10 Warning Signs You're Being Hacked (And What to Do)

By ForensAI Team · 2026-01-25 · 12 min

Unauthorized access to your accounts rarely happens overnight. Attackers often test access, monitor activity, and gradually expand their control. Recognizing the warning signs early can help you detect and respond to a compromise before serious damage occurs.

Here are 10 warning signs that someone may have hacked your accounts—and exactly what to do if you see them.

1. Unknown Devices in Your Account

One of the most obvious signs of unauthorized access is seeing devices you don't recognize in your account's device list. Check your Google, Apple, Facebook, and other account settings regularly for devices you don't own or recognize.

What to do: Immediately remove any unknown devices and change your password. Review recent activity from those devices to understand what the attacker accessed.

2. Logins from Unfamiliar Locations

If you see successful logins from cities, states, or countries where you haven't been, that's a red flag. Even if the login appears successful, it could indicate someone has your password.

What to do: Review your account's login history. If you see logins from locations you don't recognize, change your password immediately and enable two-factor authentication.

3. Password Reset Emails You Didn't Request

Receiving password reset emails you didn't initiate is a strong indicator that someone is trying to gain or maintain access to your account. They may be attempting to lock you out.

What to do: Don't click any links in suspicious reset emails. Instead, go directly to the platform's website and change your password yourself. Check your recovery email and phone settings to ensure they haven't been changed.

4. Changed Recovery Email or Phone Number

If an attacker changes your recovery email or phone number, they can lock you out of your account permanently. This is often done after they've already gained access.

What to do: Check your account settings immediately. If recovery information has been changed without your knowledge, change it back and secure your account. This is a critical warning sign.

5. Unusual Login Times (3 AM, etc.)

Logins during hours when you're typically asleep or inactive can indicate unauthorized access. Attackers often operate during off-hours to avoid detection.

What to do: Review your account activity logs for patterns. If you see consistent logins during unusual hours, especially from unfamiliar locations, treat it as suspicious.

6. Multiple Failed Login Attempts

A series of failed login attempts followed by a successful login is a classic pattern of a brute-force attack. The attacker tries multiple password combinations until one works.

What to do: If you see failed login attempts, change your password immediately—even before a successful login occurs. Enable account lockout features if available.

7. Apps or Permissions You Didn't Authorize

New apps or services connected to your account that you don't remember authorizing can indicate an attacker has gained access and is using OAuth to maintain persistence.

What to do: Review all connected apps and services in your account settings. Revoke access to anything you don't recognize or use. This is especially important for Google, Facebook, and Apple accounts.

8. Location Tracking from Unknown IPs

If your location history shows access from IP addresses in locations you haven't visited, or if location services show activity when your phone was off, someone may be accessing your accounts remotely.

What to do: Review your location history and IP access logs. Cross-reference with your actual travel history. Geographic anomalies are strong indicators of unauthorized access.

9. Account Activity You Don't Recognize

Emails sent from your account that you didn't write, posts you didn't make, or purchases you didn't authorize are clear signs that someone else has access to your account.

What to do: Immediately change your password and review all recent account activity. Check sent folders, post history, and transaction logs. Notify contacts if spam was sent from your account.

10. Friends or Contacts Receiving Spam from You

If people in your contact list report receiving suspicious messages, friend requests, or spam from your account, your account has likely been compromised and is being used to target others.

What to do: Immediately secure your account and notify your contacts that your account was compromised. Review your message history and friend/follower lists for unauthorized changes.

ForensAI detects all 10 of these patterns automatically in under 5 minutes. Upload your account exports and get a comprehensive security analysis with timestamped evidence of any unauthorized access.

What to Do If You See These Signs

Immediate Steps (First Hour)

  1. Change passwords immediately from a secure device you trust
  2. Enable two-factor authentication on all affected accounts
  3. Review and remove unknown devices from your account settings
  4. Check recovery email and phone settings to ensure they haven't been changed
  5. Review recent account activity to understand what was accessed

Document Everything for Potential Legal Action

If you suspect unauthorized access, document everything:

  • Screenshot suspicious activity and login records
  • Export complete account activity logs
  • Create a timeline of events
  • Generate a forensic report with timestamped evidence

This documentation can be crucial if you need to file a police report, obtain a restraining order, or pursue legal action.

Run Comprehensive Security Analysis

Manual checks can miss subtle patterns. A comprehensive forensic analysis examines your complete account data for:

  • Cross-platform correlation (same attacker accessing multiple accounts)
  • Temporal patterns (activity during unusual hours)
  • Geographic anomalies (impossible travel patterns)
  • Device fingerprinting (identifying the same device across platforms)
  • Sequence analysis (password reset followed by login from new device)

Get Instant AI Analysis

Check all 10 warning signs across your accounts in under 5 minutes

Check Now – Free Scan

Prevention: Don't Wait for Warning Signs

The best defense is proactive monitoring. Regular security checks can detect unauthorized access before attackers cause serious damage:

  • Review account activity monthly
  • Check connected devices quarterly
  • Run comprehensive analysis after any suspicious activity
  • Use strong, unique passwords for each account
  • Enable two-factor authentication everywhere possible

ForensAI makes regular security checks easy—upload your account exports and get instant analysis of all 20+ security patterns that indicate unauthorized access.

Related Resources

Think someone has been in your accounts?

ForensAI analyzes your data exports and tells you exactly what happened. Results in seconds.

Get Started →

Frequently Asked Questions

How do I know if I'm being hacked?

Signs include logins from unknown devices or locations, password or recovery-email changes you didn't make, new devices on your accounts, and unusual activity. ForensAI scans your data exports for these patterns and gives you a clear report in under 5 minutes.

What are signs of unauthorized access?

Failed login attempts, successful logins from new devices or locations, password resets, 2FA or recovery-email changes, and new devices added to your account. ForensAI checks 20+ security patterns across your exports.

How long does a security check take?

Under 5 minutes from upload to results. Analysis runs in your browser; your files never leave your device.

Is my data safe with ForensAI?

Yes. All processing happens locally in your browser. Your files are never uploaded to our servers.