Back to Blog

How to Recover a Hacked Twitter/X Account (2026)

twittersecurityhacked
How to Recover a Hacked Twitter/X Account (2026)

How to Recover a Hacked Twitter Account

If your Twitter account got hacked, act fast. Every minute a hacker has access, they can change your email, enable their own two-factor authentication, follow spam accounts, send malicious DMs to your followers, and damage your reputation. The good news: most hacked X accounts are recoverable if you follow the right steps.

Phishing attacks targeting X accounts surged in 2025–2026, with sophisticated campaigns impersonating X's verification emails and Premium subscription notices. Here's exactly how to recover your account and lock it down.

Signs Your X Account Has Been Hacked

Before starting recovery, confirm the hack. Common signs:

  • You can't log in — your password was changed
  • Unexpected tweets or DMs — posts you didn't write, especially spam links or crypto scams
  • Email/phone changed — you received a notification that your contact info was updated
  • New follows — your account is suddenly following hundreds of accounts you don't recognize
  • Missing followers — the hacker blocked or removed your real followers
  • Profile changes — new bio, profile picture, display name, or header image
  • Connected apps you don't recognize — unauthorized third-party access
  • Login alerts from unknown locations — email notifications about sign-ins from unfamiliar IPs

Step-by-Step Recovery

Step 1: Try Resetting Your Password

If you still have access to your email:

  1. Go to x.comLog inForgot password?
  2. Enter your email, phone number, or username
  3. Choose how to receive the reset code (email or SMS)
  4. Enter the code, set a new strong password
  5. Log in immediately

If this works, skip to Step 4 (Secure Your Account). If the hacker changed your email, continue to Step 2.

Step 2: Use the Identity Verification Form

If you can't reset via email because the hacker changed it:

  1. Go to help.x.comI need login and account supportI need to regain access to my account
  2. Fill out the form with:
    • Your original email address
    • Your phone number (if it was linked)
    • Your username (@handle)
    • When you last had access
    • Description of what happened
  3. X may ask for a government ID to verify ownership
  4. Response time: 24–72 hours for Premium accounts, 1–3 weeks for free accounts

Step 3: Check Connected Email Account

Often, hackers first compromise your email, then use it to access X:

  1. Check your email account's security — change your email password immediately
  2. Look for password reset emails from X that you didn't request
  3. Check your email's "sent" folder for messages the hacker may have sent
  4. Review your email's login history for unfamiliar access
  5. Enable 2FA on your email if you haven't already

If your email was compromised, recover it FIRST, then use it to reset your X password.

Step 4: Secure Your Account (Post-Recovery)

Once you're back in, lock everything down immediately:

Change Your Password

  • Use a strong, unique password — at least 12 characters with mixed case, numbers, and symbols
  • Don't reuse passwords from other accounts
  • Consider a password manager (1Password, Bitwarden)

Enable Two-Factor Authentication

  1. Go to Settings → Security and account access → Security → Two-factor authentication
  2. Choose your method:
    • Authentication app (recommended) — Google Authenticator, Authy, or 1Password
    • Security key (most secure) — hardware key like YubiKey
    • SMS (least secure) — better than nothing, but vulnerable to SIM-swap attacks
  3. Save your backup codes in a secure location

Review and Update Email

  1. Settings → Your account → Account information → Email
  2. Confirm your email is correct (hacker may have changed it)
  3. Make sure your email itself has 2FA enabled

Revoke All Third-Party Access

  1. Settings → Security and account access → Apps and sessions → Connected apps
  2. Revoke access for ALL apps — reconnect only the ones you trust later
  3. Check Sessions and log out of all devices you don't recognize

Review Login Activity

  1. Settings → Security and account access → Apps and sessions → Account access history
  2. Look for logins from unfamiliar locations or devices
  3. Note the times — this helps you understand the timeline of the hack

Step 5: Clean Up the Damage

After securing your account, undo what the hacker did:

Delete Unauthorized Tweets and DMs

  • Remove any spam tweets the hacker posted
  • Check your DMs — hackers often send phishing links to your contacts
  • Consider posting a tweet informing your followers about the hack
  • If your account was suspended during the hack, see our guide on how to get unsuspended

Audit Your Following List

Hackers often follow hundreds of spam or bot accounts to inflate those accounts' numbers. Use Unfollr to:

  • Compare your current following list against a previous snapshot
  • Identify accounts you're now following that you don't recognize
  • Check if your follower count dropped — the hacker may have blocked real followers
  • Track any ongoing unfollows from followers who saw the spam and left

Restore Profile Information

  • Check and fix your display name, bio, profile picture, header image, and website link
  • Verify your birthday, location, and other profile details
  • Check your privacy settings — hackers sometimes make private accounts public or vice versa (privacy settings guide)
  • Follow our full account cleanup guide to restore your account to a healthy state

Common Hack Methods in 2026

Understanding how accounts get hacked helps you prevent future attacks:

Phishing Emails

The most common method. Fake emails that look like they're from X, asking you to:

  • "Verify your account" via a fake login page
  • "Update your Premium subscription" billing info
  • "Review a login attempt" through a spoofed security alert

How to spot them: Check the sender's actual email address (hover over it). Real X emails come from @x.com domains. Never click links in emails — go directly to x.com in your browser.

SIM-Swap Attacks

Attackers convince your phone carrier to transfer your number to their SIM card, then use SMS-based 2FA to access your account.

Prevention: Use an authenticator app instead of SMS for 2FA. Contact your carrier to add a PIN to your account.

Credential Stuffing

Hackers use leaked passwords from other data breaches to try logging into X. If you reuse passwords, you're vulnerable.

Prevention: Use unique passwords for every account. Check if your credentials were leaked at haveibeenpwned.com.

Malicious Third-Party Apps

Some apps request X permissions that are broader than needed, then use that access to hijack your account.

Prevention: Only connect apps you trust. Review permissions carefully — does a follower tracker really need "write" access? Read-only tools like Unfollr are safer because they don't require permissions to modify your account.

Session Hijacking

Attackers steal your active session token through malware, public Wi-Fi attacks, or browser extensions.

Prevention: Avoid logging into X on public Wi-Fi without a VPN. Don't install unknown browser extensions. Regularly review and end active sessions.

Prevention Checklist

Protect your account before it gets hacked:

Action Priority Status
Enable 2FA (authenticator app) Critical
Use a unique, strong password Critical
Remove unnecessary connected apps High
Enable email 2FA High
Check haveibeenpwned.com Medium
Add PIN to phone carrier account Medium
Review login activity monthly Medium
Use a password manager Recommended
Avoid logging in on public Wi-Fi Recommended

What to Do If Recovery Fails

If X hasn't responded to your appeal or denied it:

  1. Submit a new appeal after 30 days with additional evidence of ownership
  2. Contact X support on other channels — try @XSupport on a different account
  3. If you have X Premium, mention your subscription in the appeal — Premium accounts get priority support
  4. Document everything — screenshots of original account activity, emails from X, and proof of identity
  5. As a last resort, report the hacked account as impersonating you from a new account

FAQ

How long does it take to recover a hacked Twitter account?

If you can reset your password via email, recovery takes minutes. If you need X's identity verification process, expect 24–72 hours for Premium accounts and 1–3 weeks for free accounts.

Can I recover my account if the hacker changed the email and phone number?

Yes, but it requires X's identity verification process. You'll need to provide your original email, username, and potentially a government ID. Go to help.x.com and file a recovery request.

Will I lose my followers if my account is hacked?

Not permanently. Your follower list is preserved even during a hack. However, some followers may unfollow if they see spam posted from your account. Use Unfollr after recovery to check who left and track your follower restoration.

Should I create a new account if I can't recover the old one?

Only as a last resort. First, report the hacked account to X so it can be suspended (preventing further damage). Then create a new account and inform your community through other channels.

How do I know if a recovery email from X is real?

Real X emails come from @x.com domains. They'll never ask for your password directly in the email. When in doubt, don't click links — go to x.com directly in your browser and navigate to your settings.

Can hackers access my DMs?

Yes. If a hacker has access to your account, they can read all your DMs, including those marked as "confidential." This is why acting fast to secure your account is critical.

Final Thoughts

A hacked Twitter account is stressful but recoverable in most cases. Act fast — reset your password, enable 2FA, revoke unauthorized apps, and clean up the damage. The best defense is prevention: unique passwords, authenticator-based 2FA, and minimal third-party app connections.

After recovery, use Unfollr to audit the damage — check who the hacker followed, track any followers you lost, and monitor your account health as you rebuild trust with your audience.