Online fraud and phishing have become serious problems in the Netherlands, affecting thousands of people every year. In 2023 alone, 1 in 10 Dutch people fell victim to online scams.
These crimes involve criminals using digital tools to deceive you into giving away money, personal information, or access to your accounts.

Proving digital deception in the Netherlands requires collecting specific evidence such as emails, screenshots, transaction records, and communication logs that demonstrate the fraudster’s intent to deceive. Dutch law treats these crimes seriously, but building a strong case depends on documenting the fraud properly and understanding what counts as legal proof.
Whether you receive a fake email from your bank or fall victim to a phishing scheme, knowing how to gather and preserve evidence makes a real difference.
This guide explains what online fraud and phishing look like in the Netherlands, how Dutch courts prove these crimes occurred, and what steps you can take to protect yourself.
You’ll learn about the types of digital deception you might face, the evidence needed to support your case, and where to report fraud when it happens to you.
Understanding Online Fraud and Phishing in the Netherlands

Online fraud and phishing have become major threats in the Netherlands, with specific legal definitions and widespread impacts.
In 2023, two out of three Dutch residents received fraudulent messages, and one in ten fell victim to online scams.
Legal Definitions and Key Concepts
Dutch law treats fraud as a form of cybercrime involving deception to obtain money or personal information. Phishing refers to the specific technique where fraudsters impersonate trusted organisations to steal login details or sensitive data.
Identity fraud involves the misuse of your personal information, whilst online scams encompass broader deception tactics through internet channels and social media.
These crimes fall under cybercrime legislation in the Netherlands.
The key legal distinction centres on intent and method. Fraudsters must deliberately deceive you with the goal of financial gain or data theft.
Digital deception techniques include fake emails, fraudulent websites, and impersonation schemes designed to exploit your trust.
Prevalence and Impact of Fraud
The Netherlands now leads the European Economic Area in digital payment fraud. In 2023, approximately 1.4 million Dutch people aged 15 and above became victims of online scams.
The scale is significant. Two in three residents received at least one phishing email or message during 2023.
One in ten actually fell victim to these schemes, resulting in financial losses and compromised personal data.
Only a small fraction of victims report recovering their losses. The sophisticated nature of modern fraud makes detection difficult and recovery rare.
Cybercriminals continuously develop new methods to bypass security measures and exploit vulnerabilities in digital systems.
Common Techniques Used by Fraudsters
Fraudsters employ seven primary deception techniques to target you:
Impersonation tactics include pretending to be family members, banks, government agencies, or parcel services. They misuse corporate identities to appear legitimate.
Emotional manipulation exploits your fear, curiosity, compassion, or trust. Cybercriminals craft messages that trigger strong emotional responses to cloud your judgement.
Time pressure forces quick decisions. You receive urgent requests to update details, make payments, or verify accounts immediately.
False emergencies threaten account closures, blocked payments, or legal consequences if you fail to act. The Tax and Customs Administration name is frequently misused in these schemes.
Unrealistic offers present discounts or promotions that seem too good to be true. These bargains entice you into sharing payment details or personal information on fraudulent websites.
Types of Online Fraud and Digital Deception

Online fraud takes many forms, from emails that trick you into sharing passwords to fake investment opportunities that drain your bank account.
Cyber criminals use a mix of technical tools and psychological manipulation to target victims across different platforms and services.
Phishing Emails and Social Engineering
Phishing emails are messages designed to trick you into revealing sensitive information like passwords, bank details, or personal data.
Fraudsters often pose as legitimate organisations such as banks, government agencies, or trusted companies to gain your confidence.
Social engineering is the psychological manipulation technique behind most phishing attacks. Cyber criminals create a sense of urgency or fear to bypass your normal caution.
They might claim your account will be closed, threaten legal action, or promise urgent refunds.
Modern phishing attacks have become more sophisticated with the use of artificial intelligence. Fraudsters can now create convincing emails with proper grammar and branding that closely mimics real organisations.
They also use information from data breaches to personalise messages and make them more believable.
