Email / System Hacked
Your email account or other systems (Wifi, security camera, baby monitor, personal assistants, gaming systems) have been taken over by a fraudster with the intent of gaining access to contacts, applications, systems or personal information.
The more national reporting data that’s collected, the better the chance law enforcement has to catch the criminals and decrease online crime. Reporting a fraudulent incident will also assure that you have accurate documentation in order to aid in your recovery. Please consider reporting your incident or chat with an online support specialist at the FTC Complaint Assistant. The FTC will create a report number and a copy of the report for your records.
The more national reporting data that’s collected, the better the chance law enforcement has to catch the criminals and decrease online crime. Reporting a fraudulent incident will also assure that you have accurate documentation in order to aid in your recovery. Please consider reporting your incident to the FBI Internet Crime Complaint Center (IC3).
Once processed, complaints filed via their website may be referred to federal, state, local, or international law enforcement or regulatory agencies for possible investigation. Any investigation opened on any complaint is initiated at the discretion of the law enforcement and/or regulatory agency receiving the complaint information. Reporting the incident at IC3 will not result in a call back for assistance.
The following resources have been gathered and vetted in order to better serve you. These resources have been chosen to help simplify the process of recovery after a cyber incident has taken place. With these resources you may need to contact organizations outside Fraudsupport.org. Results will vary depending on your circumstances.
What to Do Internet Account Takeover – Email Accounts and Social Networking Sites by Identity Theft Resource Center
Once the proper organizations have been notified and you are on the road to recovery, it is time to reinforce your cybersecurity. Let’s take action and strengthen your cybersecurity with the following resources and tools.
Add Two-Factor Authentication to key accounts and follow other security tips at LockDownYourLogin.org
How to check if someone is remotely accessing your computer? Click Here
How do you know if you have Malware? Click Here
How to check if your email has been hacked? Click Here
Information for Seniors
The FTC Data Breach Guide for Business (Tips Work for Individuals Too)