What To Do Now

I Entered My Password on a Fake Site

If you typed login details into a phishing page, speed matters. Here is a practical recovery order.

  • Phishing
  • Account recovery

Updated 2026-03-27

Example of a fake login or suspicious link

In plain words

If this just happened, start at the top and do each step in order. You do not need to solve everything at once.

Stay calm first

If you typed login details into a phishing page, speed matters. Here is a practical recovery order.

What the risk depends on

Risk is highest when the password is reused across services or when the attacker also captured MFA prompts.

First 5 minutes priority order

  1. Contain the risk: stop interaction, close suspicious pages, disconnect if needed.
  2. Secure exposed accounts: reset login details from trusted links and sign out unknown sessions.
  3. Protect payments: lock cards or contact provider if payment data may be exposed.
  4. Document and notify: save evidence and contact relevant support channels.

Immediate steps

  1. Change the affected account password immediately from the official app/site.
  2. Sign out all active sessions and revoke unknown devices.
  3. Rotate reused passwords on any other accounts.
  4. Check recovery email/phone settings for unauthorized changes.

Priority order

  1. Primary account first (email, identity providers, banking).
  2. Then dependent accounts that rely on that email.
  3. Then social and commerce accounts.
  4. Finally, less critical services.

Who to contact

If this affected a work account, notify your security or IT team immediately. For financial accounts, call support using known phone numbers.

What to monitor

  • New forwarding rules in email
  • Unexpected MFA prompts
  • Password reset notifications
  • Changes to billing or shipping addresses

Prevention for next time

Use a password manager, unique login details per site, and phishing-resistant MFA where available.

Important: Fast containment beats perfect certainty. Start with reversible safety steps now.