Common phishing tactics include:
- Fake password reset requests
- Fraudulent payment notifications
- Bogus tax refund emails
- Malicious links hidden in legitimate-looking messages
Online Shopping and Investment Scams
Online shopping scams involve fake websites or sellers that take your money without delivering goods.
These fraudsters create professional-looking shops that disappear once they receive payment. Some deliver counterfeit items whilst others provide nothing at all.
Investment scams promise high returns with little or no risk. The most common type linked to organised crime is “pig-butchering,” where scammers build trust over time before convincing you to invest in fake cryptocurrency or trading platforms.
Between 2020 and 2024, these scams generated approximately $75 billion in revenue from fraudulent cryptocurrency wallets.
Fraudsters use social media and messaging apps to reach potential victims. They share fake testimonials and doctored account statements showing impressive profits.
Once you invest, they may allow small withdrawals initially to build confidence before requesting larger sums.
Warning signs include:
- Guaranteed returns or “risk-free” investments
- Pressure to invest quickly
- Websites with no physical address or contact details
- Requests for payment via cryptocurrency or wire transfer
Romance and Impersonation Scams
Romance scams occur when cyber criminals create fake profiles on dating sites or social media to establish romantic relationships with targets.
They build emotional connections over weeks or months before requesting money for emergencies, travel costs, or business opportunities.
Impersonation scams involve fraudsters pretending to be someone you trust. They might pose as family members in distress, government officials demanding payment, or company executives requesting urgent transfers.
These scams exploit your natural desire to help loved ones or comply with authority figures.
The use of deepfake technology has made impersonation scams more dangerous. Criminals can now create convincing audio or video clips that appear to show real people making requests.
Southeast Asia saw a 600% increase in AI-generated deepfake content linked to fraud in early 2024.
Scammers often move conversations away from official platforms to private messaging apps where there is less oversight.
They resist video calls or in-person meetings and always have excuses for why they need money rather than direct help.
Account Takeover and Identity Fraud
Account takeover (ATO) happens when fraudsters gain unauthorised access to your online accounts through stolen credentials.
They might obtain passwords from data breaches, phishing attacks, or by guessing weak passwords. Once inside, they can make purchases, transfer funds, or lock you out of your own account.
Identity fraud involves using your personal information to open new accounts, apply for credit, or commit crimes in your name.
Cyber criminals piece together data from multiple sources including social media, data breaches, and public records to build complete profiles.
Fraudsters use several methods to take over accounts. Credential stuffing involves testing stolen username and password combinations across multiple sites.
SIM swapping tricks mobile providers into transferring your phone number to a device controlled by the criminal, allowing them to intercept security codes.
The impact of identity fraud extends beyond immediate financial losses. You may face difficulty obtaining credit, dealing with debt collectors for purchases you never made, or clearing your name after criminal activities.
How Digital Deception is Proven Under Dutch Law
Dutch courts require specific evidence and procedures to prove digital deception cases.
Law enforcement works with cybercrime units to collect digital proof, verify identities, and establish that fraud occurred through electronic means.
Legal Process for Establishing Fraud
Article 326 of the Dutch Criminal Code defines fraud as using deception to obtain goods, services, or money.
The prosecution must prove three key elements: deceptive conduct occurred, someone suffered financial or material harm, and the accused acted intentionally.
This applies to both traditional fraud and digital fraud cases.
You need to report online fraud to the police first. They determine if enough evidence exists to begin a criminal investigation.
The Authority for Consumers and Markets (ACM) also monitors online deception that affects consumers.
They can investigate businesses that mislead customers through digital platforms.
The burden of proof sits with the prosecution. They must show that fraudulent transactions took place and that the accused knowingly deceived the victim.
For phishing cases, this means proving someone deliberately created fake websites or sent deceptive messages to steal information or money.
Role of Digital Evidence
Digital evidence forms the backbone of online fraud cases in the Netherlands. Law enforcement collects data from multiple sources to build their case.
This includes:
- Email headers and message content
- Website logs and IP addresses
- Bank transaction records
- Screenshots and archived web pages
- Social media communications
- Device metadata and timestamps
Cybercrime units work to verify this evidence is authentic and untampered.
They establish a clear chain of custody from collection to presentation in court.
Identity verification plays a critical role when determining who sent messages or controlled accounts.
