Disconnect from networks, change passwords on known-good devices, and end active sessions. Notify support quickly with concise facts, not guesses. Preserve suspicious messages for analysis. Acting methodically converts fear into momentum and limits the attacker’s window to exploit mistakes.
Reset credentials, enable stronger factors, and check account logs for unfamiliar activity. Inform financial institutions and relevant contacts to expect potential follow-ups. Early transparency prevents cascading damage and replaces rumors with coordinated, respectful, and effective cooperative defense across teams or families.
Forward phishing samples to official abuse addresses, national reporting portals, or your organization’s security inbox. Use built-in reporting tools from your email provider. Sharing intelligence disrupts campaigns, improves filters, and supports accountability without blaming victims for honest, understandable mistakes under pressure.
All Rights Reserved.