Spring til hovedindhold

Suggestions

Crimes against digital devices

Report hacking, malware, DDos attacks, or other crimes against a computer, tablet, or smartphone.

The following crimes should not be reported here:

  • Extortion via email where the sender claims to have hacked your computer and be in possession of pornographic material or the like, which he is threatening to share unless you transfer an amount of cryptocurrency, e.g. Bitcoin.
  • Emails in which the sender claims to be an executive or businessman and requests that you transfer money (CEO/BEC fraud).

To report any of these crimes, please dial (+45) 114 or contact a police station instead.

Please have the following information ready

Name, address, telephone number and email address

If the attacked device is owned by a company, you must provide the name of a contact person for the company

Information about the crime

Information about the time of the crime

The value of the attacked device

Any documentation you might have

About

If your computer, tablet, or smartphone has been attacked, for example, been hacked, locked, or had files or accounts taken over or encrypted.

 

This type of crime is described as malware (including ransomware), hacking and DDoS attacks.

Hacking is when someone gets access to your computer, your programmes, your email or social profile without your permission.

 

This can, for example, mean that the hacker uses your information, deletes, changes or copies your data.

 

The hacker can subsequently try to blackmail you, for example, with threats of publishing private images.

Malware is a common term for malicious software that, for example, a perpetrator can send to you via email.

 

Ransomware is a type of malware. Downloading this software to your computer prevents or restricts you from accessing the computer.

 

A perpetrator will typically require you to pay a ransom within a certain time limit before you can access the computer again.

A DDoS attack is when someone prevents you from accessing an it system. For example, it can be overloading a website with a systematic and massive number of queries or attempts to log in.
Decline cookies