Digital signatures, login records, and device fingerprints help link suspects to fraudulent activities.
Courts accept digital evidence if it meets proper standards. The evidence must be reliable, relevant, and obtained legally.
You cannot use evidence gathered through illegal hacking or unauthorised access.
Forensic Techniques and Tools
Cybercrime units employ specialised forensic techniques to analyse digital deception.
They extract data from computers, phones, and servers using write-blocking tools that preserve original evidence.
Hash values verify that files remain unchanged during investigation.
Network analysis traces the path of fraudulent transactions and communications.
Investigators map connections between email accounts, websites, and payment systems.
They use tools to recover deleted files and examine hidden data.
Timeline reconstruction helps establish when suspicious activities occurred.
Forensic experts correlate events across different systems to show patterns of deceptive behaviour.
They analyse metadata to reveal document creation dates, editing history, and file transfers.
Dutch law enforcement collaborates with international cybercrime units when fraud crosses borders.
They share forensic findings and coordinate investigations through European networks.
Critical Evidence in Online Fraud and Phishing Cases
Successful prosecution of online fraud and phishing requires specific types of digital evidence that can demonstrate criminal intent and deceptive practices.
Digital footprints from devices, financial trails through payment systems, and verification of the authenticity of digital materials form the foundation of these cases.
Gathering and Preserving Digital Evidence
You need to secure digital evidence quickly because it can be altered or deleted within moments.
Key evidence includes email headers, server logs, IP addresses, and metadata from websites or messages.
Law enforcement must document the chain of custody from the moment they collect evidence to ensure it remains admissible in court.
Digital forensics specialists extract data from computers, mobile phones, and cloud storage while maintaining the integrity of the original files.
They create exact copies called forensic images to analyse without contaminating source materials.
The process requires specialised tools that track every step of evidence handling.
Encryption presents challenges when gathering evidence because it can prevent access to crucial files or communications.
Courts may require suspects to provide decryption keys, though this intersects with rights against self-incrimination.
Time stamps and access records help establish when fraudulent activities occurred and who was responsible.
Your evidence must meet strict legal standards in the Netherlands to be accepted in court proceedings.
Any gaps in documentation or improper handling can result in evidence being deemed inadmissible.
Tracing Payments and Cryptocurrency
Financial trails provide concrete proof of fraudulent transactions and money movement.
Traditional bank transfers leave clear records with names, account numbers, and timestamps that investigators can follow.
You’ll find that payment processors and financial institutions maintain detailed transaction logs.
Cryptocurrency transactions add complexity because they offer pseudo-anonymity through blockchain technology.
However, blockchain records are permanent and public, allowing investigators to trace funds between wallet addresses.
Specialised blockchain analysis tools can identify patterns and link cryptocurrency addresses to real identities.
Common payment evidence includes:
- Bank statements and transfer records
- Payment processor transaction histories
- Cryptocurrency wallet addresses and blockchain transactions
- Screenshots of payment requests or confirmations
- Financial institution cooperation in tracing funds
Many fraudsters convert cryptocurrency to traditional currency through exchanges, creating points where their identity can be verified.
Exchange platforms maintain records of user identity verification documents and transaction histories that become valuable evidence.
Authentication and Verification Methods
Proving that digital evidence is genuine requires robust authentication processes. You must demonstrate that emails, websites, or messages actually originated from the accused party and weren’t fabricated.
Digital signatures, IP address logs, and device fingerprints help establish authenticity. Identity verification records become evidence when fraudsters impersonate victims or create fake accounts.
Multi-factor authentication logs show whether legitimate security measures were bypassed. Biometric authentication data, such as fingerprint or facial recognition records, can prove who accessed specific systems.
Technical analysis confirms whether websites or emails were designed to deceive users. Experts examine source code, domain registration details, and hosting information to establish who created fraudulent materials.
Comparison of legitimate and fake websites reveals deliberate attempts to mimic trusted organisations. Cross-referencing device identifiers, login times, and geographic locations creates a comprehensive picture of fraudulent activities.
