• Why ExpressVPN?
    • What Is a VPN?
    • Servers in 105 Countries
    • Enjoy Sites and Services
    • VPN for Gaming
    • No-Logs Policy
    • Explore All Features
  • Products
    • Keys Password Manager
    • Aircove Routers
    • Threat Manager
    • Ad Blocker
    • Parental Controls
    • Dedicated IP
    • ID Alerts
    • ID Theft Insurance
    • Data Removal
    • Credit Scanner
    • eSIM
  • Devices
    • Download VPN
    • MacOS
    • Windows PC
    • iOS (iPhone & iPad)
    • Android
    • Linux
    • Routers
    • Apple TV
    • Fire Stick
    • Android TV
    • Chrome Extension
  • Get Help
    • Support Center
    • Live Chat
    • Enter Redemption Code
  • Blog
  • Get Aircove Setup
  • My Account
  • Get Started
  • Get Started Get Aircove Setup
  • Why ExpressVPN?
    • What Is a VPN?
    • Servers in 105 Countries
    • Enjoy Sites and Services
    • VPN for Gaming
    • No-Logs Policy
    • Explore All Features
  • Products
    • Keys Password Manager
    • Aircove Routers
    • Threat Manager
    • Ad Blocker
    • Parental Controls
    • Dedicated IP
    • ID Alerts
    • ID Theft Insurance
    • Data Removal
    • Credit Scanner
    • eSIM
  • Devices
    • Download VPN
    • MacOS
    • Windows PC
    • iOS (iPhone & iPad)
    • Android
    • Linux
    • Routers
    • Apple TV
    • Fire Stick
    • Android TV
    • Chrome Extension
  • Get Help
    • Support Center
    • Live Chat
    • Enter Redemption Code
  • Blog
    • Latest
    • Privacy news
    • Tips & tricks
    • Streaming
    • ExpressVPN news
    • Videos
    • Subscribe to ExpressVPN Newsletter
  • My Account
  • Latest
  • Privacy news
  • Tips & tricks
  • Streaming
  • ExpressVPN news
  • Videos
Home Blog How to recover a hacked Google account

How to recover a hacked Google account

Tips & tricks • 11 mins • 29.02.2024
Written by 

Atika Lim

Last updated on 

28.10.2024

Last updated

28.10.2024

Share in FacebookShare in TwitterShare in WhatsappShare in TelegramShare by email
how-to-recover-google-hacked-account

Recovering a hacked Google account can be a distressing experience, as it often contains personal information, including emails, documents, photos, and even financial details linked through various services like Google Pay.

The good news is that Google provides several tools and steps to help you regain control of your account and secure it against future attacks. This post will guide you on quickly spotting and recovering a hacked Google account.

If your Google account has been hacked, it’s time to step up your online security—and using a VPN is a powerful way to do it. ExpressVPN hides your IP address and encrypts all your internet traffic, making it much harder for hackers to intercept your personal data, especially when you connect on unsecure public networks. Whether you’re accessing sensitive accounts like your email or banking, or just browsing, ExpressVPN adds an extra layer of protection that keeps your information safe.

 

Get ExpressVPN

Jump to…
How to secure a hacked or compromised Google account
How can I recover my Gmail password without my phone number and email?
How to tell if your Google Account has been hacked
How do Google account hacks occur?
How to prevent my Google account from getting hacked?

How to secure a hacked or compromised Google account

If you observe any unusual activity on your Google Account, Gmail, or associated Google services, it’s possible that an unauthorized individual has gained access. Should you suspect your Google Account or Gmail has been compromised, taking action immediately is crucial. The following steps will assist you in identifying any suspicious behavior, regaining access to your account, and enhancing its security measures.

1. Sign into your Google account

If you’re still able to, log into your Google account and change your password. Not only does this prevent further access by someone who’s found out your password, but changing it kicks off any devices that are logged in to your account.

If you’re unable to sign in because the attacker changed your password, you’ve simply forgotten it, or for any other reason, go to the account recovery page and answer some questions to verify your identity. If successful, you’ll be prompted to create a new password, and your account will be yours again.

