
Denmark's Sophisticated Scam Wave: AI Deepfakes, Voice Cloning, and Extortion
Nordic nation grapples with coordinated criminal networks exploiting banking vulnerabilities and AI technology
Danish financial regulators and the National Police (NSK) have jointly warned of a sprawling criminal operation exploiting multiple digital attack vectors—a case study in how organized crime networks are adapting to Scandinavian digital infrastructure.
The campaign operates through several coordinated methods. Initial contact typically arrives via automated robocalls using spoofed Danish phone numbers (+45) with synthetic voices or callers with foreign accents impersonating police officers. The fraudsters falsely claim to be investigating criminal cases and request sensitive information: CPR numbers (Denmark's equivalent to social security numbers), banking credentials, or MitID login codes—the country's mandatory two-factor authentication system.
Parallel to direct contact attempts, criminal networks deploy "silent calls"—incoming calls with no audio—to verify which phone numbers are active. Confirmed numbers are then sold to larger criminal networks for targeted phishing attacks, illustrating the industrial-scale organization behind the fraud.
The phishing phase involves messages impersonating major Danish banks or MitID support services. These communications include manipulated phone numbers and links to counterfeit portals designed to mirror legitimate banking and authentication interfaces. Once victims access these fake sites, they are often socially engineered into downloading remote access software under the pretense of "screen sharing assistance"—granting criminals complete control over their devices and financial accounts.
**AI-Generated Extortion**
Most alarming is the campaign's integration of artificial intelligence for sextortion purposes. Criminal networks are using AI to generate explicit deepfake imagery of victims, then demanding payment under threat of distributing the fabricated content to contacts and family members. This tactic exploits psychological vulnerability alongside technical deception: victims often cannot immediately prove the images are fabricated, and shame frequently prevents reporting.


