The next 30 minutes matter more than the next 30 days. If your teen just clicked a phishing link, what happens in the first half hour determines whether this is a small scare or a compromised account, a stolen identity, or a social-engineering chain that reaches their friends. This guide walks through exactly what to do — in order, by platform, and by what your teen did after the click.
A phishing link in 2026 almost never looks like the old "Nigerian prince" email. For a 14-year-old, it looks like a Discord DM from their best friend's account saying "omg is this you?" with a video link. It looks like a Roblox trading DM promising rare items. It looks like a TikTok DM from an influencer they follow. It looks like an Instagram login prompt after they clicked a story link. It looks like a Google Docs invite forwarded to their school email.
The scam isn't stupid. The teen isn't stupid. The attack is engineered by professionals to bypass exactly the defenses a 14-year-old has. The FTC's 2024 Consumer Sentinel data shows teens aged 14-17 reported losing a collective $210 million to online fraud — up more than 2,500% from 2017. This is the threat model now.
Here's what to do.
Step 1: First 30 minutes — what to do right now
Do these in order. Don't skip ahead.
- Disconnect the device from the internet. Turn on airplane mode on the phone. Turn off wifi on the laptop. This stops any automatic communication between the device and the attacker's server while you investigate.
- Close the tab or app. Do not click anything else on the page. Do not complete any "verification." Do not enter any credentials it's still asking for.
- Ask your teen one question, calmly: "Did you type anything on that page, or download anything?" Their answer determines the next hour. Do not ask why they clicked. That can wait.
- From a different device — your phone, a family computer — start changing passwords on the affected account. If your teen entered credentials, see Step 4.
- Identify which platform the link was on. The response differs for Discord, Roblox, Instagram, Snapchat, TikTok, and school/email. See Step 2.
Step 2: What platform was the phishing link on?
The scammer's goal changes by platform, and so does your response.
Discord
Discord phishing is almost always "free Nitro," "someone posted a video of you," or "I found your old account." The attacker's goal is the Discord account itself — to then send the same phishing link to every contact the teen has.
- Sign out of Discord on every device (Settings → Devices → Log Out Everywhere)
- Reset the password at discord.com/reset from a different device
- Enable 2-factor authentication with an authenticator app (not SMS)
- Review Settings → My Account → Connections for unknown linked accounts (Twitch, Steam, Spotify) — unlink anything the teen didn't add
- Check Settings → Authorized Apps and revoke anything unfamiliar
- If the link came from a friend, the friend's account is compromised too. Warn them through a different app (iMessage, SMS), not Discord
For the full Discord playbook, see our Discord scams parent guide.
Roblox
Roblox phishing is usually a "free Robux generator," a fake trading page, or a "limited items rollback" scam. The attacker's goal is the Robux balance and any rare items in the inventory — both of which can be laundered fast on third-party marketplaces.
- Change the Roblox password from a different device at roblox.com/my/account
- Enable 2-Step Verification (Settings → Security)
- Enable the Account PIN feature (Settings → Security → Account PIN) — this blocks settings changes even if the password is known
- Check Settings → Security → Sessions and log out of any unknown devices
- If items were already taken, contact roblox.com/support within 30 days — Roblox's recovery policy only applies within that window, and you'll need your original purchase receipts as proof of ownership
For the deeper Roblox angle, see our Free Robux scam parent guide.
Instagram, Snapchat, TikTok
Social-platform phishing typically asks the teen to "reverify your account" after clicking a story or DM. The attacker's goal is both the account (for resale or further phishing) and any private content stored in it — DMs, photos, story archives.
- Change the password from a different device through the official app (not through any link the teen received)
- Enable 2-factor authentication with an authenticator app
- Review login activity: Instagram (Settings → Security → Login Activity), Snapchat (Settings → Session Management), TikTok (Settings → Security → Security Alerts)
- Revoke any third-party app connections your teen didn't authorize
- Check the email and phone number on the account — attackers often swap these first to lock the real owner out; change them back if needed
School / email (Gmail, Outlook, Google Classroom)
School-email phishing looks like a Google Docs invite, a teacher "grade update," or a "your password expires today" notice. The goal is often bigger than a teen account — attackers use a verified school email to send internal phishing to staff and other students.
- Reset the email password from a different device
- Enable 2-factor authentication (your school district almost certainly supports it)
- Review sent mail — attackers often forward phishing to the contact list within minutes of compromise
- Check inbox rules / filters — a common trick is to add a filter that auto-forwards or deletes emails from the school's IT department
- Tell the school IT department. This is not optional. If a school email was compromised, the district needs to know so they can check for lateral movement into other accounts
Step 3: What did your teen actually do after the click?
Scope the damage based on the last action, not the first.
Just clicked — didn't enter or download anything: Risk is low. Change password as a precaution, run a quick malware scan, move on. Skip to Step 6.
Entered a username or password: Assume the credentials are in a scammer's hands. Continue to Step 4.
Downloaded or installed something: Treat the device as potentially compromised. Continue to Step 5.
Shared personal info, photos, or financial data: This is an identity or exploitation incident. Go directly to Step 7 and escalate to authorities.
Step 4: If your teen entered a password
Credentials are a commodity. Within hours of the click, they're often either being used by the original scammer or sold on a credential market to be used by someone else. Speed matters.
- Change the password on the affected account right now, from a different device
- Change the password on every account that used the same or similar password. This means email, school, Discord, Roblox, any games, any apps. Teens reuse passwords at a rate north of 70% (Stanford Internet Observatory, 2025)
- Enable 2-factor authentication on every important account — email first
- Set up a password manager — Bitwarden (free) or 1Password Family. This is the single biggest protection against credential reuse going forward
- Check bank statements and parental accounts — if your teen ever made a purchase on the affected platform, the payment method is now linked to a compromised account
- Place a free credit freeze for minors if the compromised account had identity information (full name + date of birth + address). Contact each of the three major credit bureaus — Equifax, Experian, TransUnion — and request a freeze on the child's credit file. The FTC has step-by-step instructions
Step 5: If your teen downloaded something
Phishing pages sometimes offer a fake "verification app," a "trainer for Roblox," or a "Discord token checker." These are usually information-stealing malware or remote-access trojans.
- Keep the device offline until you've completed the next steps
- Run a full antivirus scan. On Windows, Microsoft Defender Offline scan catches most credential stealers. On Mac, Malwarebytes Free is the standard second-opinion tool. On Android, Malwarebytes or Bitdefender Mobile; on iOS, delete any unfamiliar profiles under Settings → General → VPN & Device Management
- Check browser extensions (Chrome, Edge, Safari). Remove anything that wasn't there yesterday
- If the scan finds anything serious — or if you're unsure — factory-reset the device. Yes, it's inconvenient. A reset is faster and more reliable than trying to surgically remove malware from a teen's phone, and the cloud backup will restore their apps and photos
- After the device is clean, go through Step 4 for every account accessed from that device in the last 48 hours
Step 6: If it was 'just' a click — don't relax entirely
The click itself is almost certainly not the full attack. Phishing campaigns operate in stages: the first link profiles the victim, and a more targeted follow-up arrives within days. Watch for:
- Follow-up DMs from the same account or different accounts referencing whatever the first link was about
- Friends' accounts sending similar links — the compromise often spreads through the original victim's contact list, not through the victim themselves
- Unexpected password-reset emails on any account — a sign that someone is probing your teen's accounts using info they collected
- Calls or texts claiming to be from "platform support" asking to verify the account — no platform ever does this
Step 7: When to escalate to authorities
Most phishing incidents end at Step 4 or 5. These cases need to go further:
- Report to the FTC at reportfraud.ftc.gov if any money was lost, if identity information was shared (SSN, date of birth, full address), or if your teen was asked to send gift cards
- Report to the FBI's IC3 at ic3.gov for identity theft, financial fraud, or crimes crossing state/international lines
- If any sexual content is involved — photos requested, threats made, "we have pictures of you" language — stop everything and report to the NCMEC CyberTipline at 1-800-843-5678. This is sextortion. The FBI has a dedicated sextortion team at tips.fbi.gov. Do not pay. Do not delete messages. Preserve everything. One in five teens experienced sextortion in 2025, and 90% of financial sextortion victims are boys aged 14-17 (FBI, 2025)
- If a school email was compromised, contact the school IT department — they are legally and operationally required to check for lateral compromise
- Contact your local police if any in-person threat, stalking, or blackmail is involved
Step 8: What to say to your teen (the usually-missed part)
This is the most important step and the one most parents skip. How this conversation goes determines whether your teen tells you next time — and there will be a next time, because the scams keep evolving.
- Lead with "I'm not mad." And mean it. The attacker is a professional. Your teen is 14. This was not a fair fight
- Split the conversation in two. The technical recovery happens now, together. The "how do we prevent this next time" talk happens in 24-48 hours, when emotions settle
- Don't do "I told you so." It rewires your teen to hide the next incident instead of bringing it to you. That's how single clicks turn into sextortion cases
- Name the tactic, not the teen. "That's a classic account-takeover phishing pattern — they engineered it to look exactly like a friend's real DM" is useful. "You should have known better" is not
- Ask what signal would have helped. Not "how did you miss it" — that's accusatory. Instead: "Looking at it now, what's the one thing that would have stopped you for a second?" Teens who identify their own pattern-break cues are the ones who catch it next time
Step 9: How to prevent the next one — pattern recognition, not rules
"Don't click suspicious links" doesn't work. The links aren't suspicious — they come from friends' hacked accounts, use platform-native formatting, and exploit urgency. What works is pattern recognition trained through repetition under pressure — the same way people learn to spot a bluff at a poker table.
