What To Do If You Clicked a Suspicious Link

Digital Privacy & Online ScamsEditorial Team·November 21, 2025·9 min read·Updated Apr 2026
This article is for informational purposes only and does not constitute legal, financial, or professional advice. Information may be outdated or inaccurate. Always consult a qualified professional or government agency before acting on anything you read here. If you find any inaccuracies, please contact us so we can update it.

Quick Answer

Clicked a suspicious link? Do these 5 things immediately: (1) Don't enter any information on the page that opened. (2) Close the browser and disconnect from the internet. (3) Run a full security scan. (4) Change passwords for any accounts you use on that device. (5) Monitor your accounts for unusual activity. The steps below explain exactly how to do each one.

It happens to careful people all the time. A text that looks like a shipping notification. An email that appears to be from your bank. A social media message from a friend whose account was already compromised. One click before you notice something feels off.

The good news: clicking a suspicious link does not automatically mean your device is infected or your accounts are compromised. What matters most is what you do in the next few minutes.

This guide walks you through every step, including specific guidance from the Cybersecurity & Infrastructure Security Agency (CISA) on what to do depending on whether you entered any information or not.

Not every suspicious link causes the same type of harm. The risk depends on the type of link, your device, and whether you took any action on the page.

What the Link DoesHow It WorksRisk Level
Opens a phishing websiteFake login page that captures your credentials if you enter themHigh if you log in; Low if you close immediately
Drive-by malware downloadExploits browser vulnerabilities to install software automaticallyMedium, rare on updated browsers
Tracking pixel / data collectionCollects your IP address, device info, locationLow, no immediate account risk
Ransomware downloadLocks your files and demands paymentHigh, requires downloading and running a file
Credential harvesting formFake "verify your account" pageHigh if you submit; Low if you close

The most important thing to understand: if you clicked but did not enter any information and did not download anything, your risk is significantly lower. CISA specifically addresses this scenario, see the FAQ section below.

Immediate Steps: What to Do Right Now

Work through these steps in order. Speed matters, but don't skip steps.

Step 1: Stop, Do Not Enter Anything

If a website opened after you clicked the link:

  • Do not enter any username, password, or personal information
  • Do not download anything the site suggests
  • Do not click "Allow" on any pop-up permission requests (especially microphone, camera, notifications)
  • Do not call any phone number displayed on the page

Close the tab immediately. If the browser window is frozen or difficult to close, force-quit the entire browser application.

Step 2: Disconnect from the Internet

This single step can stop malware from communicating outward, prevent further downloads, and block attackers from accessing your device remotely.

DeviceHow to Disconnect
Windows PCClick Wi-Fi icon in taskbar → Turn off, or unplug ethernet cable
MacApple menu → System Preferences → Network → Turn Wi-Fi off
iPhone / iPadSettings → Airplane Mode → On
AndroidSettings → Network → Turn on Airplane Mode
Work laptopContact your IT department before doing anything else

Keep the device offline until you finish the security scan in Step 4.

Step 3: Take Screenshots Before Closing Everything

Before you close everything down, take screenshots of:

  • The suspicious message or email that contained the link
  • The website that opened, if visible
  • Any pop-ups or error messages

You will need these if you file a report with the FTC or your bank later.

Step 4: Run a Full Security Scan

On Windows:

  1. Search for "Windows Security" in the Start menu
  2. Click "Virus & threat protection"
  3. Click "Scan options"
  4. Select "Full scan", not Quick scan
  5. Click "Scan now" (this takes 30–60 minutes)

On Mac: macOS does not include built-in antivirus. Download Malwarebytes for Mac (free version available), install it, and run a full scan.

On iPhone or iPad: iPhones are sandboxed and do not get traditional malware from clicking a link. Your main risk is phishing, entering information on a fake site. If you did not enter any information, your device is almost certainly fine. Delete the suspicious message and move to Step 5.

On Android:

  1. Open Google Play Protect (Play Store → Menu → Play Protect)
  2. Tap "Scan" to run a check
  3. Or download Malwarebytes for Android and run a full scan

Step 5: Change Your Passwords

Even if the scan comes back clean, change passwords for the following accounts from a different, trusted device:

  • Email accounts (Gmail, Outlook, Yahoo)
  • Banking and financial accounts
  • Any account you were logged into on that device
  • Any account where you use the same password as your email

Use a different device because if your original device is compromised, changing passwords on it gives the attacker the new credentials too.

After changing passwords, enable two-factor authentication (2FA) on every account that supports it. CISA and the FTC both recommend 2FA as the most effective step you can take after a phishing incident.

Did You Enter Information? Here Is What to Do Next

The actions below depend on what, if anything, you typed into the page that opened.

Scenario A: You Clicked But Did Not Enter Anything

This is the most common outcome. CISA guidance is clear: if you clicked a phishing link but did not enter credentials or download anything, your immediate risk is low. Still complete Steps 1–5 above as a precaution. No need to contact your bank or freeze accounts unless the scan finds something.

Scenario B: You Entered a Password

Act immediately:

  1. Change that password on every site where you use it, from a different device
  2. Contact the company whose login page was faked (your bank, Google, Amazon, etc.)
  3. Check your account's recent login history for access from unfamiliar locations
  4. Enable 2FA on the affected accounts
  5. Report the phishing page to the FTC at ReportFraud.ftc.gov

Scenario C: You Entered Financial Information (Card Number, Bank Account)

Contact your bank or card issuer immediately using the number on the back of your card. Tell them what happened. Ask them to:

  • Flag your account for suspicious transactions
  • Issue a new card number
  • Block any unauthorized charges

Also place a fraud alert with the three credit bureaus (Equifax, Experian, TransUnion). A fraud alert is free and requires lenders to verify your identity before opening new credit in your name.

Scenario D: You Downloaded and Opened a File

This is the highest-risk scenario. A file that ran on your device may have installed malware.

  1. Disconnect immediately (Step 2)
  2. Run the deepest security scan available
  3. If the scan finds nothing but your device behaves strangely, slow, crashing, pop-ups, contact a professional or consider a factory reset
  4. Change all passwords from a different device
  5. Contact your bank even if you did not enter financial information, as some malware captures keystrokes

Reporting takes less than five minutes and helps protect others.

Who to Report ToWhat to ReportLink
FTC (Federal Trade Commission)Phishing emails, smishing texts, scam websitesReportFraud.ftc.gov
CISAPhishing targeting government or infrastructureCISA.gov/report
FBI Internet Crime Complaint Center (IC3)Financial loss from online fraudIC3.gov
Your email providerPhishing emails (use "Report phishing" button in Gmail, Outlook, etc.)In your email app
Anti-Phishing Working GroupForward phishing emails[email protected]
Your bank or card issuerIf financial information was enteredNumber on back of your card

Signs Your Device May Be Compromised

Watch for these in the days following the incident:

  • Unusual battery drain or device running hotter than normal
  • Apps you did not install appearing on your device
  • Contacts receiving messages from you that you did not send
  • Browser redirecting to unexpected websites
  • Pop-ups appearing even when no browser is open
  • Passwords stopped working on accounts you haven't changed
  • Unexpected charges on bank or credit card statements

If you notice any of these, run another scan and consider contacting a cybersecurity professional.

Frequently Asked Questions