Eastern Illinois University Logo
ITS Help Desk |

SELF HELP - PantherMail

ITS Home

I Need Some Help

IT Services

Security Services

Forms

Publications

PantherCard

Technology Initiatives & Investments

Contact Us

How do I know if my PantherMail account has been compromised?

You may have issues when you try to sign in to Microsoft Office 365. Or, you notice that suspicious activity occurs in your account, such as large amounts of spam that originates from your account.
You may also experience one or more of the following issues:
  • The Sent or Deleted Items folders in Microsoft Outlook or in Microsoft Outlook Web App contain common hacked-account messages.
  • Unusual profile changes, such as the name, the telephone number, or the postal code were updated.
  • Unusual credential changes, such as multiple password changes are required.
  • Mail forwarding was recently added.
  • An unusual signature was recently added, such as a fake banking signature or a prescription drug signature.
Even after you've regained access to your account, the attacker may have added back-door entries that enable the attacker to resume control of the account.
You should:
  • Make sure that your computer isn't compromised

    • Make sure that you have Windows Update turned on.

    • Run an antivirus scan to make sure that no malicious software is installed on the computer. 
  • Make sure that the attacker can't log on to your Office 365 account

  • Make sure that the attacker can't resume access to your account

    • Make sure that the Exchange account doesn't auto-forward addresses. For more information, go to the following webpage:Forward messages automatically with a rule

    • Make sure that the Exchange server isn't sending auto-replies. For more information, go to the following webpage:Forward email to another email account

    • Make sure that your contact information, such as telephone numbers and addresses, is correct.

  • Additional precautionary steps
    • Make sure that you verify your sent items. You may have to inform people on your contacts list that your account was compromised. The attacker may have asked them for money, spoofing, for example, that you were stranded in a different country and needed money, or the attacker may send them a virus to also hijack their computers.

    • Any other service that used this Exchange account as its alternative email account may have been compromised. First, perform these steps for your Office 365 subscription, and then perform these steps for your other accounts.