
The official website for the Solana memecoin launchpad, Bonk Fun, has been hijacked. A malicious actor seized control of the domain on Wednesday (March 11), deploying a wallet drainer disguised as a standard interaction.
The platform’s team has issued an urgent warning: do not interact with the website until further notice. Users who connect their wallets and sign the current prompts face immediate theft of their assets.
As news of the BONK meme coin spreads, it has dropped nearly 1% over the past 24 hours, following a disastrous year in which the Solana meme coin lost -45% of its value.
It is a bad time for a platform hack, as the meme coin sector has enjoyed a +2.5% daily pump, taking the total market cap back above $32Bn, with tokens like DOGE, PEPE, Memecore, and SHIB all posting green candles.

How Did the Malicious Actor Breach the Bonk Fun Front-End?
The attack vector exploits user trust rather than the blockchain infrastructure itself. According to X user SolportTom, the platform’s operator, hackers hijacked a team account to force a drainer onto the domain. This is not a smart contract failure; it is a front-end takeover.
Visitors to the site are currently greeted with a fake terms-of-service message. This pop-up, which mimics standard compliance requests, is the trigger mechanism.
If you sign this request, the protocol grants the attacker permission to empty your wallet, and it will happen within seconds.
“A malicious actor has compromised the BONKfun domain,” the platform announced via its official X account. “Do not interact with the website until we have secured everything.”
How Much Has Been Drained and Who Is Affected
The Bonk.fun team hasn’t confirmed how much was lost to the hack, but has stated that losses are “minimal,” attributing the low damage to the developers’ rapid detection.
Only users who interacted with the fraudulent terms-of-service prompt during the active hijack window were affected. However, the exact dollar figure verified by on-chain analysis remains pending.
This incident mirrors broader risks in the sector, as an Aave oracle glitch triggered liquidations earlier this year due to interface and data anomalies.
While the mechanics differ, the result for user funds is identical: an unexpected loss due to a technical compromise.
Phishing attacks like this are becoming industrialized. According to Chainalysis, overall crypto scam losses reached approximately $17Bn in 2025.
The shift toward domain hijacking indicates attackers are bypassing protocol security to target the user interface directly.
EXPLORE: Best Crypto Presales to Buy in 2026
What Bonk.fun Users Need to Do Right Now
If you have visited Bonk.fun in the last 24 hours, assume your session security was compromised. Front-end attacks often bypass standard defenses, as the recent discovery by Ledger researchers of an Android flaw enabling wallet seed phrase theft demonstrates.
Take these steps immediately:
- Disconnect your wallet: Remove Bonk.fun from your connected sites list in your wallet settings.
- Revoke approvals: Use a tool like Revoke.cash to revoke any recent permissions granted to Bonk.fun contracts.
- Check your history: Verify that no unauthorized transfers have occurred.
“We understand a lot of people are scared and rightly so, but we’re doing everything in our power to fix the situation,” SolportTom wrote.
Users should now sit tight and wait for an official “all-clear” from the Bonk.fun X account before returning to the site.
If the site remains compromised for another 24 hours, user migration to rival launchpads like Pump.fun will likely accelerate, and Bonk.fun may struggle to regain whatever was left of its userbase.
If the team resolves the DNS hijack quickly and refunds the “minimal” losses, confidence may stabilize, but the pressure is now on the operators to prove the domain is safe.
DISCOVER: The 16 Best Meme Coins to Buy in March 2025