A few things that measurably help:
- One absolute rule: "Passwords and verification codes are typed into the official app or the bookmarked URL — never into a link someone sent me." One absolute rule beats a list of heuristics
- Second-channel verification habit: If a friend DMs something unusual, confirm through a different app before acting. iMessage-what-happened is a reflex worth training
- A password manager — teens can't click a phishing page that looks like Discord if their password manager doesn't autofill because the URL is wrong. This is the single most effective protection you can install today
- Practice under pressure. Rules teens heard in a lecture don't fire when a hacked friend's account is messaging them at 9:47 PM. Rules they practiced in a realistic scenario do
Let your teen practice spotting the scam before it costs them
LifeQuest's Scam School includes an episode built around this exact scenario — a DM from a hacked friend's account, a video link, a 9:47 PM decision. 5 minutes. Interactive. No real risk. Real pattern recognition.
Try Demo — FreeFrequently asked questions
What should I do if my teen clicked a phishing link on Discord?
Close the page immediately. Have your teen sign out of Discord on every device, then reset the password from a different device at discord.com/reset. Enable 2-factor authentication with an authenticator app. Check connections and authorized apps for anything unfamiliar. If the phishing link came from a friend, assume the friend's account is compromised too — warn them through a different channel like iMessage, not Discord.
Can a phishing link steal information from just one click?
In most cases, no. Serious account compromise requires an additional action after the click — typing a password, installing an app, completing a verification survey. A click alone can expose basic metadata like IP and browser fingerprint. If your teen only clicked and closed, run a malware scan and change the password as a precaution. If they did anything else, move to the step-by-step recovery plan above.
How do I know if my child's account is actually compromised?
Look for login alerts from unfamiliar devices, password changes they didn't make, new friends the teen didn't add, outgoing messages with suspicious links, changes to email or phone on the account, unauthorized purchases, and 2-factor settings turned off. Most platforms expose a "login history" or "active sessions" view in Security settings. If any of those signals are present, treat the account as compromised.
What happens if my teen entered their password on a fake site?
Assume the credentials are already in use by the scammer or sold. Change the password on the affected account immediately from a different device. Change the password on every other account using the same or similar password. Enable 2-factor authentication everywhere. Review the account for items transferred out, messages sent, or purchases made. For Roblox, contact support within 30 days — the recovery window is hard.
Should I report phishing to the FTC or FBI?
Report to the FTC at reportfraud.ftc.gov if money was lost, personal/financial info was shared, or gift cards were requested. Report to the FBI's IC3 at ic3.gov for identity theft or financial fraud. For anything involving sexual content, report to NCMEC's CyberTipline at report.cybertip.org or 1-800-843-5678. Platform reports don't replace government reporting — do both.
Does closing the browser protect my teen's device?
Closing the browser stops further interaction with the page but doesn't remove anything already downloaded. If your teen was prompted to download, install, or allow a browser extension, close the browser and then run a full antivirus scan before using the device. On mobile, check recently installed apps and browser extensions for anything unfamiliar.
Do I need antivirus on my teen's phone?
iOS rarely needs it thanks to sandboxing. Android benefits from a reputable antivirus for edge cases where APKs are sideloaded. The bigger protections on both platforms are: only install from the official store, enable 2-factor authentication on major accounts, limit app permissions (Accessibility, SMS, Notifications), and use a password manager. Those protect against the realistic 2026 threat model more than antivirus alone.
How do I talk to my teen about this without them shutting down?
Lead with "I'm not mad" and mean it. Split into two conversations: technical recovery now (do it together), emotional debrief 24-48 hours later. Frame the scam as something professional criminals engineered to trick smart people. Skip "I told you so" entirely. Teens who get punished for being scammed hide the next one — and hidden incidents escalate. Partnership beats discipline here.
Sources
- FTC Consumer Sentinel Network, "Reports by Age" (2024) — $210M in reported teen losses, 2,500% increase since 2017
- Stanford Internet Observatory, "Digital Deception and Age" (2025) — teen password reuse rates, generational vulnerability to social engineering
- Federal Bureau of Investigation, "Sextortion: A Growing Threat Targeting Minors" (2025) — 1 in 5 teens experienced sextortion, 90% of financial sextortion victims are boys 14-17
- Roblox Corporation, "My account was hacked — What do I do?" — 30-day recovery window, proof-of-ownership requirements
- Discord Inc., Transparency Report (2024-2025) — account compromise scale and detection
- National Center for Missing & Exploited Children, CyberTipline — reporting pathway for exploitation incidents
- U.S. Federal Trade Commission, "Credit Freeze for Children" — freezing minor credit files
- MalwareTips Forum Research (January 2026) — AI-powered Discord phishing bots escalation patterns