Recover the payments through every channel

    Recovery windows are short — hours for cards, sometimes a day or two for transfers, often nothing for crypto. Open every dispute simultaneously.

    If they also took remote access or codes

    Treat this as a stacked compromise — also follow the remote-access or shared-codes paths in parallel.

    More from Communications Security

    No image

    Confirm the inbox is actively compromised

    Pin down which account, who's been emailed, and which sessions are unfamiliar.

    No image

    Make the next phishing email harmless

    Use a password manager, hardware key and email aliases so a single phish can't cascade.

    No image

    Use specialised victim resources

    Sextortion has dedicated services — they're free, confidential and fast.