back to top

Bonk.fun Domain Compromised and Used to Distribute a Cryptocurrency Wallet‑Draining Scheme.

Bonk.fun Domain Compromised, Fraudulent Wallet‑Draining Prompt Deployed

The Solana‑based memecoin launchpad’s website was hijacked on Thursday, prompting a fake “terms‑of‑service” dialog that tricked several users into signing a malicious transaction. The project’s team warned the community, reported limited losses and has been working to regain control of the domain.


Incident overview

During the early hours of Thursday, the bonk.fun domain, which serves as the official front‑end for the Solana‑native memecoin launchpad Bonk, was taken over by an unauthorised party. The attackers accessed a privileged account belonging to the Bonk team and altered the site’s code to display a counterfeit prompt that asked visitors to approve a transaction. The prompt was framed as a “terms‑of‑service” agreement, but the underlying transaction was designed to transfer funds from the user’s wallet to an address controlled by the perpetrators.

The breach was first disclosed by Bonk’s official X account, which advised users to avoid the site until the situation was resolved. An operator known on X as “Tom” (a core contributor to Bonk.fun) later confirmed that the compromised account was used to push the fake dialog and that the exploit targeted only visitors who interacted with the altered page. Users who had previously connected their wallets to Bonk.fun or who trade BONK‑related tokens through external platforms such as decentralized exchanges were not directly affected.

Reported losses

In the wake of the warning, several community members posted on X that they had suffered token losses after inadvertently signing the fraudulent transaction. Reported amounts varied:

  • One user claimed a loss of roughly 50 SOL.
  • Another reported around 10 SOL drained from their wallet.
  • Additional posts mentioned smaller, unspecified amounts.

Tom later stated that the incident had been contained quickly and that the total volume of stolen funds appeared limited compared to the potential exposure. Nevertheless, the reports underscored how a single compromised domain can become a vector for wallet‑draining attacks, especially on ecosystems that rely heavily on web‑based wallet integrations.

Response from Bonk.fun

The Bonk team moved to secure the domain and remove the malicious code. In a follow‑up X post, they reassured the community that they were “doing everything in our power to fix the situation” and that they were conducting a forensic review to determine how the attacker gained access to the team account. As of publication, the domain appears to be under the control of the original developers again, and no further fraudulent prompts have been observed.

Cointelegraph reached out to Tom for additional comment; a response had not been received at the time of writing.

Analysis

The hijack highlights a recurring security challenge for blockchain projects that maintain a front‑end web presence:

Aspect Implication
Account compromise Attackers leveraged legitimate credentials, suggesting insufficient multi‑factor protection or credential hygiene.
Phishing via legit domain Users trust the domain because it matches the official project, making malicious prompts more convincing.
Transaction signing risk Wallets that automatically approve on‑chain requests without manual verification are especially vulnerable.
Scope of impact Because the exploit required a user to interact with the compromised site, the damage was confined to a subset of the community, but the potential for larger loss remains high.

Security experts recommend that users always review transaction details in their wallet before confirming, especially when prompted by a website they have not visited recently. Relying on a single point of interaction—such as a launchpad’s home page—for wallet connections can create a single point of failure.

Key takeaways

  • Domain hijacks can be used to inject malicious on‑chain prompts. Even when a blockchain is permissionless, the UI layer remains a critical attack surface.
  • Multi‑factor authentication (MFA) for team accounts is essential. Compromise of internal credentials is a common entry point for attackers.
  • Users should treat any unexpected signing request with suspicion. Verify the destination address and purpose of the transaction before confirming.
  • Projects must maintain rapid incident response plans. Prompt public warnings and swift containment helped limit the scale of the breach.
  • Community vigilance remains a line of defence. Early reports from affected users enabled the team to act quickly and the broader community to avoid interacting with the compromised site.

As the crypto ecosystem continues to expand, the incident serves as a reminder that security must extend beyond smart contracts and on‑chain code to include the web interfaces that bridge users to decentralized services.



Source: https://cointelegraph.com/news/bonk-fun-domain-hijack-wallet-drainer-solana?utm_source=rss_feed&utm_medium=feed&utm_campaign=rss_partner_inbound

Exit mobile version