{"id":1723,"date":"2024-10-13T02:20:53","date_gmt":"2024-10-13T00:20:53","guid":{"rendered":"https:\/\/o-seznam.cz\/napoveda\/ucet\/?page_id=196"},"modified":"2025-06-18T16:18:58","modified_gmt":"2025-06-18T14:18:58","slug":"kradez-uctu","status":"publish","type":"page","link":"https:\/\/o-seznam.cz\/napoveda\/ucet\/en\/zasady-bezpecnosti\/kradez-uctu\/","title":{"rendered":"Account Theft"},"content":{"rendered":"\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\"><nav class=\"menu-anchors\">\n<ul>\n\t<li><a href=\"#napadeni-uctu\">How do I know if my account has been compromised?<\/a><\/li>\n<li><a href=\"#znaky-napadeni\">What to do if your account seems compromised<\/a><\/li>\n<li><a href=\"#k-cemu-se-pouzivaji\">Why do attackers steal accounts?<\/a><\/li>\n<li><a href=\"#jak-se-dostane\">How do attackers get passwords?<\/a><\/li>\n<li><a href=\"#nejlepsi-prevence\">What\u2019s the best prevention?<\/a><\/li>\n<li><a href=\"#co-delat\">What to do if your account is blocked?<\/a><\/li>\n<li><a href=\"#jak-postupovat\">What to do if you can\u2019t access your account?<\/a><\/li>\n<\/ul>\n\n<\/nav>\n<\/div>\n\n\n\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\">\n<p>Theft of an email account is a difficult and often dangerous situation. When you think about how much personal information we keep in our inboxes, even just the thought that someone might have seen it can be very unsettling.<\/p>\n\n\n\n<p>If you believe you&#8217;re safe just because your data is &#8222;not interesting to anyone&#8220;, think again. Attackers don\u2019t care what kind of information they get or whose account they use to send out spam. Any account will do, which is why it&#8217;s worth protecting all of them equally. Your best weapon against these hidden online threats is knowledge.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\">\n<h2 class=\"wp-block-heading\" id=\"napadeni-uctu\">How do I know if my account has been compromised?<\/h2>\n\n\n\n<p>There are often signs that someone has accessed and misused your account. In some cases, the attack is so sophisticated that the intruder tries to cover their tracks, making it harder to notice anything suspicious.<\/p>\n\n\n\n<div style=\"--content-limiter--height:7rem\" class=\"is-collapsed wp-block-seznam-content-limiter\">\n\t<div class=\"inner-blocks is-layout-flow\">\t\n\t\t\n\n<h3 class=\"wp-block-heading\">Unknown sent messages or contacts<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>One of the first signs is the appearance of something in your account that you didn\u2019t create\u2014most often spam messages in the Sent folder. Because most compromised accounts are used to send spam, this is the most common symptom.<\/li>\n\n\n\n<li>Sometimes, attackers delete the sent messages to hide their activity. That\u2019s why it\u2019s important to look for anything unusual: unknown addresses popping up when you compose a new email, replies to messages you never sent, and so on.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Emails stop arriving or are missing<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Some attacks are aimed at intercepting your emails. The attacker may create forwarding rules that send all incoming mail to another email address\u2014and then delete the forwarded message.<\/li>\n\n\n\n<li>In sabotage-type attacks, the goal may simply be to harm you. They might delete your mail or set up a rule that automatically deletes any new messages. If this happens, make sure to check and remove any suspicious rules in your account settings.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">You receive a flood of &#8222;undeliverable&#8220; message notifications<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>These messages, often from &#8222;Mailer Daemon&#8220; or &#8222;Mail Delivery System&#8220;, indicate that emails supposedly sent from your account couldn\u2019t be delivered. This might mean someone used your address\u2014either actually from your account or faking it\u2014to send spam.<\/li>\n\n\n\n<li>Even if your address was only spoofed, it\u2019s worth reviewing your account\u2019s security settings. It\u2019s not always easy to tell what happened unless you analyze the message headers, which sometimes include the IP address of the sender.<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"650\" height=\"240\" src=\"https:\/\/o-seznam.cz\/napoveda\/ucet\/wp-content\/uploads\/sites\/10\/2024\/10\/mail-delivery-failure.png\" alt=\"\" class=\"wp-image-1724\" srcset=\"https:\/\/o-seznam.cz\/napoveda\/ucet\/wp-content\/uploads\/sites\/10\/2024\/10\/mail-delivery-failure.png 650w, https:\/\/o-seznam.cz\/napoveda\/ucet\/wp-content\/uploads\/sites\/10\/2024\/10\/mail-delivery-failure-320x118.png 320w\" sizes=\"auto, (max-width: 650px) 100vw, 650px\" \/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">Your account is locked or you&#8217;re forced to change your password<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>If you log in and see that your account has been locked or you&#8217;re being forced to change your password, it means our system detected suspicious activity and proactively blocked access.<\/li>\n\n\n\n<li>We monitor dozens of parameters to automatically detect unusual behavior or spam patterns. If you were knowingly sending bulk emails at the time, that might have triggered the block. Otherwise, follow the steps outlined in the&nbsp;<a href=\"https:\/\/o-seznam.cz\/napoveda\/ucet\/en\/zabezpeceni-uctu\/vynucena-zmena-hesla\/\" data-type=\"page\" data-id=\"1700\">Forced Password Change<\/a>&nbsp;guide and&nbsp;Account Block Information.<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"650\" height=\"261\" src=\"https:\/\/o-seznam.cz\/napoveda\/ucet\/wp-content\/uploads\/sites\/10\/2024\/10\/prihlaseni-vynucena-zmena-hesla.png\" alt=\"\" class=\"wp-image-1725\" srcset=\"https:\/\/o-seznam.cz\/napoveda\/ucet\/wp-content\/uploads\/sites\/10\/2024\/10\/prihlaseni-vynucena-zmena-hesla.png 650w, https:\/\/o-seznam.cz\/napoveda\/ucet\/wp-content\/uploads\/sites\/10\/2024\/10\/prihlaseni-vynucena-zmena-hesla-320x128.png 320w\" sizes=\"auto, (max-width: 650px) 100vw, 650px\" \/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">Login alerts from abroad<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Most spam-related attacks originate from outside the country, often from regions with low internet regulation. That\u2019s why we track where logins are coming from, and if we notice unusual foreign activity, you&#8217;ll see a notification bar in your inbox listing the countries involved. This allows you to decide whether the login was legitimate or not.<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"650\" height=\"29\" src=\"https:\/\/o-seznam.cz\/napoveda\/ucet\/wp-content\/uploads\/sites\/10\/2024\/10\/prihlaseni-cizi-zeme.png\" alt=\"\" class=\"wp-image-1726\" srcset=\"https:\/\/o-seznam.cz\/napoveda\/ucet\/wp-content\/uploads\/sites\/10\/2024\/10\/prihlaseni-cizi-zeme.png 650w, https:\/\/o-seznam.cz\/napoveda\/ucet\/wp-content\/uploads\/sites\/10\/2024\/10\/prihlaseni-cizi-zeme-320x14.png 320w\" sizes=\"auto, (max-width: 650px) 100vw, 650px\" \/><\/figure>\n\n\t<\/div>\n\t\t\t<button class=\"wp-block-seznam-content-limiter__button circle-button circle-button--up\"><\/button>\n\t<\/div><\/div>\n\n\n\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\">\n<h2 class=\"wp-block-heading\" id=\"znaky-napadeni\">What to do if your account seems compromised<\/h2>\n\n\n\n<p>If you&#8217;ve noticed any of the symptoms above, act quickly. You never know whether the attacker still has access and might change your password.<\/p>\n\n\n\n<div style=\"--content-limiter--height:7rem\" class=\"is-collapsed wp-block-seznam-content-limiter\">\n\t<div class=\"inner-blocks is-layout-flow\">\t\n\t\t\n\n<h3 class=\"wp-block-heading\">1. Check your recovery contacts<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>An attacker may have set up their own recovery contacts to regain access later. Go to&nbsp;<strong>Account Settings &gt; Security<\/strong>&nbsp;and make sure your recovery email and phone number are correct. Change them if needed.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">2. Immediately change your password<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Create a brand-new password that you\u2019ve never used before, and don\u2019t reuse it on any other website. The password should be strong and unique\u2014ideally nothing resembling your email address. Read more tips in our&nbsp;<a href=\"https:\/\/o-seznam.cz\/napoveda\/ucet\/en\/zasady-bezpecnosti\/bezpecne-heslo\/\" data-type=\"page\" data-id=\"1677\">Secure Password<\/a> Guide.<\/li>\n\n\n\n<li>If you use two-step verification, make sure to update the password used for mail protocols and xDAV as well.