Home Depot Halloween Phishing Scam Uses Fake Giveaway to Steal Personal and Financial Information

Published
Written by:
Lore Apostol
Lore Apostol
Cybersecurity Writer

A timely and deceptive Home Depot phishing scam is making the rounds, attempting to trick users with a fake Halloween giveaway. The phishing emails, which claim the recipient has won a valuable "Gorilla Carts dump cart," are designed to appear legitimate but hide a multi-stage attack intended to steal personal and financial information. 

The campaign demonstrates a notable level of sophistication, employing several tactics to evade detection and build a false sense of trust with the target.

Technical Breakdown of the Halloween Phishing Attack

Attackers are using several advanced techniques to bypass security filters. The phishing emails originate from a compromised, non-related domain belonging to a Los Angeles high school, a clear red flag, Malwarebytes warned in its latest report. 

Clickable image in the phishing email
Clickable image in the phishing email | Source: Malwarebytes

To evade automated spam detection, the email body contains hidden Unicode whitespace and control characters that break up text strings without being visible to the human eye. 

Fake Home Depot website
Fake Home Depot website | Source: Malwarebytes

Furthermore, the phishers have embedded a legitimate, but very old, order confirmation from a real vendor at the bottom of the email. 

This tactic is designed to make the email appear as part of a valid, ongoing conversation, which can trick some filters into assigning it a higher trust score.

The page asks for a processing fee at the end
The page asks for a processing fee at the end | Source: Malwarebytes

Clicking the link in the email initiates a complex chain of redirects, starting from a compromised WordPress site and passing through several domains to a final landing page. This landing page, designed to mimic Home Depot's branding, pressures the user with a sense of urgency before presenting a survey. 

After completing the survey, the user is prompted to enter personal shipping details and then asked for an $11.97 "processing fee" to claim their non-existent prize. 

The Path to Data Theft and Phishing Prevention Tips

For enhanced cybersecurity awareness, users should never click on links in unsolicited emails, always verify the sender's address, and avoid entering personal or payment information on unfamiliar sites. Using a real-time anti-malware solution with web protection is also a critical defense.

Last month, an SVG phishing campaign leveraging CountLoader to deliver Amatera Stealer and PureMiner targeted Ukraine. 

Also, phishing emails with voicemail or purchase lures redirect to spoofed pages featuring the victim’s email and company logo in an August UpCrypter campaign that delivered DCRat, Babylon RAT, and PureHVNC.


For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: