Cybercriminals often don't have our passwords or tokens after a brute force decryption, but rather simply listen to our keyboard...
In this articl...
For further actions, you may consider blocking this person and/or reporting abuse
This is what I was looking for. Thank you 🙏🏾