Tips to avoid common
Security Threats

Fraud attempts vary a lot and are constantly changing.
In this section you can read more about the most common threats, so you can be prepared and avoid them.

Tips to avoid common security threats  

Tips to avoid common threats


Common threats

Malware (Trojans, viruses & malicious software)
Malware is malicious software installed on your computer without your consent. Once there, it can record keystrokes, re-direct your browser, or display fake websites, all in an effort to impersonate your business in online banking transactions. Your computer can become infected with malware through documents attached to emails, links contained in emails, infected search engine results, or by clicking on links, videos, and documents on legitimate websites, particularly social networking sites.

Remember to keep your antivirus software updated and be cautious with software you download. Use an anti-spam product and treat unwanted emails with suspicion.

Spyware is a program or file that often arrives as a hidden part of “free” programmes, and it monitors what you look at on the Web before reporting back to companies who sell the information. Some can pick up everything you type. Remember to keep your antivirus program up to date and be cautious with the free software you download.


Identity theft
Fraudsters employ many techniques to gather personal information with which they then attempt to target the finances of their intended victim. These techniques include masquerading as a genuine entity and contacting the intended victim and tricking them into providing personal and financial details. 

You should exercise extreme caution before responding to any communication, including emails and telephone calls, which ask you for such details – even if those communications are alarmist in nature.


Phishing emails

Phishing is a term used to describe the practice of randomly sending emails that purport to come from genuine entities which aim to trick customers of that entity into disclosing information. The email recipient is often asked to click on a link which redirects them to a bogus website operated by fraudsters where they are requested to disclose information such as name, date of birth, card details, passwords, internet banking log on details etc. In the case of phishing emails purporting to come from Danske Bank the information requested could include your User ID, password, number generated by your eSafeID device or the number from the back of your eSafeID device. 

You should never, under any circumstances, disclose personal details by email. Danske Bank will never ask for personal details from you via email.

What to do if you receive a phishing email

  • Never reply when you receive a phishing email
  • Do not click any links
  • Never disclose personal information
  • Forward the email to this address:
  • Delete the email

​If you have disclosed card details, please call us​ immediately. As soon as you have forwarded the email to us, we will start the process of getting the fake website closed down. ​



How to spot a phishing email 
A phishing email often begins with an impersonal greeting such as “Dear Customer” rather than a specific reference to your name. Typically, a phishing email may state that your card has been used improperly. It encourages you to click a link that will take you to a fake website – for example, a site that looks like Danske Bank’s – prompting you to enter information. 

Danske Bank will never send you an email to ask for your account number or any other confidential information.

Real-time phishing

In a real-time phishing attack, the fraudsters capture the banking credentials and authentication information when the User enters details onto the Business eBanking system. The stolen credentials are then immediately used to open a session on the authentic bank website in order to commit fraud.  

Sometimes the hackers use fake sites that look like Danske Bank’s website. If the User goes to the fake site (for example, via a link in an email) and enters the authentication details, the hackers will receive that information and use it to go to the real website and log on to the Business eBanking system. Meanwhile, the User is watching a “Please wait…” page.  

Real-time phishing attacks are also performed through computers infected with malware. The infected computer sends the authentication information to the hacker, who will use it to log on to the Business eBanking system. Meanwhile, the User is once again watching a “Please wait…” page. ​​​​


Vishing is somewhat similar to Phishing except the fraudster phones their intended victim, usually purporting to be a service provider (such as a bank) which the intended victim uses, asks them to reveal information. It is not uncommon for fraudsters to make a number of calls trying to gather small pieces of information each time. For instance an apparently regular call during which they simply find out where you have your bank account, followed a week or so later with a call during which they introduce themselves as being from your bank. 

If you decide that you want to call the caller back to authenticate the call you should always ensure that you source the number from your own records and ensure that the original connection with the caller has been terminated (you can do this by using a different phone or phoning someone else you know first).