BTCC / BTCC Square / Cryptonews /
URGENT WARNING: Bonk Fun Website Hijacked - Live Exploit Actively Draining User Funds

URGENT WARNING: Bonk Fun Website Hijacked - Live Exploit Actively Draining User Funds

Author:
Cryptonews
Published:
2026-03-12 07:41:34
12
1

The official Bonk Fun website, a major Solana memecoin launchpad, has been seized by a malicious actor deploying a live wallet drainer, prompting an urgent 'DO NOT INTERACT' warning from the platform's team. The security breach coincides with a sharp 10% correction in the BONK token, compounding losses in a year where the memecoin has already plummeted 45%. Users connecting wallets to the compromised site face immediate asset theft as the exploit remains active.

The Bonk Fun meme coin launchpad is the latest Solana platform to be hacked, with the BONK token falling -1.5% as the news broke

SOURCE: TradingView

How Did the Malicious Actor Breach the Bonk Fun Front-End?

The attack vector exploits user trust rather than the blockchain infrastructure itself. According to X user SolportTom, the platform’s operator, hackers hijacked a team account to force a drainer onto the domain. This is not a smart contract failure; it is a front-end takeover.

Visitors to the site are currently greeted with a fake terms-of-service message. This pop-up, which mimics standard compliance requests, is the trigger mechanism.

To answer the concerns I’m seeing:

1. No if you connected to bonk fun in the past you’re not affected

2. No if you trade bonk fun tokens on terminals etc you’re not affected

3. The only people affected were people who signed a fake TOS message on the bonkfun domain after…

— Tom (@SolportTom) March 12, 2026

If you sign this request, the protocol grants the attacker permission to empty your wallet, and it will happen within seconds.

“A malicious actor has compromised the BONKfun domain,” the platform announced via its official X account. “Do not interact with the website until we have secured everything.”

How Much Has Been Drained and Who Is Affected

The Bonk.fun team hasn’t confirmed how much was lost to the hack, but has stated that losses are “minimal,” attributing the low damage to the developers’ rapid detection.

Only users who interacted with the fraudulent terms-of-service prompt during the active hijack window were affected. However, the exact dollar figure verified by on-chain analysis remains pending.

🚨AAVE ORACLE GLITCH TRIGGERS $26M IN WRONGFUL LIQUIDATIONS

A pricing oracle error on Aave caused about $26million in wstETH positions across 34 accounts to be unfairly liquidated after the system reported an incorrect exchange rate, with affected users set to be compensated. pic.twitter.com/qMbsAhQnnl

— Coin Bureau (@coinbureau) March 11, 2026

This incident mirrors broader risks in the sector, as an Aave oracle glitch triggered liquidations earlier this year due to interface and data anomalies.

While the mechanics differ, the result for user funds is identical: an unexpected loss due to a technical compromise.

Phishing attacks like this are becoming industrialized. According to Chainalysis, overall crypto scam losses reached approximately $17Bn in 2025.

The shift toward domain hijacking indicates attackers are bypassing protocol security to target the user interface directly.

What Bonk.fun Users Need to Do Right Now

If you have visited Bonk.fun in the last 24 hours, assume your session security was compromised. Front-end attacks often bypass standard defenses, as the recent discovery by Ledger researchers of an Android flaw enabling wallet seed phrase theft demonstrates.

Take these steps immediately:

  • Disconnect your wallet: Remove Bonk.fun from your connected sites list in your wallet settings.
  • Revoke approvals: Use a tool like Revoke.cash to revoke any recent permissions granted to Bonk.fun contracts.
  • Check your history: Verify that no unauthorized transfers have occurred.

“We understand a lot of people are scared and rightly so, but we’re doing everything in our power to fix the situation,” SolportTom wrote.

Users should now sit tight and wait for an official “all-clear” from the Bonk.fun X account before returning to the site.

If the site remains compromised for another 24 hours, user migration to rival launchpads like Pump.fun will likely accelerate, and Bonk.fun may struggle to regain whatever was left of its userbase.

If the team resolves the DNS hijack quickly and refunds the “minimal” losses, confidence may stabilize, but the pressure is now on the operators to prove the domain is safe.

|Square

Get the BTCC app to start your crypto journey

Get started today Scan to join our 100M+ users

All articles reposted on this platform are sourced from public networks and are intended solely for the purpose of disseminating industry information. They do not represent any official stance of BTCC. All intellectual property rights belong to their original authors. If you believe any content infringes upon your rights or is suspected of copyright violation, please contact us at [email protected]. We will address the matter promptly and in accordance with applicable laws.BTCC makes no explicit or implied warranties regarding the accuracy, timeliness, or completeness of the republished information and assumes no direct or indirect liability for any consequences arising from reliance on such content. All materials are provided for industry research reference only and shall not be construed as investment, legal, or business advice. BTCC bears no legal responsibility for any actions taken based on the content provided herein.