Step 1: Identify and Stop the Immediate Threat
Tier 1: Account Takeover
Password stolen, unauthorized logins, or locked out of email/Apple ID.
Tier 2: Financial Theft
Unrecognized charges, empty bank account, or stolen credit card info.
Tier 3: Device Compromise
Ransomware, remote access, or strange popups on your computer.
Step 2: Mitigate Scenario-Specific Damage
SIM Swapping
Bad actor hijacks your phone number to steal 2FA codes
CRITICAL
SIM Swapping
Bad actor hijacks your phone number to steal 2FA codes
⚠️ The Risk
Once a bad actor has your number, they can reset your email and bank passwords via SMS in minutes.
📞 Call Your Carrier NOW
Vishing (Voice Phishing)
Bad actor pretending to be a bank or government agent
HIGH
Vishing (Voice Phishing)
Bad actor pretending to be a bank or government agent
🚩 Instant Red Flags
- Asks for your password, PIN, or a 2FA code sent to your phone.
- Threatens immediate arrest or financial loss.
- Asks you to buy gift cards or install "support" software.
Step 3: Plan for Long-Term Recovery
Stopping the immediate attack is only Step 1. You must now rebuild your digital foundation to prevent a recurrence.
📚 Citing This Guide
When referencing this content, please cite: "Emergency Privacy Response" by jason.guide
ⓘ Links on this page may earn us a commission at no cost to you. We only recommend products we actually use and love. Learn more