Bonk.fun Website Hijacked, Wallet Drainer Deployed via Fake Terms-of-Service Prompt
Solana's dominant meme coin launchpad had its official domain compromised on March 12, 2026, exposing visitors to a wallet-draining script disguised as a routine website interaction.
Threat actors seized administrative control of Bonk.fun (also known as LetsBONK.fun) and injected a wallet-draining script directly into the live website. Any user who visited the compromised domain and signed what appeared to be a standard Terms of Service agreement unknowingly authorized the attacker's script to move funds out of their connected wallet. A platform operator identified as "Tom" publicly confirmed the breach and urged all users to stop accessing the bonk.fun domain immediately.
What Happened
This style of attack is known as a frontend or domain hijacking. The underlying Bonk.fun smart contracts on Solana were never touched. Instead, attackers compromised the team's administrative account credentials and used that access to modify what users see when they visit the site. The fraudulent Terms of Service prompt functioned as a social engineering trap: it looked like a routine website notice but was actually a transaction request that granted the drainer permission to transfer assets.
Users who had previously connected wallets but did not sign the fake prompt were reportedly unaffected. Those trading through third-party interfaces such as Jupiter, an aggregator that routes Solana token swaps, also avoided exposure because they never interacted with the compromised frontend directly.
Major web browsers including Chrome and Firefox began displaying phishing warnings for the bonk.fun URL shortly after the attack began. These warnings provided a secondary layer of protection, though they may not have reached users who signed the prompt before the flags were raised. The Bonk operator stated that total financial losses were "minimal," though no specific figures were disclosed at the time of publication.
Platform Background and Scale
Bonk.fun is a no-code token creation platform built on Solana that allows anyone to launch a meme coin using a bonding curve mechanism, similar in design to the rival platform Pump.fun. Tokens that meet graduation thresholds automatically list on the Raydium decentralized exchange and become accessible through Jupiter.
The platform launched in April 2025 and grew rapidly. Within a single month in July 2025, its share of all Solana launchpad activity climbed from roughly 13% to over 78%. During that same period, LetsBONK recorded weekly revenue of $7.87 million, representing 57% of all Solana launchpad fees combined. By mid-2025, the platform had been processing more than 130,000 new token launches per week, according to CoinGecko, and had logged single-day fees of $352,793, a figure roughly 600% higher than the same period a year prior.
The BONK token itself was trading at approximately $0.000006 at the time of the attack, with a market capitalization between $524 million and $539 million according to CoinGecko and CoinMarketCap data. The token's 24-hour price change on the day of the attack ranged from -0.50% to +3.54% depending on the source, suggesting the broader market absorbed the news without major immediate disruption.
A Recurring Attack Pattern
This incident fits a documented and growing pattern of frontend attacks against high-traffic Web3 platforms. In May 2025, Curve Finance lost $3.5 million after attackers redirected its frontend traffic to a phishing site linked to the Inferno Drainer toolkit; that attack was detected and mitigated by Hypernative, a blockchain security monitoring firm, demonstrating that third-party monitoring infrastructure exists and can provide meaningful protection in comparable incidents. Arrakis Finance suffered a similar DNS compromise in January 2025. Radiant Capital faced a more sophisticated variant when attackers compromised developer devices to inject malicious code into the Safe wallet interface, resulting in approximately $50 million in losses.
What makes these attacks particularly dangerous is that no amount of smart contract auditing prevents them. The vulnerability lies in access controls around domain registrars and web hosting accounts, not in the on-chain code itself.
Regional Risk: Why Emerging Market Users Face Greater Exposure
The attack carries heightened implications for retail users across South Asia and Sub-Saharan Africa, two of the fastest-growing regions for on-chain crypto activity. The Asia-Pacific region recorded a 69% year-over-year increase in crypto value received in 2025, rising from $1.4 trillion to $2.36 trillion. India, Pakistan, and Vietnam were among the leading countries for fastest-growing on-chain activity in the region, and both India and Pakistan ranked among Chainalysis's top global crypto adoption countries for 2025. Sub-Saharan Africa received over $205 billion in on-chain value between July 2024 and June 2025, with retail transfers below $10,000 accounting for over 8% of regional activity, compared to a 6% global average.
Nigeria's crypto activity surged specifically in March 2025 following a currency devaluation event, a detail that helps explain why retail users across the region may have been especially active on platforms like Bonk.fun at the time of this incident.
Many users in these markets are first-generation DeFi participants accessing platforms primarily through mobile wallets such as MetaMask and Phantom. Mobile wallet interfaces typically show less detail about what a transaction signature authorizes, making it harder to distinguish a legitimate prompt from a malicious one. Access to real-time security tools such as transaction simulators (Blowfish, Pocket Universe) remains limited across these regions.
Legitimate Terms of Service agreements do not require a wallet signature that moves funds. If any platform prompts a wallet approval alongside a ToS notice, that is a strong signal something is wrong.
What Comes Next
No post-mortem or restoration timeline had been published at the time of reporting. The team instructed users to avoid the bonk.fun domain entirely and indicated work was underway to regain control of the site. Notably, no statement had been issued by the BONK Foundation or the LetsBONK core development team beyond the operator's initial comments. The incident adds to an already costly year for the industry: total losses from crypto hacks reached $3.4 billion across 2025, according to ForkLog.
Frontend security has become an increasingly urgent infrastructure problem for Web3 platforms at scale. Tools including DNSSEC (a protocol that adds cryptographic verification to domain name lookups), hardware-based multi-factor authentication on registrar accounts, and real-time frontend monitoring services are available but inconsistently deployed. The accumulating pattern of incidents across Curve Finance, Arrakis Finance, Radiant Capital, and now Bonk.fun points to a consistent finding: for platforms handling significant transaction volume, the gap between on-chain security and web infrastructure security is where attackers continue to find their opening.