Share via

M365 Account hacked

Karthik S 0 Reputation points
2026-04-08T07:11:19.2866667+00:00

My tenant has been fully compromised by an unauthorized attacker. The attacker has performed the following actions:

  • Created a new Global Administrator account
  • Removed all legitimate admin privileges from our accounts
  • Modified recovery email and security information
  • Potentially gained access to sensitive organizational data

As a result, we currently have no Global Administrator access to our Microsoft 365 environment.

Microsoft Security | Microsoft Entra | Microsoft Entra ID

1 answer

Sort by: Most helpful
  1. Q&A Assist
    2026-04-08T07:11:42.36+00:00
    AI generated content. This question contains an answer created with AI from Q&A Assist. Learn more

    Immediate recovery of a fully compromised Microsoft 365 tenant with no remaining Global Administrator access cannot be performed by standard admin or self-service tools. When all legitimate admin roles are removed and security info is changed, recovery must go through Microsoft’s official account-compromise and account-recovery processes.

    Follow these steps from a safe, malware-free device and network:

    1. For any affected individual Microsoft accounts (personal accounts used as sign-in IDs or break-glass accounts), follow the hacked/compromised Microsoft account recovery flow and guidance in:
      • "How to recover a hacked or compromised Microsoft account" – including:
        • Step 1: Clear devices of malware first using an up-to-date antivirus (for Windows 10/11 or 8.1, enable and run Windows Defender for a full scan).
        • Step 2: Change or reset passwords using the official reset flow.
        • Step 3: Review account settings such as connected accounts, forwarding, and automatic replies to remove attacker changes.
    2. For any cloud-only or synced user accounts that are still accessible:
      • Reset passwords immediately (for synced accounts, reset in on-premises Active Directory and, if applicable, reset twice to mitigate pass-the-hash risk using Set-ADAccountPassword).
      • Update or delete app passwords because they are not automatically revoked when passwords are reset.
      • Enable and enforce multifactor authentication (MFA) on all recovered accounts, prioritizing any accounts that will hold admin roles.
    3. For each account that can still sign in and is suspected of compromise:
      • Revoke active sessions using Microsoft Graph PowerShell as documented in "Respond to a compromised cloud email account" (for example, using Revoke-MgUserSignInSession -UserId <UPN> after connecting with Connect-MgGraph -Scopes User.RevokeSessions.All).
      • Review and clean up:
        • MFA registered devices and methods; remove any unrecognized devices or methods.
        • Applications with user consent; revoke any suspicious or unnecessary app permissions.
        • Mailbox forwarding rules and inbox rules; remove any attacker-created forwarding or exfiltration rules.
    4. Once at least one trusted account is recovered and can be elevated again by Microsoft (through support), re-establish secure admin practices as described in "Admin account security in Microsoft 365 for business":
      • Maintain at least two emergency access (“break glass”) admin accounts that are:
        • Dedicated to emergencies only.
        • Excluded from MFA policies but protected with long, complex passwords (16+ characters).
      • Apply least-privilege principles for all other admin roles; avoid using Global Administrator except when strictly necessary.
    5. If the attacker has changed all security information and removed all legitimate admin roles, and the self-service recovery and account recovery forms fail, tenant recovery is no longer possible through normal admin actions. In that case, the only remaining path is:
      • Use the official Microsoft account recovery and hacked-account support flows referenced in the Q&A excerpts (account.live.com/acsr and related support entry points) from a trusted device and network, providing as much historical and billing/tenant ownership information as possible.
      • If those automated and support-driven recovery processes do not restore control, the tenant is considered unrecoverable per the referenced Microsoft Q&A guidance, and a new tenant with hardened admin and security practices must be created.

    After any level of access is restored, perform a full compromise response across the tenant using the guidance in "Respond to a compromised cloud email account": reset passwords, revoke sessions, review MFA methods, app consents, admin roles, and mail forwarders, and enable MFA broadly.


    References:

    0 comments No comments

Your answer

Answers can be marked as 'Accepted' by the question author and 'Recommended' by moderators, which helps users know the answer solved the author's problem.