Lock down the device and phone number
Use the operating system's lost-device tools, contact the carrier if the SIM could be abused, and protect the email account that receives recovery messages. A stolen phone number can weaken SMS-based recovery.
Recover high-value accounts first
Prioritize email, password manager, domain registrar, cloud provider, finance, social media, and developer accounts. Use backup codes, passkeys, security keys, or official recovery forms according to each platform.
Rotate after the incident
After access is restored, remove the lost device from trusted-device lists, regenerate backup codes, rebind the authenticator, and review sign-in history for unexpected sessions.
Recovery actions
- Mark the device lost or stolen using iOS or Android device tools.
- Secure the primary email account and password manager first.
- Use backup codes for the accounts that offer them.
- Regenerate recovery codes and revoke old sessions after regaining access.
Important limits
- If the phone was stolen unlocked, assume visible authenticator entries and saved sessions may be exposed.
- SMS fallback can be attacked through carrier or SIM-swap abuse.
- Do not approve push prompts you did not initiate while recovering accounts.