Skip to main content Skip to main menu Skip to footer

Qué hacer si una cuenta es pirateada

Qué hacer si una cuenta es pirateada

Disminuir el tamaño del texto Aumentar el tamaño del texto

Page Article

Signs that someone hacked your account

Hackers try to take over your accounts. Some might want to steal your personal information — like your usernames and passwords, bank account numbers, or Social Security number — to commit identity theft. Others might want to spread malware or scam others. So, what types of things might tip you off that someone hacked your account and changed your password?
  • You can’t log in to your account.
  • You get a notification about a change to your username or password— but you didn’t make that change.
  • You get a notification that someone logged into your account from a device you don’t recognize or a location you’re not at.
  • Your friends or family report getting emails or messages you didn’t send, sometimes with random links or fake pleas for help or money.

What to do first

  • Acceda a esa cuenta y cambie su contraseña. Si es posible, cambia también tu nombre de usuario. Si usas la misma contraseña en otro sitio, cámbiala también.
  • Is it a financial site, or is your credit card number stored? Check your account for any charges that you don’t recognize.
  • Vea y verifique la actividad de la cuenta. En primer lugar, revise la actividad de su cuenta para confirmar cualquier cambio o cargo fraudulento. Tenga en cuenta que algunas transacciones legítimas pueden parecer fraudulentas si la empresa opera con un nombre diferente.
  • Actualice su sistema y elimine el malware. Lo primero que debe hacer si su cuenta es pirateada es ejecutar un análisis antivirus completo. Esto significa omitir la configuración de "escaneo rápido" en favor de un escaneo profundo para identificar y eliminar no sólo todas las formas de malware (incluidos los troyanos y el software espía hasta los registradores de teclas que podrían estar rastreando sus pulsaciones incluso después de que se haya identificado el hackeo) y las aplicaciones potencialmente no deseadas. Es importante asegurarse de que está limpio antes de cambiar cualquier otra información sensible para evitar que se reinicie el ciclo. Además, configura tu software de seguridad, tu navegador de Internet y tu sistema operativo para que se actualicen automáticamente. Haga clic aquí para obtener una lista de software gratuito de análisis de seguridad en línea.
  • Review Social Media Accounts.  Look for changes in your social networking sites, and look for changes to the account since you last logged in.  Check your social media accounts for messages the hacker posted or sent from your account, or for new friends you don’t recognize. Look at your personal details, review any third-party apps connected to your account, and check your security questions and answers and your backup email addresses and/or phone numbers. If you think your hacker had a chance to scan your security questions and backup accounts, try to change these on the compromised account and on any other account that relies on the same information. This will prevent the bad actor from using your personal details to breach other accounts in the future.  
  • Check your email settings to see if there are rules set up to forward emails. Delete any rules you didn’t set up, so your messages aren’t forwarded to someone else’s address.
  • Check your sent folder for emails the hacker sent from your account. Look in your deleted folder for emails the hacker may have read then deleted.

How to get back into your hacked account

First, make sure your computer security software is up to date, then run a scan. If the scan identifies suspicious software, delete it, and restart your computer. Then, follow the provider’s account recovery instructions.
  • Once you’ve locked down your other accounts, it’s time to start trying to recover the ones you may have lost control of. Many commonly used services offer a suite of tools to help you verify your identity and regain access to your accounts, but some make it easier than others. If you can’t log in, contact the company. Ask them how you can recover or shut down the account.   

Here’s how recovery works on some of the services you might be using

  • Google: Visit the company’s Account recovery site.
  • Apple: Si alguien ha tomado el control de tu ID de Apple, empieza por visitar iforgot.apple.com. Desde allí, Apple te pedirá que verifiques tu número de teléfono y luego enviará notificaciones a tus otros dispositivos Apple para ayudarte a restablecer tu contraseña, pero sólo después de que hayas confirmado tu identidad introduciendo la contraseña de tu Mac o el código de tu iPad o iPhone.
  • Amazon: To start, Amazon will attempt to confirm your identity by sending a verification code to your phone. If that isn’t an option — say, if someone else has control of your phone number  -  your best bet is to call Amazon customer service. As part of the process, you may be asked to upload a scan of your driver’s license, state ID card or a voter registration card to verify your identity.
  • Microsoft: Visit the company’s Help Center.
  • Facebook: Visit the company's Help Center.
  • LinkedIn: Visit the company's Help Center.
  • Instagram: Visita la página de la empresa Centro de ayuda.
  • Twitter: Visit the company's Help Center.
  • Yahoo: Visit the company's Help Center

