Step 1: Disconnect from the Internet (If Malware Is Suspected)
If you think the link may have downloaded malware to your device:
- Turn off WiFi on your device
- Unplug your ethernet cable if connected by wire
- This prevents malware from communicating with remote servers or spreading to other devices
Skip this step if you only visited a fake login page but didn't download anything.
Step 2: Don't Enter Any Information
If the link took you to a page asking for login credentials, payment info, or personal details:
- Close the page immediately — don't enter anything
- If you already entered information, proceed to the next steps urgently
Step 3: Change Your Passwords
If you entered any credentials on the phishing page, change those passwords immediately:
- Go directly to the real website by typing the address manually (don't use links)
- Change your password for that account
- Change passwords on any other accounts that use the same or similar password
- Use strong, unique passwords — consider using a password manager
Priority Accounts to Secure
- Email — attackers can use this to reset other passwords
- Banking and financial — protect your money
- Social media — prevent attackers from impersonating you
- Work/company accounts — protect your employer and colleagues
Step 4: Enable Two-Factor Authentication
Add an extra layer of security to your important accounts:
- Use an authenticator app (like Google Authenticator or Authy) rather than SMS when possible
- Prioritize email, banking, and social media accounts
- This makes it much harder for attackers to access accounts even with your password
Step 5: Scan for Malware
Run a full security scan on your device:
On Windows
- Use Windows Security (built-in) to run a full scan
- Consider running additional scans with Malwarebytes (free version available)
On Mac
- Macs have built-in protection, but consider using Malwarebytes for Mac for extra safety
- Check for any unfamiliar applications installed recently
On Mobile
- iPhone: iOS is generally secure; update to the latest version and remove any suspicious apps
- Android: Use Google Play Protect and consider a reputable security app
Step 6: Check Your Accounts for Suspicious Activity
Look for signs that your accounts may have been accessed:
- Check email sent folders for messages you didn't send
- Review bank and credit card transactions
- Look for password reset emails you didn't request
- Check social media for posts or messages you didn't create
- Review login history (most services show recent logins in settings)
Step 7: Report the Phishing Attack
Help prevent others from falling victim:
- Report to your email provider — mark as phishing/spam
- Report to the impersonated company — most have abuse@company.com addresses
- Report to authorities — In the US, report to the FTC at ReportFraud.ftc.gov
- Forward to us — Send the original email
to
check@isthismailsafe.comso we can warn others
If Financial Information Was Compromised
- Call your bank immediately using the number on your card (not from the email)
- Report your card as compromised and request a new one
- Monitor your accounts closely for the next several months
- Consider placing a fraud alert or credit freeze with credit bureaus
If You Downloaded a File
Malicious downloads are more serious than just visiting a phishing page:
- Don't open the file if you haven't already
- Delete the file immediately
- Empty your trash/recycle bin
- Run a full malware scan
- If you opened the file, consider having a professional examine your device
Long-Term Protection
After the immediate crisis is handled, take steps to protect yourself going forward:
- Use a password manager to create unique passwords for every account
- Enable 2FA everywhere it's available
- Keep software updated — updates often include security patches
- Be more skeptical of unexpected emails, even from known senders
- Bookmark our service — forward
suspicious emails to
check@isthismailsafe.combefore clicking
Don't Beat Yourself Up
Phishing attacks are sophisticated, and even security professionals sometimes fall for them. What matters is how quickly you respond. By following these steps, you've done everything you can to minimize the damage.
Use this as a learning experience: you'll be more cautious in the future, and now you know exactly what to do if it happens again.