • Education (5)
    • Games (5)
    • Internet (1)
    • Mobile (5)
    • Multimedia (3)
    • Personal (61)
    • Utilities (5)
  • Gadgets (6)
  • General (6)
  • How-to (43)
  • Reviews (19)
  • Security (24)
  • Tech News (46)
  • AWS MCP Server access checklist — server racks and cloud infrastructure for AI agent workflows | Photo by Brett Sayles on Pexels
    AWS MCP Server GA: Agent Access Checklist07/05/2026
  • Official Recuva product screenshot from CCleaner showing the Windows recovery interface
    Recuva Review 2026: Free File Recovery, Windows Limits07/05/2026
  • Official Kdenlive interface screenshot from the Kdenlive website
    Kdenlive Review 2026: Free Video Editor, Safe Download07/05/2026
  • AWS WorkSpaces AI agent desktop checklist — cloud desktop workflow for safe agent pilots
    AWS WorkSpaces AI Agent Desktops: Safe Pilot Checklist06/05/2026
  • GnuCash official logo card for the Hubkub software review
    GnuCash Review 2026: Free Accounting App, Safe Download06/05/2026
  • Home
  • Tech News
  • AI
  • How-to
  • Reviews
  • Security
  • Comparisons
  • Deep Dive
  • Dev / IT Ops
  • Downloads
    • Utilities
    • Multimedia
    • Internet
    • Developer
    • Business
    • Education
    • Games
    • Mobile
    • Personal
    • Drivers
Main Menu
  • Home
  • Tech News
  • AI
  • How-to
  • Reviews
  • Security
  • Comparisons
  • Deep Dive
  • Dev / IT Ops
  • Downloads
    • Utilities
    • Multimedia
    • Internet
    • Developer
    • Business
    • Education
    • Games
    • Mobile
    • Personal
    • Drivers
Home / How-to / How to Check If Your Email Was Hacked (And Fix It)
  • How-to

How to Check If Your Email Was Hacked (And Fix It)

By TouchEVA
No Comments
Published: 07/04/2026 • Updated: 27/04/2026 07:46
How to Check If Your Email Was Hacked (And Fix It) — editorial featured image showing the topic context, key signals, and reader intent
⏱ 7 min read1,451 words
Table of Contents
  1. Step 1: Check HaveIBeenPwned.com
  2. Step 2: Check Your Email Login History for Suspicious Activity
  3. Step 3: Check for Hidden Email Forwarding Rules
  4. Step 4: Full Recovery — Secure Your Account
  5. Common Questions — How to Check If Your Email Was Hacked

Key Takeaways

  • Start at HaveIBeenPwned.com — one search tells you which past breaches exposed your email and what data leaked.
  • Check your email’s recent login history for unfamiliar devices, countries, or IP addresses right now.
  • Inspect hidden forwarding rules and filters — attackers often silently forward emails to their own address and leave no other trace.
  • Full recovery: change password, revoke app passwords, enable 2FA with an authenticator app, and sign out all sessions.
  • Rotate passwords on any account tied to that email — attackers use leaked credentials to pivot into banking, social, and cloud accounts.

Billions of email credentials have been exposed in data breaches over the past decade, and attackers routinely test stolen credentials automatically. Signs that your email was hacked range from obvious (contacts receiving spam from you, locked out of your account) to invisible (attacker silently forwarding your emails elsewhere). This guide walks through exactly how to check if your email was hacked—using free tools—and the complete step-by-step recovery process if it has been.

Step 1: Check HaveIBeenPwned.com

The fastest way to check if your email address appeared in a data breach is haveibeenpwned.com—a free service maintained by security researcher Troy Hunt that aggregates credentials from thousands of publicly leaked breach databases.

  1. Go to haveibeenpwned.com (no account required)
  2. Enter your email address in the search box
  3. Press Enter or click “pwned?”

Green result (“Good news”): Your email was not found in known breach databases. This does not guarantee you were never compromised—unindexed or private breaches exist—but it means your credentials have not been publicly exposed in known dumps.

Red result (“Oh no — pwned!”): Your email appeared in one or more breaches. The result shows the breach name, date, and what data was exposed (passwords, phone numbers, addresses). Important: appearing in a breach does not automatically mean your current account is compromised—it means your credentials from that breach were exposed. If you changed your password after the breach date, you may be fine. If you reused that password elsewhere, you are not.

Also check the Passwords tab at haveibeenpwned.com/passwords—enter a password to see if it appears in any breach dump. The service uses k-anonymity, so your full password is never transmitted.