2. Review security events in your account

  1. Go to myaccount.google.com.
  2. Choose Security from the menu on the left side.
  3. Click on Review security events in the “Recent security events” section.
  4. Examine any activities that seem unusual.

If you encounter any activity you don’t recognize as your own, click “No, it wasn’t me.” Then, proceed with the on-screen instructions to enhance the security of your account.

If the activity was indeed yours, click Yes.

3. Review the devices where you’re logged in

Another step you can take to check for suspicious access is to see where you’ve logged in to Google in the last 28 days. If there’s any device listed that you don’t recognize, it’s a sign of someone else accessing your account.

  1. Go to myaccount.google.com.
  2. On the left navigation panel, select Security.
  3. On the “Your devices” panel, select Manage all devices.
  4. Check if there are any devices that you don’t recognize.
  5. If you find unrecognized devices, select Don’t recognize a device? and follow the steps on the screen to secure your account.

You’ll also be shown if you are signed out of devices or sessions. You can sign out from devices by selecting the device and choosing Sign out. If you find sessions on unfamiliar devices, it might mean an intruder has your password and could log back in, so ensure you change your password.

4. Report to the authorities, if necessary

If your Google Account has been compromised and used for financial fraud, identity theft, or illegal activities, report the incident to the authorities. Contacting law enforcement can provide you with additional support and resources to address the breach effectively. Moreover, reporting these incidents helps authorities track and combat cybercrime more efficiently. 

When reporting, be prepared to provide detailed information about the breach, including any evidence of unauthorized transactions, communications from the perpetrator, or other relevant details. Depending on your jurisdiction, you may also want to report the incident to national cybersecurity centers or consumer protection agencies, which can offer guidance on mitigating the hack’s impact and safeguarding your personal information against future threats.

How can I recover my Gmail password without my phone number and email?

If you’ve forgotten your Gmail password, Google can verify your identity through your phone number or a second email that you’ve set up. But if you’ve lost access to both, regaining access to Gmail can be challenging. Still, Google provides alternative methods to help verify your identity and regain access to your account. Follow these steps to attempt password recovery:

1. Go to Google’s account recovery page

Start by visiting the Google Account Recovery page. Enter the email address for the account you’re trying to access and follow the prompts.

2. Select “Try another way”

Since you don’t have access to your phone number or recovery email, you’ll need to click on Try another way when prompted for verification through those methods.

3. Answer the security questions

Google may ask you security questions related to your account. These could include previous passwords you’ve used, security questions you’ve set up, or details about your account usage, like frequently emailed contacts or labels you’ve created. Answer these questions as accurately as possible.

4. Provide additional information

Google might ask for more information to verify your identity, such as:

  • An email address you can currently access. Google can use this to communicate with you about your recovery attempt.
  • Details about when you created your Google account.
  • Names of folders you’ve created in your Gmail.
  • Email addresses of contacts you’ve recently communicated with.
  • Any Google services associated with the account (like YouTube or Google Drive) and details about your use.

Carefully follow any additional instructions provided by Google. The process might involve waiting for a review from Google’s support team. 

How to tell if your Google Account has been hacked

Here are some common indicators that your account may have been compromised:

1. Unusual activity alerts

Google often sends alerts regarding suspicious activity, such as login attempts from unknown devices or locations. Your account might be at risk if you receive such notifications without recognizing the activity.

2. Unauthorized transactions

Check for any unfamiliar transactions or subscriptions linked to your Google account. Unauthorized purchases are a sign of account compromise.

3. Changes to your account settings or Google profile

If you notice changes in your account settings that you did not make—such as forwarding emails to an unknown address, changes to your recovery information, or altered security settings—it’s likely your account has been hacked.

4. Your Google password has been changed

If you’ve received an unexpected notification that your Google password has been changed, but you did not request the change, it’s likely that someone has hacked your account and is trying to lock you out of it.

