What to do if I've fallen victitm to a phishing email scam?

Creation date: 9/13/2025 1:11 PM    Updated: 9/13/2025 1:11 PM

Immediate Steps to Take After Falling Victim to a Phishing Scam


Falling victim to a phishing scam can be a distressing experience, but taking swift and decisive action can significantly mitigate the damage. Here is a comprehensive guide on what to do if you've been ensnared by a phishing attempt, from immediate containment to long-term recovery.


1. Disconnect and Secure


Isolate the Affected Device: The first and most critical step is to disconnect the compromised device from the internet.If you are on a computer, unplug the ethernet cable or turn off the Wi-Fi. For a mobile device, disable Wi-Fi and cellular data. This action can prevent malware from spreading to other devices on your network and stop any ongoing data transmission to the scammers.


Change Your Passwords: Immediately change the passwords for any accounts you believe may have been compromised. Start with the account that was the target of the phishing attack. If you reuse passwords across multiple sites—a practice that should be avoided—be sure to change the passwords for all those accounts as well.Prioritize critical accounts such as email, banking, and social media.When creating new passwords, make them strong and unique, incorporating a mix of upper and lowercase letters, numbers, and symbols.


2. Report the Incident


Reporting the phishing scam is crucial not only for your own potential recovery but also to help authorities track and combat these fraudulent activities.


  • Anti-Phishing Working Group (APWG): Forward the phishing email to reportphishing@apwg.org. The APWG is a global coalition that shares threat data among cybersecurity vendors, financial institutions, and law enforcement agencies.


  • Federal Trade Commission (FTC): File a report with the FTC at . The FTC uses these reports to build cases against scammers.


  • FBI's Internet Crime Complaint Center (IC3): For any cybercrime, including phishing, you can file a complaint with the IC3 at .

  • Internal Revenue Service (IRS): If the phishing scam was tax-related, forward the email to phishing@irs.gov.



3. Protect Your Financial Accounts


If you have entered any financial information, such as credit card numbers or bank account details, take the following steps immediately:

  • Contact Your Bank and Credit Card Companies: Notify your financial institutions about the potential fraud. They can monitor your accounts for suspicious activity, block fraudulent transactions, and issue new cards if necessary.


  • Review Your Statements: Carefully check your bank and credit card statements for any unauthorized charges.Report any discrepancies to your financial institution without delay.



4. Safeguard Your Identity


Phishing scams often aim to steal personal information for identity theft. To protect yourself, consider these measures:


  • Place a Fraud Alert on Your Credit Reports: Contact one of the three major credit bureaus (Equifax, Experian, or TransUnion) to place a free, one-year fraud alert on your credit file. This will make it more difficult for someone to open new accounts in your name. Once you contact one bureau, they are required to notify the other two.


  • Consider a Credit Freeze: For a higher level of security, you can freeze your credit with each of the three bureaus.A credit freeze restricts access to your credit report, which means you—or anyone else—won't be able to open a new credit account while the freeze is in place.


  • Utilize IdentityTheft.gov: The FTC provides a centralized resource at to help you report and recover from identity theft. The site will provide you with a personalized recovery plan based on the type of information that was stolen.


5. Scan and Clean Your Devices


There is a possibility that clicking on a link or downloading an attachment in a phishing email could have installed malware on your device.


  • Run a Security Scan: Use reputable antivirus and anti-malware software to scan your device for any malicious programs. Make sure your security software is up to date before running the scan.


  • Update Your Software: Ensure your operating system, web browser, and other software are updated to the latest versions. Updates often include security patches that can protect you from known vulnerabilities.



Moving Forward: How to Protect Yourself from Future Scams


  • Be Skeptical of Unsolicited Communications: Be wary of unexpected emails, text messages, or social media messages, especially those that create a sense of urgency or ask for personal information.

  • Verify the Sender: Before clicking on links or downloading attachments, carefully check the sender's email address.Scammers often use email addresses that are similar to, but not exactly the same as, legitimate ones.


  • Go Directly to the Source: If you receive a communication that appears to be from a company you do business with, do not use the links or contact information provided in the message. Instead, go directly to the company's official website or use a phone number you know to be legitimate.


  • Enable Two-Factor Authentication (2FA): Whenever possible, enable 2FA on your online accounts.This adds an extra layer of security by requiring a second form of verification in addition to your password.


By taking these proactive and reactive steps, you can significantly reduce the potential harm from a phishing scam and better protect yourself from future attacks.