Step 2: Check Your Email Login History for Suspicious Activity

For Gmail:

  • Go to myaccount.google.com/security → scroll to “Recent security activity” to see logins, password changes, and 2FA events with device/location/time.
  • In Gmail itself: scroll to the bottom of any inbox page and click “Details” (bottom-right corner) → shows last 10 active sessions with IP address, device type, location, and time. Use “Sign out all other sessions” if you see unfamiliar logins.
  • Full device list: myaccount.google.com/device-activity

For Outlook / Microsoft:

  • Go to account.microsoft.com/security → click “Review activity” → “See my activity”
  • Shows successful and failed sign-in attempts with device, location, browser, and date/time
  • You can flag suspicious entries directly from this page
  • Active sessions and devices: account.microsoft.com/devices

Look for logins from unfamiliar countries or cities, unusual times (3am when you were asleep), or device types you don’t own.

Step 3: Check for Hidden Email Forwarding Rules

This is the step most people miss. When attackers gain access to an email account, they often set up silent forwarding rules that copy every incoming email to an address they control—so they can continue reading your emails even after you change your password. Always check this if you suspect a breach.

In Gmail: Click the gear icon → “See all settings” → check both the Filters and Blocked Addresses tab (delete any rules you didn’t create) and the Forwarding and POP/IMAP tab (remove any unauthorized forwarding addresses). Also check Accounts and Import → “Send mail as” for any aliases you didn’t add. Note: mobile apps do not show forwarding rules—you must check via a browser.

In Outlook (web): Go to Settings → Mail → Rules (delete unknown rules) and Settings → Mail → Forwarding (disable any unauthorized forwarding).

Step 4: Full Recovery — Secure Your Account

If you found evidence of a breach, complete all of these steps in order:

  1. Change your password immediately — Use a unique password of 16+ characters. Store it in a password manager (Bitwarden free, 1Password paid). Never reuse passwords across accounts.
  2. Enable two-factor authentication (2FA) — Gmail: myaccount.google.com/two-step-verification; Outlook: account.microsoft.com/security. Use an authenticator app (Google Authenticator, Authy) rather than SMS—SMS codes can be intercepted via SIM-swap attacks.
  3. Verify recovery info is still yours — Check that the recovery email address and phone number haven’t been changed by the attacker. Attackers change these to lock you out permanently.
  4. Revoke app access — Gmail: myaccount.google.com/permissions; Microsoft: account.microsoft.com/privacy/app-access. Remove any third-party apps you don’t recognize.
  5. Review and delete forwarding rules — As covered in Step 3 above.
  6. Check connected accounts — Any service where you used “Sign in with Google/Microsoft” may also be at risk. Review and re-secure the most sensitive ones (banking, financial services).

For more security tools and guides, see our Security section including our best free antivirus guide.

Common Questions — How to Check If Your Email Was Hacked

Q: How do I know if someone is reading my emails without my knowledge?

A: The most reliable indicator is a hidden forwarding rule. In Gmail, go to Settings → Forwarding and POP/IMAP and check for any unauthorized forwarding addresses. Also check your Filters tab for rules that mark emails as read or delete them automatically—attackers use these to hide their activity. Checking your login history at myaccount.google.com/security also reveals unfamiliar device or location access.

Q: My email shows up on HaveIBeenPwned — what should I do?

A: Check which breach it appeared in and what data was exposed. If a password was exposed and you still use that password anywhere, change it on every site that used it—immediately. Change your email account password even if it was not directly exposed in the breach (credential stuffing attacks try breach passwords on other services automatically). Enable 2FA if you haven’t already.

Q: Can I recover my email account if the password was changed by a hacker?

A: Yes. Use the account recovery process: for Gmail, go to accounts.google.com/signin/recovery; for Microsoft, go to account.live.com/acsr. You will need access to a recovery email or phone number. If the attacker changed those too, you will need to prove identity through the provider’s manual review process, which may take several days. This is why keeping recovery info current and verified matters.

Q: What is the strongest 2FA method for email in 2026?

A: In order of strength: (1) Hardware security key (YubiKey, Google Titan)—phishing-resistant, cannot be intercepted; (2) Authenticator app (Google Authenticator, Authy, Bitwarden TOTP)—no SMS interception risk; (3) SMS/text codes—better than nothing but vulnerable to SIM-swap attacks and should be avoided for email accounts containing sensitive data. For most users, an authenticator app provides excellent security with reasonable convenience.

About the author: TouchEVA is a tech journalist covering AI, software, and cybersecurity for Hubkub.com — independent tech media since 2025.

