ChainStreet
WHERE CODE MEETS CAPITAL
Loading prices…
Powered by CoinGecko
Blockchain Tech

New Crypto Scam: Fake Hyperliquid App on Google Play Exposed

New Crypto Scam: Fake Hyperliquid App on Google Play Exposed

A fraudulent app posing as Hyperliquid slipped past Google Play’s defenses, sparking warnings for crypto users.

Key Takeaways
  • Scammers bypass automated security protocols to publish a fraudulent mobile application impersonating the Hyperliquid exchange on the Google Play Store.
  • Blockchain investigator ZachXBT identifies the software as a critical credential stealer actively extracting private wallet keys and seed phrases.
  • This sophisticated breach exposes the systemic inability of technology corporations like Google to police malicious clones within their marketplaces.
Listen to this article

Blockchain investigator ZachXBT first flagged a fake Hyperliquid app on Google Play that mimicked the exchange’s interface and branding.

Fake Hyperliquid App Bypasses Google Safeguards

On November 7, an alert from ZachXBT put the crypto community on notice about a fake Hyperliquid app appearing in the Google Play Store. The post called attention to how easily polished impostors can appear in major app marketplaces. 

The on-chain sleuth shared the screenshot showing the design cues resembling the real platform to appear legitimate. ZachXBT also noted, “None of these platforms seem to do a good job of filtering these scams out.” In addition to the warning, he also shared the “theft address.”

New Crypto Scam: Fake Hyperliquid App on Google Play Exposed

Malware Confirmed to Target Seed Phrases and Private Keys

The malware analysis, conducted by X user @Phish_Destroy, dated November 7, 2025, classified the fraudulent app as a “credential_stealer” of critical severity. The report confirmed the explicit goal of the application was to steal specific data: seed phrases, private keys, and general wallet credentials.

Advertisement · Press Release

Genuine News Deserves Honest Attention.

High-conviction projects require an intelligent audience. Connect with readers who value sharp reporting.

👉 Submit Your PR

The analysis identified the app’s malicious network infrastructure, including the domain hyperl-jeet[.]sbs. All communications with the fraudulent application utilized this unique, non-official domain.

Sophisticated Features Designed to Evade Detection

The technical analysis also indicated that the fake Hyperliquid app employed several sophisticated security features intended to conceal its malicious activity and evade detection by security software. These features included obfuscation and SSL pinning. 

Obfuscation is used to make the malicious code difficult to reverse-engineer, while SSL pinning prevents security researchers from easily intercepting and analyzing the app’s network traffic. The app, with the package name com.renault.fisiop, explicitly impersonated the Hyperliquid brand, targeting the DeFi wallet user base. 

How to Stay Safe

  • Do not download any mobile app claiming to be Hyperliquid.
  • Always access Hyperliquid through the official web platform.
  • Avoid entering wallet information or seed phrases into apps you cannot verify.
  • Remove suspicious apps immediately and consider using hardware wallets for added security.

Chain Street’s Take

This fake Hyperliquid app shows how scammers continue to target crypto users through app stores. Even polished listings can be deceptive, emphasizing the importance of verifying sources and exercising caution. 

CHAIN STREET INTELLIGENCE

Activate Intelligence Layer

Institutional-grade structural analysis for this article.

FAQ

Frequently Asked Questions

01

What is the fake Hyperliquid app?

It is a malicious mobile application engineered to mimic the interface of the Hyperliquid decentralized finance platform. The software bypassed the automated security filters maintained by the Google Play Store. The application operates strictly as malware designed to steal sensitive user credentials and private keys.
02

Why does this matter for mobile security?

The incident demonstrates that trusted centralized distribution platforms cannot guarantee the safety of digital asset applications. Users who download the software grant scammers complete access to their Ethereum or Bitcoin wealth. This vulnerability forces the decentralized finance sector to establish independent verification methods for official software releases.
03

How did the malware execute the theft?

The malware executes the theft by tricking users into manually typing their cryptographic seed phrases into a fake login screen. The application utilizes sophisticated obfuscation techniques and SSL pinning to hide its illicit network traffic from security researchers. The stolen data routes directly to the hyperl-jeet[.]sbs domain controlled by the attackers.
04

What are the risks or critiques?

The primary risk is the immediate and irreversible loss of all digital assets held within the compromised wallet. Critics argue that tech giants like Google lack the specialized blockchain expertise required to properly audit financial applications. Decentralized platforms face severe reputational damage when users lose funds to sophisticated impersonators.
05

What happens next?

Security researchers will continue to monitor centralized application stores for similar clones targeting alternative decentralized protocols. Google will likely face intense public pressure to overhaul its developer vetting process for financial software. Users must transition to utilizing hardware wallets that require physical confirmation for outbound blockchain transactions.

You Might Also Like

CHAINSTREET
🛡
Alex Reeve

Alex Reeve is a contributing writer for ChainStreet.io. Her articles provide timely insights and analysis across these interconnected industries, including regulatory updates, market trends, token economics, institutional developments, platform innovations, stablecoins, meme coins, policy shifts, and the latest advancements in AI, applications, tools, models, and their broader implications for technology and markets.

The views and opinions expressed by Alex in this article are her own and do not necessarily reflect the official position of ChainStreet.io, its management, editors, or affiliates. This content is provided for informational and educational purposes only and does not constitute financial, investment, legal, or tax advice. Readers should conduct their own research and consult qualified professionals before making any decisions related to digital assets, cryptocurrencies, or financial matters. ChainStreet.io and its contributors are not responsible for any losses incurred from reliance on this information.