There have been a lot of Google users complaining that their Gmail account has been hacked, even if they had 2FA enabled. One of the users said that their Gmail account got hacked and the hacker changed the recovery email and phone number so how should he get back his account. The good news is that you can still recover your Gmail account even if most of it has been hacked. Google offers a complete process to its users to recover their Gmail accounts even if the whole recovery information has been changed. You just need to follow all the steps thoroughly and wait until the process is complete.
Google offers support named as Securing a Hacked or Compromised account and the first step it states is that you should use a device you have used before to access your Google or Gmail account. It can be on Chrome or Safari and laptop or mobile phone as it can speed up the process for recovering your account. Always answer the questions by Google precisely and if Google asks for your most recent password, always give the one you had before hackers changed it.
You may also receive a message that your account is on security hold. Don’t get frustrated by it and wait until further instructions. Google says that they put an account on security hold depending on different security factors. Even if all of the process fails, if users have their YouTube account functioning normally, they should ask YouTube for support. YouTube can also help users help recover their Google account.
Most users are confused how hackers crack through 2FA and change all of their information. Many info-stealer malware like Meduza, Rhadamanthys, Lumma and Lumar are claiming that they have bypassed Google’s cooking-stealing protection. This means that they can steal the cookies from browsers and use them to bypass 2FA. These hackers have claimed that they can crack 2FA in just 10 minutes. So what does Google suggest to protect users from these attacks?
Google suggests that users should use a safe operating system like ChromeOS which is secure by default and doesn’t have any major vulnerabilities. It is also advised that users use passkeys as they are resistant to phishing and other cyber attacks. It makes them more secure than other forms of security like 2FA and one-time passwords.
Image: DIW-Aigen
Read next:
• Balancing Accuracy and Caution: How Google Handles AI Overviews for Sensitive Subjects
• How To Grow Your Threads Prescence: Meta Reveals Top Tips For Creators
• Criminal Gangs Are Using Telegram To Sell User Data, Buy Malware and Deepfake Software, UN Warns
Google offers support named as Securing a Hacked or Compromised account and the first step it states is that you should use a device you have used before to access your Google or Gmail account. It can be on Chrome or Safari and laptop or mobile phone as it can speed up the process for recovering your account. Always answer the questions by Google precisely and if Google asks for your most recent password, always give the one you had before hackers changed it.
You may also receive a message that your account is on security hold. Don’t get frustrated by it and wait until further instructions. Google says that they put an account on security hold depending on different security factors. Even if all of the process fails, if users have their YouTube account functioning normally, they should ask YouTube for support. YouTube can also help users help recover their Google account.
Most users are confused how hackers crack through 2FA and change all of their information. Many info-stealer malware like Meduza, Rhadamanthys, Lumma and Lumar are claiming that they have bypassed Google’s cooking-stealing protection. This means that they can steal the cookies from browsers and use them to bypass 2FA. These hackers have claimed that they can crack 2FA in just 10 minutes. So what does Google suggest to protect users from these attacks?
Google suggests that users should use a safe operating system like ChromeOS which is secure by default and doesn’t have any major vulnerabilities. It is also advised that users use passkeys as they are resistant to phishing and other cyber attacks. It makes them more secure than other forms of security like 2FA and one-time passwords.
Image: DIW-Aigen
Read next:
• Balancing Accuracy and Caution: How Google Handles AI Overviews for Sensitive Subjects
• How To Grow Your Threads Prescence: Meta Reveals Top Tips For Creators
• Criminal Gangs Are Using Telegram To Sell User Data, Buy Malware and Deepfake Software, UN Warns