What to do after you take back control of your hacked account

  • Sign out of all devices. That way anyone who’s logged in to your account on another device will get kicked out.
  • Turn on two-factor authentication (2FA), also known as two-step verification, if it’s available on your accounts. With 2FA, you’ll have to enter your password and something else to log in. That could be a PIN or a one-time verification code you get by text or email or from an authenticator app.
  • Check your account recovery information. Make sure the recovery email addresses and phone numbers listed are ones you entered and have access to.
  • Contacta con otros servicios online. Es fundamental que cambies tus contraseñas con otras cuentas de pago como Hulu, Netflix, LinkedIn, compañías de tarjetas de crédito, etc. Asegúrate de utilizar contraseñas diferentes para cada cuenta en línea.
  • Change Your PINs & Passwords.  Once your computer is free of malware, it's time to change your password. If you've lost access to your account, you may need to contact the company directly, prove who you are, and ask for a password reset. Choose a new password that is very different from your old one and make sure it doesn't contain strings of repeated characters or numbers. Your password should be unique for each account, complex (i.e., a mix of letters, numbers, and special characters) and at least 15 characters long.  Learn more about passwords here.
  • Notify People You Know.  Tell your friends, family, and anyone else on your email contact list that they might have gotten a malicious link. During the period when attackers had control of your account, they could have sent dozens or even hundreds of fraudulent emails to everyone you know, in turn giving them access to a new set of victims. 
  • Change Your Security Questions.  While your password was the most likely attack route, it's also possible that hackers broke into your account after answering your security questions. Many users choose the same answer to common security questions.  
  • Report the Hack.  If you haven't already, contact your financial institution, email provider, or other company and report the hack. This is important even if your hacked account didn't cause you to lose access since it helps providers track scam-based behavior. If possible, freeze your bank account online, on the app, or by speaking with customer service.  In addition, your account provider may be able to offer details about the origin or nature of the attack.
  • Contact Credit Agencies.  Contact the three credit reporting agencies TransUnion, Experian, and Equifax to monitor your accounts in the months after you've been hacked.  Click here to contact credit report agencies.
  • Consider Your ID Protection Options.  If you've been hacked, another idea worth considering is an ID protection service. These services typically offer real-time email and online retail account monitoring, in addition to credit score reporting, and personal assistance in the event of identity theft. Your financial institution will offer this program for a small monthly fee.
  • Revise todas las cuentas de correo electrónico. Si la brecha afectó a un servicio que incluye el correo electrónico, como su cuenta de Google, revise la cuenta de correo electrónico para ver si hay mensajes enviados o nuevos filtros. Por ejemplo, los piratas informáticos astutos pueden configurar filtros que reenvíen todo el correo entrante a una dirección que no reconozcas. Elimina estos filtros para evitar que la gente se cuele en tu cuenta en el futuro. Esto es especialmente importante porque puedes restablecer las contraseñas de muchas otras cuentas y recibir notificaciones sobre actividades sospechosas por correo electrónico. No querrás que un fisgón se quede con esos mensajes de recuperación. Además, comprueba que tu firma de correo electrónico y tu mensaje de "salida" no contengan enlaces o reenvíos desconocidos. 
  • Crear una nueva cuenta de correo electrónico. A veces no vale la pena seguir donde lo dejaste. Si no es la primera vez que el correo electrónico hackeado es un problema, o si su proveedor no parece estar tomando medidas para mitigar la cantidad de spam que recibe, puede ser el momento de cambiar. Busque un servicio que ofrezca encriptación por defecto de sus correos electrónicos y un sólido servicio de atención al cliente en caso de problemas.



Page Footer has no content