5. You see random third-party apps and extensions connected to your account

It’s possible for hackers to gain backdoor access to your accounts through third-party apps and services. Hackers can access your account through these apps or extensions by designing legitimate versions of these apps that offer enticing features, such as ad blocking, search enhancements, or custom themes. These tools, however, are maliciously intended to gain access to your data by requesting personal information.

6. Your account is set to forward emails to a separate account

Email forwarding is a technique used by scammers to gain access to private messages that are sent to your email inbox. In other words, you and the hackers can both view your email inbox.

7. Your contacts are getting fake emails from your account

When friends or contacts report receiving spam, phishing emails, or messages pretending to be you from your account, it’s a significant red flag indicating that your account security has been compromised. A common attack is using your email to ask friends and family for money.

8. Your account has been logged in on unfamiliar devices or locations

Google provides a feature that allows users to view their account’s recent activity through the Last Account Activity page. If you encounter an IP address, device, or location in this history that doesn’t seem familiar, it indicates that another individual has gained access to your account. 

However, the locations shown for smartphones and tablets might reflect the mobile carrier’s information, which may not always match your location. If the device and mobile carrier are recognizable, encountering a location that aligns differently from your current whereabouts is typically not cause for concern.

How do Google account hacks occur?

Google account hacks can occur through various methods, as hackers continuously develop and deploy sophisticated techniques to gain unauthorized access. Understanding these methods can help users bolster their defenses. Here are some common ways through which Google account hacks happen:

1. Phishing attacks

Phishing is a deceptive technique where hackers send emails or messages that mimic legitimate companies or services. These messages often contain links to fake websites designed to steal login credentials. Unsuspecting users may enter their Google account details into these sites, directly providing hackers access.

Hackers may also use pretexting, which is fabricating scenarios to obtain personal information; baiting, which is offering something enticing in exchange for login info; or scare tactics like convincing users their account is already compromised.

2. Password breaches

If a user employs the same password across multiple platforms, and one of these platforms is compromised, hackers can use the stolen credentials to access the user’s Google account. All the attacker has to do is try it to see. This is why it’s important to use a different password for every account, and it’s also why the use of a password manager is highly encouraged.

If you’re looking for a password manager, consider using ExpressVPN Keys.. Our built-in password manager helps you manage unlimited passwords, credit card details, and notes securely on any device—and even alerts you to data breaches and vulnerable passwords. Every ExpressVPN subscription comes with Keys and other advanced security features.

 

Get ExpressVPN

3. Third-party app permissions

Sometimes, users grant permissions to malicious third-party apps. These apps can then access personal information and account details. Users might unknowingly authorize these apps to view, send, delete emails, or even change account settings.

4. Malware and spyware

Malware or spyware, such as keylogging software, can lead to account compromises. If a keylogger is installed on a user’s device, it can capture the user’s Google account username and password as they are entered, transmitting this information back to the hacker.

5. Public Wi-Fi vulnerabilities

Using unsecured public Wi-Fi networks can expose users to hacks. Attackers can intercept data transmitted over these networks, including Google account credentials, especially if the data is not encrypted. This is why it’s best practice to use a VPN when using public Wi-Fi to ensure your connection is secure.

6. SIM swapping

If you use two-factor authentication for your Google account, you’ve increased your account security significantly. But if a hacker is motivated enough, they could use a SIM swap attack to foil your SMS second factor authentication. In SIM swaps, attackers manipulate a mobile carrier into switching a victim’s phone number to a SIM card in the hacker’s possession. Once successful, they can receive two-factor authentication codes sent via SMS, granting them access to the account.

How to prevent my Google account from getting hacked?

Cybersecurity can seem overwhelming. But there are ways to safeguard your important online accounts.

1. Use a strong, unique password

A strong password is one that is long and random. Such a password would take a hacker hundreds of years to guess. It’s also important that you don’t repeat passwords for different accounts (or rely on a formula with repeated elements). The problem with having a different strong password for all your accounts is it’s impossible to remember them. This is where password managers come in. With a password manager like ExpressVPN Keys (included with every ExpressVPN subscription), you can generate random, strong passwords, store them behind the high levels of security we’re known for, and easily retrieve them with a primary password—the only one you’ll need to remember.

2. Enable 2FA

Activate two-factor authentication for an additional layer of security beyond your password. This requires you to authenticate your identity using a second method like a one-time code sent to your phone, email, or authenticator app. Even if an attacker has your password, it won’t be able to access your account without secondary authentication. 

3. Be wary of phishing attempts

Learn to recognize phishing emails or messages that trick you into giving away your personal information. Always think twice and verify the authenticity of messages asking for personal details or directing you to log in somewhere.

4. Review your account permissions

Regularly check and manage which apps and services have access to your Google account. Revoke access to any that you no longer use or trust.

5. Monitor account activity

Occasionally review your account’s sign-in activity. Google provides tools to check from where and when your account has been accessed. Log out all other sessions for peace of mind.

6. Secure your devices

Many people remain signed in to accounts on their personal phones and computers for greater convenience. Ensure all devices you use to access your Google account are secured with passwords, PINs, or biometric locks. Keep your operating system and applications updated to protect against vulnerabilities.

7. Only use secure connections

Using secure connections can protect your accounts and sensitive information from being intercepted. This is especially a concern when accessing the internet on public or unsecured Wi-Fi networks. One effective way to ensure a secure connection is with a VPN download—ExpressVPN encrypts all the data entering and leaving your device, ensuring no-one else can see what you’re doing.

8. Use Google’s Security Checkup tool

Google offers a Security Checkup feature that reviews your account’s security settings and suggests improvements for apps or software that may have been impacted. Make it a habit to perform these checkups regularly.

FAQ: About hacked Google accounts

How can I contact Google to recover my account?

Unfortunately, Google doesn’t offer direct phone or email support for account recovery. However, there are still ways to recover your account.

1. Use the Google Account recovery tool:

This is the recommended method by Google. Visit accounts.google.com/signin/recovery and enter the email address associated with your account. You’ll be asked a series of questions to verify your identity. Answer them to the best of your ability, and Google will guide you through the recovery process.

2. Use the Google Account Help Center:

The Google Account Help Center has a wealth of information on recovering your account. You can find articles on various topics, such as how to recover your Google account or Gmail, forgotten email addresses, and account security and privacy.

3. Search the Google Account Community:

The Google Account Community is a forum where you can get help from other Google users and experts. You can search for existing threads related to your issue or create a new post for help.

What happens if your Google account is hacked?

Having your Google account hacked can be a stressful and frustrating experience. Here’s a breakdown of what might happen:

Loss of access: Hackers may change your password or lock you out of your account, preventing you from accessing your emails, files, contacts, and other Google services.

Data theft: Hackers might steal personal information stored in your account, such as contacts, photos, documents, browsing history, and even payment details if saved.

Identity theft: Using stolen information, hackers could try to impersonate you online and potentially access other accounts, commit fraud, or damage your reputation.

Target your contacts: Hackers often use compromised accounts to send spam emails or launch phishing attacks on your contacts, potentially spreading malware or tricking them into revealing sensitive information.

How long does Google give you to recover your account?

There is no time limit specifically for recovering your account. The main risk is losing your account due to inactivity. When your Google Account has not been used within a two-year period, your Google Account is deemed inactive, and all of its content and data may be deleted.

Does Google alert you if you’ve been hacked?

Google does try to alert you if it detects suspicious activity or potential hacking attempts on your account. Google often sends you an email or notification if someone tries to sign in to your account from a new device or location, especially if it seems unusual. Also, if Google suspects someone is trying to hack your account, they might block the attempt and notify you.

That said, Google can’t know for sure that you’ve been hacked and therefore wouldn’t alert you of such an event—only that it detects suspicious activity.

Can you see who logged into your Google account?

While you can’t tell the identity of someone who’s accessed your account without your knowledge, you can get clues based on the location and device type of the activity.

1. Go to your Google Account
Visit https://myaccount.google.com/ and sign in, if you haven’t already.

2. Access Security settings
Click on “Security” in the left navigation panel.

3. View “Your devices”
Under the “Your devices” section, you’ll see a list of devices where you’re currently signed in or have been in the last few weeks.

4. Analyze details
For each device, you can see the device type, location (city and approximate country), last active date and time, and whether you’re currently signed in.

5. Identify suspicious activity

If you see an unfamiliar device or one you don’t recognize, it could be a sign of unauthorized access. You can:

* Sign out suspicious sessions: Click “Manage” next to the device and choose “Sign out” to remotely log out the unauthorized user.
* Change password: To secure your account immediately, consider changing your Google password. All other sessions will be signed out.

6. Report suspicious activity

If you’re concerned about unauthorized access, report it to Google through the “Security” settings page or support channels.

Phone protected by ExpressVPN.
Mask your IP address with a VPN
Get ExpressVPN

30-day money-back guarantee

Various devices protected.
Take the first step to protect yourself online. Try ExpressVPN risk-free.
Get ExpressVPN
What is a VPN?
  • TAGS
  • gmail
  • Gmail Account
  • Google
  • Google Account
Atika Lim
Like what you have read?

Clap for this post. Or share your thoughts!

18
1
Share in FacebookShare in TwitterShare in WhatsappShare in TelegramShare by email
Subscribe to the weekly blog newsletter

Get the latest in privacy news, tips, tricks, and security guides to level-up your digital security.

Previous articleGaming destinations ranked: 20+ top cities for gamers
Next articleWhat is WWW2 and is it safe?
  • Related posts
  • Featured Posts
  • More from the author
Vanessa Ko - 05.02.2024
6 mins
Correct horse battery staple.
Vanessa Ko - 05.02.2024
6 mins
What are passphrases and examples of them?
Marcus Tsui - 24.03.2021
3 mins
Fediverse logo.
Marcus Tsui - 24.03.2021
3 mins
Big Tech censoring you? Try a distributed social network
Vanessa Ko - 01.03.2022
4 mins
Delete Google and Gmail
Vanessa Ko - 01.03.2022
4 mins
How to delete your Gmail account permanently
Atika Lim - 30.03.2022
5 mins
tech-items-improve-your-life
Atika Lim - 30.03.2022
5 mins
10 life-enhancing tech products under $30
Atika Lim - 08.01.2024
17 mins
scams-to-look-out-for-in-2024
Atika Lim - 08.01.2024
17 mins
10 scams you should know about in 2024
Vanessa Ko - 04.08.2023
5 mins
Is WhatsApp safe to use?
Vanessa Ko - 04.08.2023
5 mins
Is WhatsApp safe?
Marcus Tsui - 20.06.2022
12 mins
An open android face with film reel within.
Marcus Tsui - 20.06.2022
12 mins
Best artificial intelligence movies through the ages
Lexie - 04.02.2024
19 mins
21 best onion and Tor sites on the dark web
Lexie - 04.02.2024
19 mins
Dark Web Links: The best .onion and Tor sites in 2025
Clement Adegbenro - 20.06.2024
5 mins
A pencil erasing the user interface of Netflix.
Clement Adegbenro - 20.06.2024
5 mins
How to delete Netflix viewing history on all devices
Naiyie Lamb - 16.05.2023
10 mins
Clear iPhone system data
Naiyie Lamb - 16.05.2023
10 mins
Tech Friend: How to clear iPhone system data and free up storage
Marcus Tsui - 28.03.2023
4 mins
Phone with location pin and luggage handles.
Video post
Marcus Tsui - 28.03.2023
4 mins
How to track your own luggage
Atika Lim - 03.02.2025
9 mins
Atika Lim - 03.02.2025
9 mins
7 hidden habits that could be hurting your credit score
Atika Lim - 11.12.2024
19 mins
Atika Lim - 11.12.2024
19 mins
What everyone streamed, watched, and obsessed over in 2024
Atika Lim - 03.12.2024
7 mins
A lock with the "Android" logo.
Atika Lim - 03.12.2024
7 mins
VPN for Android: How to set it up
Atika Lim - 25.11.2024
12 mins
Atika Lim - 25.11.2024
12 mins
What is F-Droid and should you use it?
Atika Lim - 13.11.2024
10 mins
Atika Lim - 13.11.2024
10 mins
Guide: How to turn off Meta AI
Atika Lim - 01.11.2024
12 mins
What to do if your VPN isn't connecting.
Atika Lim - 01.11.2024
12 mins
VPN not connecting: How to fix common VPN issues
Phone protected by ExpressVPN.
Mask your IP address with a VPN
Get ExpressVPN

