Cryip
  • Home
  • News
  • Research & Analysis
  • Reviews & Comparisons
  • Learn Crypto
  • Features
No Result
View All Result
Cryip
  • Home
  • News
  • Research & Analysis
  • Reviews & Comparisons
  • Learn Crypto
  • Features
No Result
View All Result
Cryip
No Result
View All Result
Home News Security & Hacks

BONK.fun Launchpad Hacked: Team Account Compromise Leads to Wallet Drainer

Hackers compromised a team account of BONK.fun, injecting a malicious wallet drainer into the website and targeting users who approved a fake Terms of Service prompt

by Saravana Kumar Mahendran
March 12, 2026
in Security & Hacks
0 0
BONK.fun Launchpad Hacked
Share on FacebookShare on Twitter

The Solana meme coin ecosystem faced a security incident after the popular launchpad BONK.fun was compromised. Hackers gained unauthorized access to a team account and injected a malicious wallet drainer into the platform’s website. The breach was confirmed by the project’s operator Tom, who warned users not to use the bonk.fun domain until the issue is resolved.

BONK.fun Launchpad Hacked
BONK.fun Launchpad Hacked

How the Hack Happened

According to initial reports, attackers managed to gain control of one of the project’s internal team accounts. Using that access, they pushed a malicious update to the BONK.fun website.The injected code displayed a fake “Terms of Service” approval prompt to visitors. When users approved or signed the message, a wallet drainer script was triggered. This script requested permissions and transferred SOL and other tokens from connected wallets to attacker-controlled addresses.

BONK.fun Launchpad Hacked
BONK.fun Launchpad Hacked

Impact of the Incident

The attack did not involve a smart contract exploit on the Solana network. Instead, it was a frontend compromise caused by unauthorized admin access to the website infrastructure. The BONK.fun team stated that users who connected to the platform before the breach are not affected. Only those who visited the website after the malicious code was deployed and signed the fake prompt were at risk.

Reports indicate that some losses occurred. One user reportedly lost around $273,000, while on-chain monitoring showed at least 114 SOL drained across several wallets.

What Users Should Do

Users are advised to avoid accessing the bonk.fun website until the platform confirms that it is secure again. Those who interacted with the website recently and approved any wallet prompts should review and revoke permissions using wallet approval tools. As an additional precaution, users may move their remaining assets to a new wallet address.

Current Status

The BONK.fun team is currently working to remove the malicious code and secure the platform’s infrastructure. A full technical explanation of how the team account was compromised has not yet been released.

Disclaimer: Cryip is an independent media and research outlet providing news, data, and analysis on the cryptocurrency industry. Content is for informational and research purposes only and does not constitute financial, legal, tax, or investment advice. Cryptocurrency markets are volatile and past performance is not indicative of future results. References to specific assets, platforms, or incidents are for journalistic purposes only and do not imply endorsement, and readers assume full responsibility for their decisions.
Tags: Crypto HacksSolana

Related Posts

Aftermath Finance Exploit
Security & Hacks

Aftermath Finance Exploit: $1.14M USDC Drained from Sui Perpetuals Protocol

by Saravana Kumar Mahendran
April 29, 2026

Aftermath Finance, a popular decentralized perpetuals trading platform on the Sui Network, has suffered a security exploit. The team officially...

Read moreDetails
ZetaChain GatewayEVM Hack

ZetaChain GatewayEVM Hack: $300K Loss from Team Wallets, Cross-Chain Transactions Paused

April 28, 2026
Believe Founder Pasternak Arrested on Assault; $313M Meme Platform Now Down 99%, Faces Lawsuit

Believe Founder Pasternak Arrested on Assault; $313M Meme Platform Now Down 99%, Faces Lawsuit

April 23, 2026
North Korean AI Hack on Zerion

North Korean AI Hack Hits Zerion, $100K Lost in Social Engineering Attack

April 15, 2026
Polkadot Bridge Exploit

Polkadot Bridge Exploit Technical Incident Analysis

April 13, 2026
Hyperbridge Exploit

Polkadot Bridge Exploit: 1B Fake DOT Minted on Ethereum

April 13, 2026
Blockchain On-Chain Metrics: Ethereum, Bitcoin, Solana, BSC, Tron & Base Weekly Report (April 06 – 12, 2026)

Blockchain On-Chain Metrics: Ethereum, Bitcoin, Solana, BSC, Tron & Base Weekly Report (April 06 – 12, 2026)

April 13, 2026
Next Post
US Prosecutors Urge Judge to Reject Sam Bankman-Fried’s Request for New Trial

US Prosecutors Urge Judge to Reject Sam Bankman-Fried’s Request for New Trial

Cryip focuses on crypto research and on-chain analysis, supported by coverage of markets, regulation, security events, and blockchain ecosystems.

Recent Posts

  • Eric Trump Bitcoin Venture Collapse Investors Lose $500M While Insiders Profit
  • Aftermath Finance Exploit: $1.14M USDC Drained from Sui Perpetuals Protocol
  • HKMA Warns of Fake Hong Kong Stablecoins Like “HKDAP,” Says No Licensed Issuers Yet

Categories

  • AI × Crypto
  • Data & Dashboards
  • Market Updates
  • On-Chain Analysis
  • OpSec
  • Policy & Regulation
  • Post Mortems
  • Reports
  • Scams & Fraud
  • Security & Hacks
  • Stablecoins
  • Tokenomics
  • VC & Funding

Company

  • About Us
  • Contact Us
  • Editorial Standards & Integrity
  • Our Team
  • Privacy Policy
  • Review Methodology
  • Terms and Conditions
  • Trust, Disclosures & Independence

© 2026 Cryip - Research-Driven Crypto Analysis & News by Hashlays.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

No Result
View All Result
  • Home
  • News
  • Research & Analysis
  • Reviews & Comparisons
  • Learn Crypto
  • Features

© 2026 Cryip - Research-Driven Crypto Analysis & News by Hashlays.

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.