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">3. Log out of all devices<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Use the&nbsp;<strong>Account &gt; Active Sessions<\/strong>&nbsp;feature to log out from everywhere with a single click. Changing the password alone doesn\u2019t end active sessions. This step also kicks out any attacker who might still be logged in.<\/li>\n\n\n\n<li>You can find detailed steps in our article about <a href=\"https:\/\/o-seznam.cz\/napoveda\/ucet\/en\/aktivni-prihlaseni\/\" data-type=\"page\" data-id=\"1735\">Active Session<\/a>.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">4. Enable two-step verification<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>After securing your account, enable two-step verification. This adds a layer of protection by alerting your verification device every time someone tries to log in. If an attacker tries again, you&#8217;ll get a prompt\u2014and you can simply deny the access.<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"650\" height=\"151\" src=\"https:\/\/o-seznam.cz\/napoveda\/ucet\/wp-content\/uploads\/sites\/10\/2024\/10\/prihlaseni-dialog-2fa-2.png\" alt=\"\" class=\"wp-image-1727\" srcset=\"https:\/\/o-seznam.cz\/napoveda\/ucet\/wp-content\/uploads\/sites\/10\/2024\/10\/prihlaseni-dialog-2fa-2.png 650w, https:\/\/o-seznam.cz\/napoveda\/ucet\/wp-content\/uploads\/sites\/10\/2024\/10\/prihlaseni-dialog-2fa-2-320x74.png 320w\" sizes=\"auto, (max-width: 650px) 100vw, 650px\" \/><\/figure>\n\n\t<\/div>\n\t\t\t<button class=\"wp-block-seznam-content-limiter__button circle-button circle-button--up\"><\/button>\n\t<\/div><\/div>\n\n\n\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\">\n<h2 class=\"wp-block-heading\" id=\"k-cemu-se-pouzivaji\">Why do attackers steal accounts?<\/h2>\n\n\n\n<p>Attacks can range from simple to highly sophisticated. Here\u2019s what attackers typically use stolen accounts for:<\/p>\n\n\n\n<div style=\"--content-limiter--height:7rem\" class=\"is-collapsed wp-block-seznam-content-limiter\">\n\t<div class=\"inner-blocks is-layout-flow\">\t\n\t\t\n\n<h3 class=\"wp-block-heading\">Sending spam<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Attackers control large numbers of hacked accounts, using them to send spam through so-called &#8222;spambots&#8220;. These bots distribute spam from thousands of different email addresses, making them hard to block.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Accessing other services<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Once an attacker knows your email and password, they may try logging into other online services you use. This can include social media accounts (Facebook, Instagram), gaming accounts (Steam, Epic Games), and more. They may change passwords, cause damage, or even sell the accounts.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Stealing financial information<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>An attacker may look for credit card info or try to access your online banking, PayPal, or Revolut accounts. If they get in, they may transfer your money elsewhere.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Sabotage and harm<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Some attackers do it just to cause trouble or because they enjoy the power.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Identity theft<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>This is one of the most serious consequences. If an attacker finds your personal data, contacts, or scanned IDs in your inbox, they could use your identity to commit crimes\u2014both online and offline.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Phishing<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>An attacker may send phishing messages from your account, impersonating banks, PayPal, Airbnb, or even your friends.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Selling stolen data<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Sometimes attackers don\u2019t use the accounts themselves but sell them or the information they contain. Email-password databases are valuable on the dark web.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Posting fraudulent ads<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Organized crime groups use stolen accounts to post fake ads (e.g. cars, rentals). They communicate with buyers, ask for advance payments, then disappear.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Personal motives and blackmail<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Sadly, many attacks are personal\u2014revenge from ex-partners, coworkers, classmates, or business associates. These people may have access to your devices or be able to guess your password based on what they know about you.