When You Get Hacked: AI-Assisted Response
Even careful people get hacked. A password leaks, a scam succeeds, a device is lost. The difference between a scare and a disaster is how you respond in the first hour. Panic makes things worse; a calm checklist makes things recoverable. In this lesson you will build that checklist — and learn how AI can be your level-headed first responder when adrenaline is high.
What You'll Learn
- How to recognize the signs that an account or device is compromised
- The immediate first steps that contain the damage
- How to use AI to generate a calm, ordered incident-response plan
- How to recover and harden so it does not happen again
Recognize the Warning Signs
You cannot respond to what you do not notice. Common signs of compromise:
- You are suddenly logged out, or your password no longer works.
- Friends receive messages or friend requests you did not send.
- You see logins, purchases, or password-reset emails you did not initiate.
- Your device is slow, hot, full of pop-ups, or has unfamiliar apps.
- Your phone loses signal unexpectedly (a possible sign of a SIM-swap).
- A ransom message demands payment to unlock your files.
If you spot these, treat it as real. It is far better to over-react to a false alarm than to ignore a genuine breach.
The First Hour: Contain the Damage
Speed matters, but order matters more. The general priorities:
- Secure your email first. It can reset everything else. Change its password and check its recovery settings and forwarding rules — attackers often add a secret forwarding address.
- Change the password on the affected account, and anywhere you reused it.
- Enable or re-check MFA on the affected accounts.
- Sign out all other sessions / devices using the account's "log out everywhere" option.
- Tell the people who matter. Warn contacts not to trust messages from you; notify your bank if money or cards are involved.
- Disconnect a compromised device from the internet if you suspect malware or ransomware, then run a reputable scan.
- Document what happened — dates, what you saw, what you did — for the bank, platform, or police report.
Notice what is not on the list: never pay a ransomware demand without expert advice, and never act on the contact details inside a suspicious message.
Let AI Be Your Calm First Responder
When you are stressed, a clear ordered plan is worth its weight in gold. AI excels at producing exactly that. Open ChatGPT or Claude and describe the situation (without pasting passwords):
I think my [Instagram / email / bank] account has been hacked. I noticed [describe what you saw]. Act as an incident-response coach. Give me a calm, prioritized, numbered checklist of what to do right now to contain the damage and recover the account. Assume I am a beginner and tell me what to do first.
The AI returns a focused, step-by-step plan — exactly what a panicking brain cannot generate on its own. Follow up with "What should I do once I am back in control to make sure this does not happen again?"
For platform-specific recovery, use Perplexity to find the official process with sources:
What is the official process to recover a hacked Instagram account, and what is the official support URL? Cite sources.
This keeps you on legitimate recovery pages instead of fake "account recovery" scams that prey on hacked users.
Recover and Harden
Containment is step one; making sure it never recurs is step two. After the immediate crisis:
- Run a full malware scan and update everything if a device was involved.
- Review account activity and connected apps, revoking anything unfamiliar.
- Rotate any password you reused anywhere — the breach may have exposed it.
- Turn on stronger MFA (authenticator app or passkey instead of SMS).
- Set up monitoring: breach alerts, bank transaction alerts, and login notifications.
Ask AI for an after-action review:
I recovered my hacked account. Act as a security coach and give me a checklist to make sure I am fully secure now and to prevent this in the future. Include what to monitor going forward.
A Quick Hands-On Exercise
Do not wait for a real incident to think about this. Run a fire drill now. Pick your most important account and ask ChatGPT: "Create a one-page incident-response plan for if my [account] gets hacked, with a numbered first-hour checklist and the official recovery link." Save it somewhere you can reach even if you are locked out — a printed note or a separate device. Preparing calm in advance is what turns a future disaster into a future inconvenience.
Your Homework for This Lesson
Generate and save incident-response plans for your two most important accounts (email and banking). Store them somewhere accessible offline. Also enable login and transaction alerts on both so you find out about a breach early — when response is easiest.
Key Takeaways
- Learn the warning signs of compromise and treat them as real; over-reacting beats ignoring a breach.
- In the first hour, secure your email first, then change passwords, enable MFA, sign out all sessions, and warn contacts.
- AI is an excellent calm first responder — it produces the ordered checklist a stressed brain cannot.
- Use Perplexity to find official recovery pages and avoid fake "recovery" scams that target hacked users.
- After recovering, harden everything and set up monitoring; prepare your incident plan before you ever need it.