{“@context”:”https://schema.org”,”@type”:”FAQPage”,”mainEntity”:[ {“@type”:”Question”,”name”:”How do I know if someone is reading my emails without my knowledge?”,”acceptedAnswer”:{“@type”:”Answer”,”text”:”Check for hidden forwarding rules: Gmail Settings → Forwarding and POP/IMAP and Filters tabs. Also check login history at myaccount.google.com/security for unfamiliar device or location access. Mobile apps don’t show forwarding rules — always check via browser.”}}, {“@type”:”Question”,”name”:”My email shows up on HaveIBeenPwned — what should I do?”,”acceptedAnswer”:{“@type”:”Answer”,”text”:”Check which breach it appeared in. If a password was exposed and you use it anywhere, change it on every site immediately. Change your email password even if not directly exposed — credential stuffing attacks try breach passwords on other services automatically. Enable 2FA.”}}, {“@type”:”Question”,”name”:”Can I recover my email account if the password was changed by a hacker?”,”acceptedAnswer”:{“@type”:”Answer”,”text”:”Yes. Use Gmail account recovery at accounts.google.com/signin/recovery or Microsoft at account.live.com/acsr. You’ll need a recovery email or phone number. If those were changed too, use the provider’s manual identity review process.”}}, {“@type”:”Question”,”name”:”What is the strongest 2FA method for email in 2026?”,”acceptedAnswer”:{“@type”:”Answer”,”text”:”1) Hardware security key (YubiKey, Google Titan) — phishing-resistant. 2) Authenticator app (Google Authenticator, Authy) — no SMS interception risk. 3) SMS codes — avoid for sensitive accounts as they’re vulnerable to SIM-swap attacks.”}} ]}

Next Read

  • How-to complete guide
  • Run Ollama locally
  • Use Cursor AI for coding

Last Updated: April 13, 2026

See also: How-To Guides: Practical Technology Tutorials for 2026 — our complete guide to this topic.
TouchEVA

TouchEVA

Founder and lead writer at Hubkub. Covers software, AI tools, cybersecurity, and practical Windows/Linux workflows.

Full profile
Share Article
Tagged:account recoverycybersecurityemail securityhacked emailhaveibeenpwned
Previous Article
How to Automate Tasks with Zapier for Free (2026 Guide) — editorial featured image showing the topic context, key signals, and reader intent

How to Automate Tasks with Zapier for Free (2026 Guide)

Next Article

How to Use Notion AI: 12 Features That Save Hours Every Week

How to Use Notion AI: 12 Features That Save Hours Every Week — illustrative image for this article

Related Posts

How to Improve Webcam Quality Before Buying a New Webcam — editorial featured image showing the topic context, key signals, and reader intent
How to Improve Webcam Quality Before Buying a New Webcam
22/04/2026
Run Gemma 4 Locally with Ollama: Step-by-Step Guide — illustrative image for this article
Run Gemma 4 Locally with Ollama: Step-by-Step Guide
17/04/2026
Run Llama 4 Scout Locally: Ollama Setup Guide 2026 — illustrative image for this article
Run Llama 4 Scout Locally: Ollama Setup Guide 2026
16/04/2026

Featured Articles

1AWS MCP Server access checklist — server racks and cloud infrastructure for AI agent workflows | Photo by Brett Sayles on Pexels
AWS MCP Server GA: Agent Access Checklist
07/05/2026
2AWS WorkSpaces AI agent desktop checklist — cloud desktop workflow for safe agent pilots
AWS WorkSpaces AI Agent Desktops: Safe Pilot Checklist
06/05/2026
3Daemon Tools backdoor checklist — cybersecurity analyst reviewing suspicious Windows activity | Photo by Sora Shimazaki on Pexels
Daemon Tools Backdoor: Windows User Checklist
06/05/2026

Category List

  • AI(43)
  • Business(5)
  • Comparisons(17)
  • Deep Dive(15)
  • Dev / IT Ops(30)
  • Developer(20)
  • Downloads(62)
  • Drivers(5)
  • Education(5)
  • Gadgets(6)
  • Games(5)
  • General(6)
  • How-to(43)
  • Internet(1)
  • Mobile(5)
  • Multimedia(3)
  • Personal(61)
  • Reviews(19)
  • Security(24)
  • Tech News(46)
  • Utilities(5)

Must Read

1AWS MCP Server access checklist — server racks and cloud infrastructure for AI agent workflows | Photo by Brett Sayles on Pexels
AWS MCP Server GA: Agent Access Checklist
07/05/2026
2Official Recuva product screenshot from CCleaner showing the Windows recovery interface
Recuva Review 2026: Free File Recovery, Windows Limits
07/05/2026
3Official Kdenlive interface screenshot from the Kdenlive website
Kdenlive Review 2026: Free Video Editor, Safe Download
07/05/2026
Copyright © 2026 Hubkub
Privacy PolicyTerms of ServiceContactAboutEditorial PolicyAI Disclosure