<\/li>\n<\/ul>\n\n\t<\/div>\n\t\t\t<button class=\"wp-block-seznam-content-limiter__button circle-button circle-button--up\"><\/button>\n\t<\/div><\/div>\n\n\n\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\">\n<h2 class=\"wp-block-heading\" id=\"jak-se-dostane\">How do attackers get passwords?<\/h2>\n\n\n\n<p>There are many ways attackers can obtain your password. It\u2019s good to have at least a basic awareness of them. Just like in real life, attackers most often rely on the most trivial tools&#8230;<\/p>\n\n\n\n<div style=\"--content-limiter--height:7rem\" class=\"is-collapsed wp-block-seznam-content-limiter\">\n\t<div class=\"inner-blocks is-layout-flow\">\t\n\t\t\n\n<h3 class=\"wp-block-heading\"><strong>The user used their email password on another service with poor security, and the password was leaked<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Based on many analyzed cases, we know that a &#8222;leak&#8220; doesn\u2019t necessarily mean a sophisticated hack. Attackers usually target smaller shops, forums, dating sites, and other services that don\u2019t have strong password storage security. Once they access such a user database, they look for people who use the same password for their email inbox.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Phishing messages<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Phishing is a favorite method among attackers. It\u2019s a type of email where the attacker pretends to be another company or person and tries to trick you into entering your password on a fake website. The attacker may pretend to be Seznam.cz or another service, including a link to a fake login page that looks similar to the original. The message often includes a pretext \u2013 for example, claiming your inbox will be deleted unless you log in. You can find an example and more information in the article&nbsp;<em>Safe Behavior Online<\/em>.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>The user shared their password with another person, who then changed it<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>You should never share your password with anyone \u2013 especially not with someone you barely know or met only online. This also includes the risky practice of buying and selling online accounts. It\u2019s not uncommon that if you buy an account for an online game, the seller gives you the login email and password, but if they still have access to the linked email inbox, they can reset the password and reclaim the account. The same applies to email inboxes \u2013 such activity is against our terms and should be avoided. There&#8217;s a risk the seller retains the ability to reset the password and steal the account back.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>The user shared their security questions or password reset PIN with someone<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>If you receive a message with a PIN code for password recovery on your phone or secondary email without having requested it, someone may be trying to access your account. Be very cautious and never share the PIN, even if the request comes from friends or family. We\u2019ve seen attacks where attackers ask for the PIN using hacked Facebook profiles of your friends.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>The attacker gained access to verified recovery contacts<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>This isn\u2019t common, but it can happen \u2013 for example, through a lost phone, SIM card cloning, or a compromised email address set as a recovery method for another account.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>The password was weak and someone guessed it or saw the user typing it<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>It\u2019s a major mistake to use a password that resembles your email address or includes personal details (names of family members or pets, birthdays, nicknames, etc.). See more in the article&nbsp;<a href=\"https:\/\/o-seznam.cz\/napoveda\/ucet\/en\/zasady-bezpecnosti\/bezpecne-heslo\/\" data-type=\"page\" data-id=\"1677\">Secure Password.<\/a><\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>The user\u2019s device was infected with malware or connected to an unsecured network<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>In rare cases, a password can be captured on the user\u2019s device when typing it (e.g. keyloggers or other password-stealing malware). If the attacker is connected to the same unsecured Wi-Fi, they may also intercept the password when logging into an unsecured website.<\/li>\n<\/ul>\n\n\t<\/div>\n\t\t\t<button class=\"wp-block-seznam-content-limiter__button circle-button circle-button--up\"><\/button>\n\t<\/div><\/div>\n\n\n\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\">\n<h2 class=\"wp-block-heading\" id=\"nejlepsi-prevence\"><strong>What\u2019s the best prevention?<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>To properly secure your account against external attacks, follow a few simple steps. Seznam accounts offer several settings to increase security. Staying alert and cautious is always important\u2026<\/li>\n<\/ul>\n\n\n\n<div style=\"--content-limiter--height:7rem\" class=\"is-collapsed wp-block-seznam-content-limiter\">\n\t<div class=\"inner-blocks is-layout-flow\">\t\n\t\t\n\n<h3 class=\"wp-block-heading\"><strong>Secure password<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Use a strong and unique password for your Seznam account \u2013 one that isn\u2019t used anywhere else and can\u2019t be guessed by someone who knows you. Consider using a password manager. You can find tips in our article&nbsp;<a href=\"https:\/\/o-seznam.cz\/napoveda\/ucet\/en\/zasady-bezpecnosti\/bezpecne-heslo\/\" data-type=\"page\" data-id=\"1677\">Secure Password<\/a>.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Safe behavior online<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Read the rules for safe online behavior to stay prepared. Be aware of suspicious activity and ignore strange or untrustworthy emails. Always check the web address before entering your password, and never share your password or other security details (contacts, PINs, etc.) with anyone.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Two-step authentication<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Consider enabling two-factor authentication. This feature will notify you when there is a login attempt from a new device. If someone tries to access your inbox, a notification will appear on your phone or computer and you\u2019ll be able to block the login.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Verified recovery contacts<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>A verified phone number or email address greatly increases your chances of recovering an account if the password is changed by an attacker.<\/li>\n\n\n\n<li>Recovery contacts also allow for an additional function \u2013 if we detect a suspicious password change, we\u2019ll send a so-called&nbsp;<em>password change veto<\/em>&nbsp;to your verified contact. You can cancel the change immediately and restore your password. Email is the preferred method; if no email is verified, we\u2019ll send the veto via SMS. Note: the veto is not sent for every password change, only for those that seem suspicious.<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"668\" height=\"152\" src=\"https:\/\/o-seznam.cz\/napoveda\/ucet\/wp-content\/uploads\/sites\/10\/2025\/04\/overene-udaje-en.png\" alt=\"\" class=\"wp-image-1747\" srcset=\"https:\/\/o-seznam.cz\/napoveda\/ucet\/wp-content\/uploads\/sites\/10\/2025\/04\/overene-udaje-en.png 668w, https:\/\/o-seznam.cz\/napoveda\/ucet\/wp-content\/uploads\/sites\/10\/2025\/04\/overene-udaje-en-320x73.png 320w\" sizes=\"auto, (max-width: 668px) 100vw, 668px\" \/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Protection against malware and viruses<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>As a general computer protection rule, use antivirus software and keep your firewall active. These applications monitor internet traffic, downloaded files, opened attachments, websites, and other potential sources of infection. A device infected with malware can send sensitive information to the attacker, often leading to stolen login credentials. The computer may also send spam or become part of a larger botnet spreading the infection.<\/li>\n<\/ul>\n\n\t<\/div>\n\t\t\t<button class=\"wp-block-seznam-content-limiter__button circle-button circle-button--up\"><\/button>\n\t<\/div><\/div>\n\n\n\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\">\n<h2 class=\"wp-block-heading\" id=\"co-delat\"><strong>What to do if your account is blocked?<\/strong><\/h2>\n\n\n\n<p>If we detect suspicious signs indicating that your account may have been compromised, the system may automatically block it. These signs include suspicious settings or unusually high message activity. There are two types of account blocks on Seznam \u2013 forced password change and account block.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Message: \u201cSomeone broke into your account\u201d<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>This means we\u2019ve determined that your account may be compromised. You must change your password immediately to prevent further abuse. This type of block is most common in cases where the account was used to send spam. Abuse of Seznam services for spam affects the reputation of our servers with other email providers, which in turn harms our users. The owner must change the password and check their devices for malware. More details are in the article&nbsp;<a href=\"https:\/\/o-seznam.cz\/napoveda\/ucet\/en\/zabezpeceni-uctu\/vynucena-zmena-hesla\/\" data-type=\"page\" data-id=\"1700\">Forced Password Change.<\/a><\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Message: \u201cYour account is blocked\u201d<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>This message means the account has been blocked. For more details, see the article&nbsp;<a href=\"https:\/\/o-seznam.cz\/napoveda\/ucet\/en\/zabezpeceni-uctu\/blokace-seznam-uctu\/\" data-type=\"page\" data-id=\"1697\">Seznam Account Block<\/a>. You can also contact our user support to check the reason for the block and explore possible recovery options.<\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\">\n<h2 class=\"wp-block-heading\" id=\"jak-postupovat\"><strong>What to do if you can\u2019t access your account?<\/strong><\/h2>\n\n\n\n<p>If your account was already stolen and you can no longer log in because the attacker changed the password, the only solution is to go through the&nbsp;<em>Forgotten Password<\/em>&nbsp;process. Instructions are available in the article&nbsp;<em>How to Recover a Forgotten Password<\/em>. Unfortunately, no other recovery option is available.<\/p>\n\n\n\n<p>Once you regain access to your account, make sure to follow all safety tips from the section&nbsp;<em>What\u2019s the best prevention?<\/em><\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Theft of an email account is a difficult and often dangerous situation. When you think about how much personal information we keep in our inboxes, even just the thought that someone might have seen it can be very unsettling. If you believe you&#8217;re safe just because your data is &#8222;not interesting to anyone&#8220;, think again. [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":0,"parent":1675,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-sidemenu","meta":{"_acf_changed":false,"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","footnotes":""},"page_category":[81],"page_tag":[],"service_status_category":[],"class_list":["post-1723","page","type-page","status-publish","hentry"],"acf":[],"lang":"en","translations":{"en":1723,"cs":196},"pll_sync_post":[],"_links":{"self":[{"href":"https:\/\/o-seznam.cz\/napoveda\/ucet\/wp-json\/wp\/v2\/pages\/1723","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/o-seznam.cz\/napoveda\/ucet\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/o-seznam.cz\/napoveda\/ucet\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/o-seznam.cz\/napoveda\/ucet\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/o-seznam.cz\/napoveda\/ucet\/wp-json\/wp\/v2\/comments?post=1723"}],"version-history":[{"count":9,"href":"https:\/\/o-seznam.cz\/napoveda\/ucet\/wp-json\/wp\/v2\/pages\/1723\/revisions"}],"predecessor-version":[{"id":1757,"href":"https:\/\/o-seznam.cz\/napoveda\/ucet\/wp-json\/wp\/v2\/pages\/1723\/revisions\/1757"}],"up":[{"embeddable":true,"href":"https:\/\/o-seznam.cz\/napoveda\/ucet\/wp-json\/wp\/v2\/pages\/1675"}],"wp:attachment":[{"href":"https:\/\/o-seznam.cz\/napoveda\/ucet\/wp-json\/wp\/v2\/media?parent=1723"}],"wp:term":[{"taxonomy":"page_category","embeddable":true,"href":"https:\/\/o-seznam.cz\/napoveda\/ucet\/wp-json\/wp\/v2\/page_category?post=1723"},{"taxonomy":"page_tag","embeddable":true,"href":"https:\/\/o-seznam.cz\/napoveda\/ucet\/wp-json\/wp\/v2\/page_tag?post=1723"},{"taxonomy":"service_status_category","embeddable":true,"href":"https:\/\/o-seznam.cz\/napoveda\/ucet\/wp-json\/wp\/v2\/service_status_category?post=1723"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}