Protecting Yourself and Preventing Digital Fraud
Strong fraud prevention requires a combination of smart habits, reliable cybersecurity tools, and quick responses to potential threats. These practical steps help you reduce your vulnerability to phishing attacks and other forms of digital deception.
Practical Tips for Online Safety
Never click on suspicious links in unsolicited emails, even if they appear to come from legitimate organisations. Scammers often create convincing copies of bank websites and government portals to steal your credentials.
Use strong passwords that combine letters, numbers, and symbols. A password manager helps you create and store unique passwords for each account without needing to remember them all.
Change your passwords immediately if you suspect any account has been compromised. Enable 2FA (two-factor authentication) on all accounts that offer it.
This adds an extra layer of protection by requiring a second form of verification beyond your password. Keep your software up to date.
Software updates often include security patches that protect against newly discovered vulnerabilities. Set your devices to update automatically when possible.
Avoid conducting financial transactions on public Wi-Fi networks. If you must use public internet, connect through a VPN to encrypt your data.
Recommended Security Tools and Software
Install reputable antivirus software on all your devices. Modern antivirus programmes detect phishing attempts, malware, and suspicious websites before they can cause harm.
Activate spam filters in your email settings to reduce exposure to phishing messages. Most email providers offer built-in filtering that learns to recognise fraudulent patterns over time.
Consider using browser extensions that identify fraudulent websites. These tools warn you before you enter personal information on suspicious pages.
Monitor your credit reports regularly through official channels. In the Netherlands, you can request your credit file from the Bureau Krediet Registratie (BKR) to check for unauthorised accounts or suspicious activity.
Responding to Data Breaches and Suspicious Activity
Report phishing attempts to your email provider and delete the messages immediately. Forward suspicious emails claiming to be from Dutch banks or government agencies to the organisation’s official fraud reporting address.
Contact your bank straight away if you notice unauthorised transactions. Dutch banks typically offer protection against fraud, but you must report it quickly to qualify for reimbursement.
File a report with the police if you’ve fallen victim to fraud. You’ll need this documentation for insurance claims and potential legal action.
Additionally, report the incident to the Fraud Help Desk (Fraudehelpdesk) at 0900-8000. Change passwords for all affected accounts and any accounts that share the same credentials.
Review your account settings to ensure scammers haven’t added recovery email addresses or phone numbers. Place a fraud alert on your financial accounts if your personal information has been compromised.
This makes it harder for criminals to open new accounts in your name.
Reporting, Enforcement, and Victim Support in the Netherlands
Victims of online fraud and phishing in the Netherlands have multiple reporting channels available, from local police stations to specialized digital crime units. Dutch authorities work alongside international agencies to investigate and prosecute cybercriminals, whilst various organizations provide practical and emotional support to help victims recover.
Where and How to Report Fraud
You should report all forms of cybercrime to the Dutch police immediately. Call 0900-8844 or +31 (0)34 357 8844 to make an appointment at a local police station.
Request a digital detective to be present when filing your report, as this helps ensure all technical details are properly documented. Before reporting, gather as much evidence as possible.
Save fake invoices, screenshots of suspicious messages, and records of any transactions. The police and Public Prosecution Service use this evidence to investigate your case and potentially link it to other criminal activity.
You can report certain crimes online through the Dutch police website, though the forms are only available in Dutch. If you speak Dutch or have assistance available, you can file reports for specific offences electronically.
For ransomware incidents, self-employed entrepreneurs can use an online form, but you will need a DigiD account. Business representatives must call to schedule an in-person appointment.
If criminals have stolen your identity or misused your personal data, report this to the Central Identity Fraud Disclosure Office (CMI). Your insurance company will require a copy of your police report if you plan to submit a claim for compensation related to cybercrime.
Roles of Dutch and International Authorities
The National Cyber Security Centre (NCSC) oversees digital security throughout the Netherlands and works to strengthen the country’s resistance to internet crime. The NCSC operates under the National Coordinator for Counterterrorism and Security (NCTV).
Local law enforcement handles individual cybercrime reports and investigations. The Dutch fraud office (FIOD) investigates serious fraud cases, particularly those involving businesses or significant financial losses.
Law enforcement agencies pool information from multiple reports to identify criminal patterns and methods. The Netherlands Enterprise Agency (RVO) provides guidance on reporting fraud related to business operations and funding.
Fraud Help Desk publishes alerts and information about current scams to protect Dutch citizens and businesses. They maintain updated warnings on their website and social media platforms.
Dutch authorities cooperate with international agencies when cybercriminals operate across borders. Europol coordinates cybercrime reporting across European Union member states, as most digital fraud involves international networks.
Your local report contributes to this broader intelligence network.
Victim Support and Recovery Resources
Victim Support Netherlands provides free legal, practical, and emotional assistance to fraud victims. You can contact them for advice on navigating the reporting process and managing the aftermath of cybercrime.
They offer support regardless of whether you have filed a police report. ConsuWijzer provides information specifically about online shopping fraud and allows you to report scams involving businesses.
This platform helps you understand your rights as a consumer and what steps you can take to seek compensation. Consider the full scope of damages when documenting your losses.
Calculate financial costs, time spent resolving the issue, and expenses required to repair security breaches. Immaterial damages, such as stress and lost business opportunities, should also be noted in your report.
Only 7% of scams are currently reported in the Netherlands, which means only 0.05% of cybercriminals are caught. Your report strengthens law enforcement’s ability to track criminal activity and update security systems.
Reporting also helps security software companies adapt their programmes to combat new fraud techniques.
Emerging Fraud Trends and the Future of Digital Deception
Artificial intelligence is changing how criminals commit fraud, making attacks faster and harder to detect. The technical barriers for committing online scams have dropped significantly, whilst criminals now use automated tools and work together across borders.
Technological Developments in Fraud
AI-powered fraud tools have become widely available in 2025. Criminals can now purchase complete fraud systems as ready-made packages, including automated social engineering campaigns and deepfake technology.
This development is called Fraud-as-a-Service 2.0. Deepfake voices and videos allow fraudsters to impersonate real people convincingly.
These tools were once expensive and hard to use, but now almost anyone can access them cheaply. Criminals use phishing panels and stealer bots to collect your personal information automatically.
Infostealers remain one of the biggest threats you face online. These programmes gain access to your accounts and digital identity through web browser attacks.
They often bypass traditional antivirus software. Once inside your system, attackers monitor your activities, collect sensitive information, and eventually sell access to other criminals.
Bots now pose a unique challenge. With agentic commerce becoming reality, companies must distinguish between helpful automated shopping assistants and malicious bots designed to commit fraud.
Evolving Scam Tactics
Phishing has evolved from simple fake websites into multi-stage attack chains. Criminals now use legitimate services to build your trust before stealing information.
They compromise real accounts to send messages, removing traditional warning signs that would alert you. Payment fraud attacks happen within minutes rather than hours.
Criminals test dozens of stolen credit cards through compromised accounts quickly and precisely. They particularly target cards from specific regions like Spain and Singapore.
Data breaches feed into sophisticated spear phishing campaigns. Attackers eavesdrop on your accounts, studying your communication patterns and relationships.
They use this information to craft convincing messages that appear to come from people you know. Chargeback abuse has increased dramatically.
Some customers deliberately delay package collection to claim items weren’t picked up after investigation periods end. This shows how organised fraud has become.
Regulatory Changes and Cyber Security Initiatives
PSD3 and PSR regulations are creating foundations for joint anti-fraud platforms across Europe. Banks, telecommunications companies, and service providers now collaborate more closely to share fraud intelligence.
Companies respond to emerging fraud trends by blocking attacker infrastructure quickly. When you report suspicious activity, security teams identify and disable the servers and domains criminals use.
This forces fraudsters to rebuild their systems, creating costs and delays. Organisations now provide targeted training based on current attack patterns and real threat data.
Learning to recognise new deception techniques helps you protect yourself and your employer. Payment providers have changed their fraud detection models.
Instead of fixed rules, systems now use risk thresholds and dynamic security checks. These adaptive approaches respond better to evolving scam tactics whilst maintaining smooth customer experiences.
Frequently Asked Questions
Victims of online fraud in the Netherlands need specific evidence and must follow proper reporting procedures to law enforcement. Dutch authorities have established clear legal frameworks and consumer protections to address digital deception and phishing schemes.
