TLDR
- Hackers took control of the Bonk.fun domain and deployed a wallet drainer.
- Users who signed a fake terms-of-service prompt risked losing funds.
- The breach happened after an attacker compromised a team account.
- Only users interacting during the hijack window were affected by the attack.
Bonk.fun, a Solana-based memecoin launchpad, has been hijacked by attackers who gained control of the platform’s domain. The hackers deployed a wallet-draining scheme designed to trick users into signing malicious transactions. The Bonk.fun team issued an urgent warning for users to avoid the site until further notice. Those who interacted with the compromised website risked losing their funds to the malicious script.
Bonk.fun Domain Hijacked by Hackers
The Bonk.fun platform, a popular Solana-based memecoin launchpad, has fallen victim to a domain hijacking. Hackers gained control of the domain on March 11, 2026, and deployed a wallet-draining scheme. Users were warned not to interact with the site as the team worked to regain control and secure the platform.
The malicious actors compromised a team account, which gave them the ability to alter the website’s interface. A fake terms-of-service pop-up was presented to visitors, tricking them into signing a transaction that allowed the attackers to drain funds from their wallets. The Bonk.fun team has confirmed the breach and advised users to avoid the website until it is secured.
How the Hackers Exploited the Platform
The hackers did not exploit vulnerabilities in the blockchain itself, but rather targeted the platform’s user interface. According to a statement from Tom, an operator behind the platform, the attackers hijacked a team account to push the malicious wallet drainer onto the site.
Once users visited the site, they were greeted with a fake prompt that appeared to be a standard compliance message. When users interacted with the prompt, they unknowingly granted the hackers permission to access and drain their wallets. This scheme did not involve any issues with the blockchain or smart contracts but focused on manipulating the platform’s front-end.
A Rapid Response Minimizes Damage
The Bonk.fun team responded quickly after identifying the attack, limiting the potential damage. The team stated that the losses from the breach were minimal, as the attack was detected early. The users affected were those who interacted with the website during the active hijack window.
Users who had connected their wallets to Bonk.fun prior to the breach, or those using third-party trading platforms, were unaffected. The team has assured the public that they are working to secure the platform and restore its functionality.
The incident highlights an increasing trend in the crypto space where attackers target websites and user interfaces rather than blockchain protocols. This kind of attack poses a risk to users who trust the platform’s interface without verifying its legitimacy.





