
Bonk.fun hack triggers wallet drainer phishing attack. Solana launchpad warns users to avoid the site as losses and security risks emerge.
Author: Kritika Gupta
12th March 2026- The Bonk.fun hack has exposed users of the Solana-based memecoin launchpad to a sophisticated wallet-draining phishing attack following a domain compromise. The platform’s official X account and operator Tom, known as SolportTom, confirmed the breach on March 12, 2026 and warned users to avoid the site until security is fully restored. Early reports indicate that attackers deployed a fake Terms of Service signature prompt that enabled unauthorized transactions from connected wallets, highlighting ongoing risks linked to front-end exploits in the crypto ecosystem.
Importantly, the attack has affected only users who signed the deceptive prompt after the takeover. However, early reports suggest that losses have already reached hundreds of thousands of dollars. This incident highlights the persistent risks of front-end attacks in crypto, even on well-known platforms backed by Raydium and the broader BONK ecosystem.
High Signal Summary For A Quick Glance
Coin Bureau
@coinbureau
⚠️WARNING: https://t.co/xNoIRzsMCY DOMAIN COMPROMISED WITH WALLET-DRAINING PHISHING PROMPT Attackers have taken over the https://t.co/3DyPx8hpcz domain, pushing a fake TOS message designed to drain funds. The team has warned users to avoid the site until secured. https://t.co/VRKJ59Vk2G

05:00 AM·Mar 12, 2026
Tom
@SolportTom
Do not use the https://t.co/4xXs3cMJx0 domain until further notice, hackers have hijacked a team account forcing a drainer on the DOMAIN. URGENT.
02:56 AM·Mar 12, 2026
High attention and emotional sentiment detected.
Hackers gained access to a team-associated account and then injected malicious code into the bonk.fun frontend. Instead of executing a traditional domain registration hijack or exploiting smart contracts, attackers relied on social engineering or credential theft. As a result, they deployed a fake Terms of Service signature prompt. Once users signed it, they unknowingly authorized transactions that instantly drained their connected Solana wallets.
The team detected the compromise quickly. Operator Tom stated that hackers had hijacked a team account and forced a drainer onto the domain. Notably, the platform launched in April 2025 under the name LetsBonk.fun and had operated without major security incidents until this front-end breach.
This marks the first publicly reported domain compromise and wallet-draining incident for Bonk.fun hack since its inception. No earlier hacks targeting the platform or its predecessor appear in official records. Nevertheless, similar attacks have frequently affected Solana memecoin launchpads and DeFi platforms.
In comparable past incidents, including the Pump.fun-related theft that resulted in about two million dollars in losses, token prices typically experienced short-term volatility. Traders often reacted with panic selling, which temporarily reduced liquidity and trading activity. However, recovery usually followed once platforms contained the breach and reassured users that core infrastructure remained secure.
Early on-chain analysis and user reports indicate that at least one victim lost around 273,000 dollars. Additionally, multiple wallets collectively lost more than 114 SOL shortly after the breach. The attack targeted only those who interacted with the compromised site after the hijack. Therefore, users who previously connected wallets or traded through third-party interfaces such as Jupiter or Raydium have remained unaffected.
Meanwhile, Bonk.fun’s market share, which had already declined from its 2025 peak, now faces renewed scrutiny. Despite the incident, the BONK token has shown limited immediate price movement. It has traded near 0.0000071 dollars with minimal slippage so far. At the same time, speculative activity across the Solana memecoin ecosystem continues. However, community trust in centralized front-ends has weakened again.
Bonk.fun’s team has begun an internal investigation and is working to regain full control of the domain and remove malicious code. Users who visited the site since the breach should avoid bonk.fun until the team issues an official all-clear through verified X channels. They should also revoke recent approvals or signatures using Solana wallet tools such as Revoke.cash. In addition, users should monitor wallet activity closely and consider using hardware wallets or fresh addresses for future transactions.
Our Crypto Talk is committed to unbiased, transparent, and true reporting to the best of our knowledge. This news article aims to provide accurate information in a timely manner. However, we advise the readers to verify facts independently and consult a professional before making any decisions based on the content since our sources could be wrong too. Check our Terms and conditions for more info.
Bonk.fun Domain Hack Sparks Phishing Scam and Major Losses
Crypto Rover Scam Allegations Resurface Over Meme Token Promotions
Pink Drainer Transfer Triggers Security Concerns Across Crypto
Blockaid Exposes $230K Exploit on Gondi NFT Lending Protocol
Bonk.fun Domain Hack Sparks Phishing Scam and Major Losses
Crypto Rover Scam Allegations Resurface Over Meme Token Promotions
Pink Drainer Transfer Triggers Security Concerns Across Crypto
Blockaid Exposes $230K Exploit on Gondi NFT Lending Protocol