|

Phishing Gets Hyperliquid: When Google Ads Serve the Payload

Image

While poking around Hyperliquid ecosystem tools — partly to amuse a crypto-obsessed colleague — we stumbled onto a phishing campaign that’s both simple and elegant: it uses Google Ads to serve malware to people searching for HypurrScan, the blockchain explorer for Hyperliquid.

What followed wasn’t a wallet-draining link or seed phrase scam. This was command execution via fake CAPTCHA, built into a spoofed Cloudflare page, targeting the exact kind of user likely to have crypto holdings.

The Attack Flow: Clean, Layered, and Deceptive

1. User searches for “Hypurrscan”

Google serves a sponsored ad — it looks legit: hypurrscan.io complete with metadata and branding.

hypurrscan - a hyperliquid scanner
2. Click leads to a phishing domain

The ad redirects to hypurrscan.net, a spoofed site mimicking the original. It loads a “Verify you are human” page.

phishing site redirect
3. Fake CAPTCHA loads distorted images

The site presents an AI-generated visual puzzle — designed not to validate anything, just to stall and engage the user.

AI generated fake phishing CAPTCHA

Error triggers the real attack and phishing gets Hyperliquid

As you begin interacting, it throws an error and loads a new screen instructing you to complete manual verification:

Paste and run window in action

 The Payload: “Paste and Run

This phishing kit applies a growing technique we’ve seen more frequently: the attacker tricks the user into launching a Windows Run dialog, pasting a preloaded command, and executing it — all under the guise of a verification step.

It’s elegant, because:

  • It sidesteps browser-based protections entirely
  • The victim runs the payload themselves
  • It doesn’t need macros, downloads, or file execution to be effective

Typical outcomes from this approach include:

  • Downloading and executing malware (e.g. infostealers, remote access tools)
  • Setting persistence via shell:startup, scheduled tasks, or registry keys
  • Establishing a connection back to attacker-controlled infrastructure

This is social engineering meets command execution, and it’s incredibly effective — especially against tech-savvy users who’ve learned to trust these kinds of browser prompts.

Why Hyperliquid?

The choice of HypurrScan as bait isn’t random. By buying ad placement on a niche blockchain explorer, attackers:

  • Target users likely to hold crypto
  • Top 10 Crypto and rising
  • Know exactly which chain they’re active on (Hyperliquid)
  • Can profile victims with high precision based on search intent

This is a surgical phishing funnel. Not broad spray-and-pray spam. It’s crafted for maximum relevance and conversion. And that’s how Phishing gets Hyperliquid! 😉

Recommendations

  1. Audit Your Brand in Search Results
    Especially in crypto and Web3, search abuse is rampant. Regularly check for both organic and sponsored impersonation of your tools, explorers, and wallets.
  2. Expand Security Awareness to Include Browser Phishing
    Your users might know how to spot a fake email — but not a spoofed CAPTCHA or OS-level prompt. Train them to recognize these hybrid techniques.
  3. Report and Monitor Ad Abuse
    Google does take malicious ads down, but only if flagged. Use screenshots, network captures, and short descriptions when reporting.
  4. Assume Targeted Intent
    If your brand or tool is being impersonated, assume your users are being profiled. Phishing is no longer random — it’s intent-aware.

 Final Note: The One That Got Away

Unfortunately, the phishing site was taken offline before we could collect the full payload. But based on the structure, behavior, and timing, it’s clear this wasn’t a sloppy one-off. It’s part of an ongoing evolution — phishing campaigns that borrow modern UI patterns, legit ad platforms, and user-triggered execution.

Phishing gets hyperliquid (or not when the site is taken offline)

Go to overview