Hooked: Rescue and Recovery After Being Phished

First and foremost, breathe. Phishing campaigns are growing increasingly sophisticated by the day, and are getting harder and harder to recognize. Phishing happens, and it can be dealt with and recovered from. If you were the victim of a phishing attack, the steps outlined below can help to ensure the damage done by the phisher is limited. The below steps are moreso geared towards being phished in your personal life, however, so if you were phished in a working capacity, please report it to your company's IT department as soon as possible. For personal phishing events, please keep reading for useful steps to take to protect yourself, as well as some additional resources that can help.

Triage and First Steps

These first steps are designed to cut off the hacker's access to any login, financial information, or computer they may have been able to compromise. It's important that this connection is severed as soon as possible to limit the damage to any of your accounts.

Secondary Mitigations

After securing your information, it's important to take measures to be on alert and report the event where appropriate. These precautions will help both yourself and the person, company, or organization that was impersonated defend against further harm.

Continued Monitoring

Your information may not be immediately used after being compromised. It can be compiled with other people's information in a massive list to be sold on the dark web later, or the hacker could wait to use it in an attempt to lull you into a false sense of security.

Additional Resources

Here are some additional resources that can prove useful for the above steps, as well as to prevent future phishing incidents.