X (Twitter) account hacked: what to do first and how recovery really works
X (formerly Twitter) is a public platform where a takeover is immediately visible: posts in your name, cryptocurrency scams, offensive content, or phishing links via DM. Attackers can also gain access not just through passwords but through connected third-party apps (OAuth).
A Twitter account takeover can be used not just to control your account, but to deceive your audience—the platform may also suspend your account due to the attacker's content.
Common takeover methods on X
Warning signs
- Tweets, likes, or DMs you did not send
- New devices in security settings
- Email or phone changed
- Unexpected subscription or payment changes
If you still have access
Change your password, open Apps and sessions and log out of unknown devices, confirm email and phone, and turn on 2FA with SMS if that is easiest for you. Review connected apps with post access.
If you are locked out
Start from the login screen’s password reset on x.com or the official app. If the attacker changed the email, prior security notifications to your old inbox may still help. Follow only in-app flows—support impersonators are common on X itself.
Reputation and scam DMs
Preventing another takeover
Use a unique password, keep email secured, and avoid browser extensions that read page content on social sites. Leaked passwords should be changed everywhere they were reused.
When recovery is stuck
Automated systems can deadlock when factors conflict. If you have a business need or repeated failures, RelyShield account recovery can map the next best steps.
X account compromised—is your audience safe?
If your Twitter account was compromised, it's important not just to regain access but to stop potential damage to your reputation and audience as quickly as possible. We help when email, phone, and platform recovery don't align.
Frequently asked questions
- Can I recover X without email access?
- It is harder. You may need phone-based recovery or X’s identity flows. Securing or recovering the email remains important long term.
- Why did my username change?
- Attackers sometimes swap handles to sell them or to hide traces. Check support options for handle disputes after you prove ownership.
- Are “Twitter support” accounts in DMs real?
- Almost never. Real notices usually arrive via email or in-app system messages, not random DMs asking for fees.
- Should I delete the account?
- Usually recover first; deletion can erase evidence and sometimes makes reclaiming your brand harder.
- Does 2FA stop all hacks?
- It stops most credential-based takeovers. You still need safe email and awareness of phishing that tries to steal codes.