According to Article 42 of the Public Security Administration Punishment Law, those who write threatening letters or threaten the personal safety of others by other means may face detention for not less than 5 days but not more than 10 days and a fine of up to 500 yuan.
Internet, invasion and deletion) mobile phone address book theft, causing information leakage in serious circumstances, and threatening the parties with privacy, is an illegal and criminal act, and the parties may report to the police to deal with it. Where the mobile phone address book is stolen and extortion constitutes the crime of extortion, evidence may be collected, and the public security organs may be reported to the police for help and resolution, and it may be requested to be handled in accordance with law.
Remind your friends and family to prevent being scammed. After your personal information is leaked, you can not only use this information to steal your account, but you may even deceive your relatives and friends.
Network, invasion and deletion) mobile phone address book is stolen, and it is threatened to report to the police immediately. The theft of mobile phone contacts, causing information leakage in serious circumstances, and threatening the parties with privacy, is an illegal and criminal act, and the parties may report to the police to deal with it. If you are threatened, you can call the police to deal with it.
If your contacts are stolen and threatened, you need to change your password, and if you are logged in with your account password, you can change your password immediately to prevent the compromised person from continuing to use your account.
If your contacts are stolen and threatened, you need to change your password, and if you are logged in with your account password, you can change your password immediately to prevent the compromised person from continuing to use your account.
Preserve evidence: Threat actors may demand that you pay a ransom or other form of exchange of benefits. Do not respond to or exchange any information with the threat person, and try to save evidence such as screenshots or audio recordings of the threat message. Reporting to the police: Contacts leaks and threats often involve criminal acts, such as invasion of personal privacy, extortion, etc.