
The recent Texas floods have sparked a surge in Texas flood scams, as cybercriminals have registered over 70 suspicious domains within 10 days of the flooding onset, exploiting the heightened need for aid and public compassion to execute their fraudulent schemes.
Threat actors have deployed a variety of scams consistent with past threat actor patterns during crises, including fake donation platforms, impersonated volunteer registration sites with PII-harvesting (Personally Identifiable Information) risks, and legal fraud schemes such as false flood insurance claims and lawsuits.
Most domains mimic legitimate fundraising efforts but funnel donations to cybercriminals, according to a BforeAI investigation.
Other tactics include data harvesting forms, phishing campaigns redirecting to fake government aid pages, and e-commerce scams promoting counterfeit flood relief merchandise.
Investigators further observed that scammers employ tactics such as emotional language and imagery to manipulate their victims. Fraudulent websites, often hosted on free platforms, utilize SEO tactics to rank higher in search results, thereby increasing their reach to unsuspecting users.
Rishika Desai, Security Analyst at BforeAI, stated to TechNadu that threat actors leverage rotating hosting infrastructure between less cooperative providers to evade detection and takedown efforts, making it harder for investigators to track and disrupt malicious campaigns.
In this Texas flood scam campaign, emotionally charged delivery vectors were the most effective at engaging users and driving exploitation attempts, as these appeals manipulate urgency and sympathy to prompt quick action without careful consideration.
These disaster relief frauds jeopardize public trust in assistance systems and divert critical funds meant for recovery efforts. Victims risk financial loss, identity theft, and exposure of sensitive personal information.
Experts recommend enhanced vigilance during disaster scenarios. Authorized agencies and organizations like FEMA and the Red Cross should amplify verified domains early to counter fraudulent efforts.
For individuals, cybersecurity tips include avoiding suspicious links, verifying donation sources, and using secure payment methods. Implementing automated domain flagging systems during high-impact events can also reduce victim exposure to malicious platforms.
In other news, TechNadu reported on fake VPN apps stealing data such as user logins and fake “Booking” sites distributing AsyncRAT.