Stop the breach
Isolate every affected system immediately. Change all compromised credentials — passwords, API keys, admin accounts. Disable any user accounts that show unauthorized access. The priority is containment: stop the bleeding before you assess the damage.