30-day money-back guarantee

Previous articleGaming destinations ranked: 20+ top cities for gamers
Next articleWhat is WWW2 and is it safe?
  • Related posts
  • More from the author
  • Previous
  • Next
Jennifer Pelegrin - 08.05.2025
17 mins
What is friendly fraud? A complete guide
Katarina Glamoslija - 06.05.2025
14 mins
VPN protocols explained and compared: Which is best for speed, security, and everyday use?
Chantelle Golombick - 02.05.2025
17 mins
OfferUp scams: 10 common scams and how to avoid them
Chantelle Golombick - 30.04.2025
15 mins
VPN speed test: How to accurately test and improve your VPN speed
Various devices protected.
Take the first step to protect yourself online. Try ExpressVPN risk-free.
Get ExpressVPN
What is a VPN?
Comments
  1. Karen williams says:
    21.06.2024 at 9:33 pm

    I cant look up new info on Google anymore on this phone. A horrid snowman icon comes up over what I’ve searched for after a few seconds and then I’m asked to tell Google what the problem is. This must be a hack as you have never replied. I am using my more hotspot via my Vodafone contract. They don’t know what to do.

Comments are closed.

Previous articleGaming destinations ranked: 20+ top cities for gamers
Next articleWhat is WWW2 and is it safe?
ExpressVPN is proudly supporting
  • logo_1
  • logo_2
  • logo_3
  • logo_4
Subscribe to the blog newsletter
  • What is malware?
  • What is a network security key?
  • Are VPNs legal?
  • How to change the location on your iPhone
  • What is a digital footprint?
  • What is malware?
  • What is a network security key?
  • Are VPNs legal?
  • How to change the location on your iPhone
  • What is a digital footprint?
Show less Show more
  • How to combine a VPN and Tor for online anonymity
  • Get the best VPN for multiple devices
  • VPN for All Devices
  • Download ExpressVPN
  • MacOS
  • Windows PC
  • iOS (iPhone & iPad)
  • Android
  • Linux
  • Routers
  • Apple TV
  • Fire Stick
  • Android TV
  • Chrome Extension
  • VPN Server Locations
  • Servers in 105 Countries
  • US VPN
  • UK VPN
  • Canada VPN
  • Australia VPN
  • Features
  • Explore All Features
  • Risk-Free VPN Trial
  • Plans and Pricing
  • Products
  • Keys Password Manager
  • Aircove Routers
  • eSIM
  • Identity Defender
  • About ExpressVPN
  • About Us
  • Trust Center
  • Rights Center
  • Security Audits
  • ExpressVPN Reviews
  • Our Experts
  • Press
  • Careers
  • Programs
  • Tottenham Hotspur
  • Partner With Us
  • Affiliates
  • Influencers
  • Get Help
  • VPN Setup Tutorials
  • FAQ
  • Contact Us
  • Buy VPN
  • Learn More
  • What Is a VPN?
  • What Is My IP?
  • Hide My IP
  • Top 5 VPN Uses
  • Blog

© 2025 ExpressVPN. All rights reserved.

Privacy Policy Terms of Service Cookie Preferences
Youtube Linkedin Twitter Facebook Instagram

Choose language

  • Nederlands
  • Français
  • Deutsch
  • Italiano
  • Polski
  • Español
  • Türkçe
  • 日本語
  • 한국어
  • Português
  • Svenska

Live chat

Need help? Chat with us!

Online