To stop a hacker-generated draft email and secure an Outlook.com account, perform a full cleanup of rules, forwarding, sessions, and app access, then secure the account and devices.
- Remove malicious rules and forwarding
- Sign in to Outlook on the web.
- Go to Settings → Mail → Rules and delete any suspicious rules (for example, rules that move mail, create drafts, or reference strange names like “Demon”).
- Go to Settings → Mail → Forwarding and remove any forwarding address that is not recognized.
- End active sessions and revoke app access
- Go to the Microsoft account recent activity page at
https://account.live.com/activity to see where and when the account was accessed. If unknown locations or devices appear, mark them as “This wasn’t me” where available.
- Use the Microsoft account security options to sign out everywhere so any active hacker sessions are terminated.
- Open Manage app permissions for the Microsoft account and revoke any apps or add-ins that are not recognized; attackers often use these to maintain access.
- Check for additional attack mechanisms (if using Microsoft 365/Exchange Online)
If the account is part of a Microsoft 365 subscription and there is admin access:
- In the Exchange admin center, go to Mail flow → Rules and look for suspicious rules that might auto-forward or manipulate messages; disable or delete them.
- Use PowerShell commands such as
Get-InboxRule -Mailbox youraddress@example.com (run by an admin) to detect hidden or unusual inbox rules and remove them.
- Secure the account
- Change the account password again to a strong, unique password after cleaning rules and sessions.
- Ensure multi-factor authentication (MFA) is enabled and configured with trusted devices only.
- Add or update alternate email and phone information so the account can be recovered if compromised again.
- Protect devices and watch for further activity
- Run a full antivirus scan on all devices used to access the account and ensure operating systems are fully updated.
- Monitor the recent activity page regularly for unusual sign-ins.
- Inform contacts that the account was compromised so they can ignore suspicious messages.
If access to the account is already lost (for example, the hacker changed security info and enabled an authenticator), use the official account recovery and hacked account guidance to attempt to regain control and remove attacker-added aliases or security info once access is restored.
References: