32blogby StudioMitsu

Opened a Phishing Email? What to Do Next

Opened, clicked, or entered info on a phishing email? Three risk levels, step-by-step response for each, plus how to block phishing before it reaches you.

8 min read

This article contains affiliate links.

On this page

If you are reading this because you just opened a suspicious email, here is the most important thing to know — opening an email alone almost never causes harm.

According to the FBI's 2024 Internet Crime Report, the IC3 received 859,532 complaints with losses exceeding $16 billion. Phishing was the most reported crime category. The APWG recorded 4.8 million phishing attacks in 2024, with an estimated 3.4 billion phishing emails sent daily.

This article breaks the response into three clear levels: "opened only," "clicked a link," and "entered information" — because the correct response is completely different for each.

Opened Emailjust opened?did not click → low riskClicked a Linkentered info?no info entered → medium riskEntered Infoimmediate action neededentered info → high riskOpened Attachmentscan required

Opening an Email Alone Is Not the Danger

If you only opened the email (read the body text) without clicking anything or opening attachments, you are almost certainly fine.

Modern email clients (Gmail, Outlook, Apple Mail) do not execute scripts embedded in emails. If your settings auto-load remote images, the sender may learn that you opened the email, but that is the extent of the risk.

However, if any of the following apply, read the relevant section below.

  • You clicked a link (URL) in the email
  • You opened an attachment
  • You entered a password, credit card number, or other information on a page the link took you to

Identify Your Situation First

The correct response depends entirely on what you did. Find your situation in the table.

SituationRisk LevelResponse
Opened email onlyLowDelete and move on
Clicked a link (entered nothing)MediumScan and monitor
Entered credentials or financial infoHighImmediate action required
Opened an attachmentHighDisconnect and scan

Each situation is covered in detail below.

If you only opened the email and did not click any link or open any attachment, there is very little to do.

  1. Delete the email (or move it to spam)
  2. Block the sender (prevents repeat messages from the same address)
  3. Report it as phishing (Gmail: "Report phishing," Outlook: "Junk → Phishing")

No further action is needed. However, if you keep receiving similar emails, your email address may have been leaked. Check with "How to Check If Your Data Is on the Dark Web" to be sure.

You clicked a link in the email but did not enter any information on the page it opened. Risk is moderate.

What to Do

  1. Close the browser — close the tab or window entirely. Do not just hit "back"
  2. Clear browser cache and cookies — the phishing site may have planted tracking cookies
  3. Run a full virus scan — use Windows Defender or your installed security software
  4. Monitor your accounts — check bank and credit card statements for unusual activity over the next few days

If You Clicked on Your Phone

The same principles apply: close the browser and clear the cache. Additionally, check that no unfamiliar apps were installed. For detailed phone-specific steps, see "Is Your Phone Hacked? How to Check and What to Do Right Now."

You Entered Credentials or Financial Info

This is the most dangerous situation. If you entered a password, credit card number, or bank details on a phishing site, act immediately.

If You Entered a Password

  1. Change the password on that service right now
  2. Change the password everywhere you reused it — attackers use credential stuffing (trying leaked credentials on other services) almost immediately
  3. Enable two-factor authentication (2FA) — authenticator apps are safer than SMS. See "Is SMS 2FA Still Safe? How to Switch" for setup steps
  4. Check the service's login history — if you see unfamiliar sessions, log out of all devices

For password management guidance, see "Can't Remember Your Passwords? You Don't Have To." To check if your passwords are already leaked, see "How to Check If Your Password Has Been Leaked."

If You Entered Credit Card Information

  1. Call your card issuer immediately — request a card freeze and a new card number
  2. Review recent statements — look for charges you do not recognize
  3. File a report — contact your bank's fraud department and, if needed, report to the FTC at reportfraud.ftc.gov

If You Entered Bank Account Information

  1. Call your bank immediately — request a temporary freeze on online banking
  2. Change your PIN and online banking password
  3. Review transaction history — look for unauthorized withdrawals or transfers

You Opened an Attachment

If you opened an attachment (.exe, .zip, .docm, .pdf, etc.), malware infection is possible.

What to Do

  1. Disconnect from the network — turn off WiFi, unplug Ethernet. This stops malware from communicating with external servers
  2. Run a full virus scan — not a quick scan, a full system scan
  3. Follow the scan's instructions to remove threats
  4. Change passwords after cleanup — a keylogger may have recorded your keystrokes before removal

If you opened an attachment on your phone, see "Is Your Phone Hacked? How to Check and What to Do Right Now" for verification steps.

How to Block Phishing Emails Before They Hit

Knowing the response is important, but not encountering phishing in the first place is better.

Email Client Settings

  • Use Gmail's filter feature to auto-route emails from specific domains or subject patterns to spam
  • Turn off automatic image loading (Gmail: Settings → General → "Ask before displaying external images")
  • Report spam aggressively — the more you report, the better your filter gets

NordVPN's Plus plan and above includes Threat Protection Pro (TPP), which automatically detects and blocks phishing links inside emails.

How TPP's email protection works:

  • Works in Gmail and Yahoo Mail web versions
  • Checks email links against a known-threat database
  • Displays a red warning banner on dangerous links
  • Also scans downloaded files in real time

TPP does not read email body text or attachments. It only scans links, keeping privacy impact minimal.

For a full feature breakdown, see "NordVPN Threat Protection Pro Review."

How to Spot Phishing Emails (Basics)

No method is foolproof, but these checks catch the majority of phishing attempts.

  • Check the sender address — "amazon-security@random-domain.com" is a giveaway. The domain matters more than the display name
  • Watch for urgency — "Your account will be suspended in 24 hours" is a classic pressure tactic. Legitimate services rarely demand immediate action via email
  • Hover over links before clicking (on desktop) — if the displayed text and actual URL differ, it is phishing
  • Look for language quality issues — awkward phrasing, mixed formality, unusual formatting

Where to Report (US)

ResourceWhen to Use
FTC reportfraud.ftc.govGeneral phishing and fraud reports
FBI IC3 ic3.govFinancial losses or identity theft from cybercrime
IdentityTheft.govIf your personal identity was compromised
Your bank or card issuerIf financial information was entered
NordVPN

The world's leading VPN — fast, secure, and easy to use

  • 6,400+ servers across 111 countries
  • NordLynx protocol (WireGuard-based)
  • Threat Protection Pro (ads & malware blocking)

Wrapping Up

Your response to a phishing email depends entirely on what you did.

  • Opened only → delete and move on. No need to panic
  • Clicked a link → close browser → clear cache → run virus scan
  • Entered information → change passwords immediately → call bank/card issuer → enable 2FA
  • Opened an attachment → disconnect from network → full scan

For proactive protection, Threat Protection Pro blocks phishing links automatically, and reporting suspicious emails as phishing before opening them should become a habit.

If you are worried your information may already be circulating, check now with "How to Check If Your Data Is on the Dark Web."