Texas Flood Scams Expose Disaster Relief Vulnerabilities, Over 70 Suspicious Domains Registered

Published
Written by:
Lore Apostol
Lore Apostol
Cybersecurity Writer

The recent Texas floods have sparked a surge in Texas flood scams, as cybercriminals have registered over 70 suspicious domains within 10 days of the flooding onset, exploiting the heightened need for aid and public compassion to execute their fraudulent schemes.  

Identified Scams and Methods  

Threat actors have deployed a variety of scams consistent with past threat actor patterns during crises, including fake donation platforms, impersonated volunteer registration sites with PII-harvesting (Personally Identifiable Information) risks, and legal fraud schemes such as false flood insurance claims and lawsuits.

Most domains mimic legitimate fundraising efforts but funnel donations to cybercriminals, according to a BforeAI investigation.

Theme  Description
Disaster Claims Fraud Merchandise & goods scams, including fake support stores (texasstrongnba.us, texasrentrelief.shop)
Donation & Relief Fraud Fake charities or funding platforms(prayfortexas.store, floodaid2025.org)
Volunteer/Registration Bait Pages collecting personal data(centraltxfloodhelp.com, texascares.org)
E-commerce Abuse Merchandise & goods scams, including fake support stores (texasstrongnba.us, texasrentrelief.shop)
Search Redirection & Cloaking Domains like texas-flood-today.pages.dev appearing in search or ad placement, redirecting to phishing or ad fraud
Reputation Piggybacking Use of .org, .gov-style names for increased user trust (texasfloodvictims.org, texasfloodrepair.org)

Other tactics include data harvesting forms, phishing campaigns redirecting to fake government aid pages, and e-commerce scams promoting counterfeit flood relief merchandise.  

Fake Texas flood-themed domain example
Fake Texas flood-themed domain example | Source: BforeAI

Investigators further observed that scammers employ tactics such as emotional language and imagery to manipulate their victims. Fraudulent websites, often hosted on free platforms, utilize SEO tactics to rank higher in search results, thereby increasing their reach to unsuspecting users.  

Exclusive Expert Insights

Rishika Desai, Security Analyst at BforeAI, stated to TechNadu that threat actors leverage rotating hosting infrastructure between less cooperative providers to evade detection and takedown efforts, making it harder for investigators to track and disrupt malicious campaigns. 

In this Texas flood scam campaign, emotionally charged delivery vectors were the most effective at engaging users and driving exploitation attempts, as these appeals manipulate urgency and sympathy to prompt quick action without careful consideration.

Implications for Disaster Response  

These disaster relief frauds jeopardize public trust in assistance systems and divert critical funds meant for recovery efforts. Victims risk financial loss, identity theft, and exposure of sensitive personal information. 

Experts recommend enhanced vigilance during disaster scenarios. Authorized agencies and organizations like FEMA and the Red Cross should amplify verified domains early to counter fraudulent efforts. 

For individuals, cybersecurity tips include avoiding suspicious links, verifying donation sources, and using secure payment methods. Implementing automated domain flagging systems during high-impact events can also reduce victim exposure to malicious platforms.  

In other news, TechNadu reported on fake VPN apps stealing data such as user logins and fake “Booking” sites distributing AsyncRAT.


For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: