Samsung Galaxy · Recovery Guide

    How to Recover and Re-secure a Hacked Samsung Account

    If your Samsung account has been compromised, follow these steps to remove unauthorised access and restore your digital security.

    Step 1: Change Your Samsung Account Password

    The first step to regaining control is to change your password immediately. This will log out any unauthorised users from your account.

    1. Go to the Samsung Account website (developer_placeholder_0account.samsung.com) on a computer or another trusted device.
    2. Click on Sign in and enter your current credentials.
    3. If you cannot sign in, click Find ID or Reset password and follow the instructions to regain access.
    4. Once logged in, navigate to Security and privacy.
    5. Under Password, click Change password and follow the prompts to set a strong, unique password. Use a combination of upper and lower-case letters, numbers, and symbols.
    6. Ensure you log out of all devices when prompted during the password change process.

    Consider using a password manager to generate and store complex passwords securely.

    Step 2: Review and Revoke Device Access

    After securing your password, it's crucial to review all devices and services connected to your Samsung account and revoke access for any unfamiliar entries.

    1. On the Samsung Account website (developer_placeholder_0account.samsung.com), go to Security and privacy.
    2. Select Devices to see a list of all devices logged into your Samsung account.
    3. Look for any devices you don't recognise. For each suspicious device, click Remove to revoke its access.
    4. Next, navigate to Apps and services under Security and privacy. Review any connected apps or services and revoke access for those you don't recognise or no longer use.
    5. Finally, check Signed-in services for any unfamiliar entries and remove them.

    Immediately remove any unfamiliar devices or services, as they could be used by an attacker to regain access.

    Step 3: Enable Two-Step Verification

    Two-step verification adds an extra layer of security, making it much harder for unauthorised individuals to access your account, even if they have your password.

    1. On the Samsung Account website (developer_placeholder_0account.samsung.com), go to Security and privacy.
    2. Under Two-step verification, click Turn on.
    3. You will be given options to receive verification codes via text message (SMS) or an authenticator app. We recommend using an authenticator app for stronger security.
    4. Follow the on-screen instructions to set up your preferred method.
    5. Make sure to save your backup codes in a safe place. These codes can be used to access your account if you lose your primary verification method.

    Using an authenticator app like Google Authenticator provides a more secure two-step verification method than SMS.

    Step 4: Use 'Find My Mobile' to Secure Your Device

    If your device itself might be compromised or lost, Samsung's 'Find My Mobile' service can help you secure it remotely, locate it, or even wipe its data.

    1. Go to the Find My Mobile website (developer_placeholder_0findmymobile.samsung.com) on a computer or another trusted device.
    2. Sign in with your Samsung account credentials.
    3. Select your device from the list on the left-hand side.
    4. If you suspect your device is lost or stolen, you can use options like Lock (to prevent others from accessing it), Erase data (to factory reset the device and delete all personal information), or Back up data (to save your important files before erasing).
    5. For a compromised but still in-use device, consider using the Secure Folder feature on your phone (often found in Settings → Security and privacy → Secure Folder) to protect sensitive apps and data. Knox is built into Samsung devices, providing defence-grade security from the chip up, but for user-level security, the Secure Folder is your primary tool.

    Remember that erasing your device data is irreversible. Only do so if you are certain the device is unrecoverable or severely compromised.

    More from Device Security

    No image

    How to Block Scam Calls and Filter Spam SMS on Android

    How to Block Scam Calls and Filter Spam SMS on Android

    No image

    How to Detect Spyware or Stalkerware on an iPhone

    How to Detect Spyware or Stalkerware on an iPhone

    No image

    How to Stop Apps Spying Through Your iPhone Camera and Microphone

    How to Stop Apps Spying Through Your iPhone Camera and Microphone