What evidence is required to establish a case of online fraud in the Netherlands?
You need to gather and preserve digital evidence as soon as you suspect fraud. This includes screenshots of suspicious emails or messages, transaction records, and any communication with the suspected fraudster.
Keep copies of your bank statements showing unauthorised transactions. Save all correspondence in its original format when possible.
This includes email headers, which contain technical information about the sender. You should also document the timeline of events, including dates and times of all interactions.
Dutch authorities may request access to your devices for forensic analysis. They can examine IP addresses, metadata, and other technical details that help trace the fraud back to its source.
Which Dutch regulatory bodies handle the investigation and prosecution of phishing activities?
The Dutch Police (Politie) serves as your first point of contact for reporting phishing and online fraud. They investigate cybercrime cases and work with specialised units trained in digital forensics.
The Public Prosecution Service (Openbaar Ministerie) handles the prosecution of cybercriminals once the police complete their investigation. For matters involving financial institutions, the Dutch Central Bank (De Nederlandsche Bank) and the Authority for Financial Markets (Autoriteit Financiële Markten) provide oversight.
The Netherlands also participates in international cooperation through Europol’s European Cybercrime Centre. This helps address cross-border fraud cases.
How does the Netherlands’ legal framework address the issue of digital deception?
Dutch law treats online fraud under Article 326 of the Dutch Criminal Code (Wetboek van Strafrecht). This provision makes it illegal to deceive someone with the intent to gain unlawful benefits.
Penalties can include imprisonment of up to four years. The Computer Crime Act (Wet Computercriminaliteit) specifically addresses digital offences.
This includes unauthorised access to computer systems and data theft. Phishing falls under these provisions because it involves deceptive practices to obtain personal information.
The General Data Protection Regulation (GDPR) also applies in the Netherlands. Organisations must protect your personal data and report breaches within 72 hours of discovery.
What steps should an individual take if they suspect they are a victim of online fraud in the Netherlands?
Contact your bank immediately if you notice suspicious transactions. Most Dutch banks offer 24-hour fraud hotlines and can freeze your accounts to prevent further losses.
You should also change your passwords and enable two-factor authentication on all affected accounts. File a report with the Dutch Police through their online portal at politie.nl or visit your local police station.
Provide all evidence you have collected, including screenshots and transaction records. Report the incident to the Fraud Help Desk (Fraudehelpdesk) at fraudehelpdesk.nl.
They offer guidance and track fraud trends in the Netherlands. You can also register your case with the European Consumer Centre Netherlands if the fraud involves a company in another EU country.
How do Dutch laws protect consumers from fraudulent online transactions?
The Dutch Civil Code provides protection for online purchases. You have the right to cancel most online orders within 14 days without giving a reason.
This cooling-off period helps protect against pressure tactics used by fraudsters. Dutch payment service providers must implement strong customer authentication for electronic payments.
This typically involves two-factor authentication. If unauthorised transactions occur, you can request a refund from your bank within 13 months of the transaction date.
Banks must refund unauthorised payments unless they can prove you acted fraudulently or failed to protect your security credentials through gross negligence. The burden of proof lies with the financial institution, not with you.
What are the common tactics used by cybercriminals in the Netherlands to carry out phishing scams?
Cybercriminals often impersonate Dutch banks such as ING, ABN AMRO, and Rabobank in phishing emails. These messages claim there is a problem with your account and request that you verify your details urgently.
The emails contain links to fake websites designed to steal your login credentials.
Package delivery scams have become increasingly common. You receive a text message or email claiming to be from PostNL or another delivery service.
The message states that you need to pay a small fee or update your address details to receive a package.
Tax-related phishing attempts target Dutch citizens around tax season. Fraudsters send emails pretending to be from the Belastingdienst (Dutch Tax Authority), claiming you are entitled to a refund.
They ask you to click a link and enter your personal and banking details to process the payment.
WhatsApp fraud involves criminals who hack or impersonate someone you know. They contact you claiming to have a new phone number and ask you to send money urgently for an emergency.
Some scams involve fake customer service accounts that contact you after you post a complaint about a company online.