Hotmail account hacked: What to do.

Share Article

idcloak publishes HOTMAIL ACCOUNT HACKED: WHAT TO DO. The article is based on a web security researcher’s personal experience in dealing with hacked webmail accounts

Proxy Servers List

Use Proxy Servers List To Find New IP Address To Unblock Websites

On the first occasion, two-thousand dollars was elicited from a benevolent landlord.

idcloak’s Knowledge Center publishes– Hotmail account hacked: What to do – a new, three-part article which recommends an immediate course of action to users of Microsoft who have suffered a security breach.

The author of the article, Robin Welles, idcloak’s security researcher, explains her inspiration, “I wrote this piece shortly after a good friend suffered a hacked email account. It surprised me how little quality advice he was able to find on how to tackle the problem. Even the provider’s helpdesk told him nothing more than to change his password: apparently a standard response. Needless to say, this didn’t work, as whatever means the hacker used to breach the security the first time was just redeployed to break in again. I helped recover access to the account and secure it (see Part III: Aftermath of email hacking) but felt an article detailing the course of action might benefit others facing a similar predicament.”

Web-based email is commonly hacked as a result of brute-force passwords attacks, spyware keyloggers and cookie sidejacking over public WiFi networks.

Welles says hackers’ motivations for breaking into webmail vary, but more often than not they are looking for monetary gain. “A common event that follows a webmail hack is that all contacts are sent a phishing email saying the owner of the email account is in some kind of trouble. They are asked to wire money as a temporary loan. This form of attack in fact happened to two of my family members over the space of one year. On the first occasion, two-thousand dollars was elicited from a benevolent landlord. You’d be surprised there are still people out there who fall for this stuff.”

In addition to recommending a procedure to deal with webmail hacks, the article also recommends web encryption and anonymity services in case the hack is part of a targeted campaign against the user.

The most powerful of these services, the idcloak VPN, is due for release in September 2013. To learn how a VPN can be used alongside other measures to protect your internet against hackers, Welles recommends reading: VPN services.
idcloak Technologies is a Dallas-based developer of web security and anonymity proxies. Learn more at

Share article on social media or email:

View article via:

Pdf Print

Contact Author

Gill-Chris Welles
Follow us on
Visit website