Crypto Warning: Bonk.fun Domain Hack Exposes Solana Traders To Wallet Drain

bitcoinistPubblicato 2026-03-14Pubblicato ultima volta 2026-03-14

Introduzione

Crypto platform Bonk.fun suffered a domain hijacking attack on March 12, 2026, exposing users to a wallet-draining exploit. Hackers injected a malicious script on the website, prompting users to sign a fake "Terms of Service" agreement, which, when approved, allowed the attackers to steal funds. The team confirmed that only users who interacted with the fraudulent prompt after the hack were affected, and losses were reported as minimal. The breach was attributed to a Web2 infrastructure failure rather than a smart contract exploit. This incident highlights the growing threat of approval-phishing and domain hijacking attacks in the crypto space, underscoring the need for heightened user caution and improved security practices.

A Crypto platform confirmed that their main domain website had been hacked, which exposed its users to a wallet draining exploit.

A No-Fun Crypto Hijack

It is a truth universally acknowledge that, no matter the size of a global geopolitical crisis, hackers will continue to ravage through the crypto market. This time, the victim was memecoin issuance platform Bonk.fun. In a March 12 post on the social network X, Tom (@SolportTom), one of its operators, warned the users not to interact with the domain “until further notice”, as hackers had injected a crypto wallet drainer on it:

The official X account of the Solana token launchpad, backed by Raydium and the BONK community, also announced the hack and echoed Tom’s striking warning:

Who Is Affected And How

Tom explained that the phishing scam set up a fake “Terms of Services” (TOS) signature prompt which, when signed, allowed the drainer to move the unaware user’s funds. According to Tom, the only users compromised were the ones who interacted with the fake TOS. He clarified that neither previously connected users nor traders of bonk fun tokens on third-party terminals were affected. He also assured that the security breach was spotted early so “the losses are minimal to date”:

This is not a Raydium or BONK smart contract exploit, but the case of a Web2 infrastructure failure that bled directly into Web3. This type of domain hijacking and phishing drainer scripts work by the attackers taking over the frontend and presenting normal-looking prompts that abuse wallet approvals.

A Pattern Of Exploited Vulnerabilities

In recent years, approval-phishing and “fake UI” attacks have stolen billions of dollars: one Chainalysis investigation reported the amount of $14 billion in on-chain scam inflows in 2025, with projections pointing above the $17 billion as more wallets continued to be identified.

As scam revenues grow and AI‐driven impersonation scales, crypto security in 2026 is less about the perfect code and more about defending everything around it: from domains to social accounts, employees and users decision-making. In February last year, attackers hijacked Pump.fun’s X account to push a fake PUMP token, as covered by our sister website NewsBTC. Not too long ago, OG trader Sillytuna was drove out of the crypto market after a multimillion-dollar theft that combined online address poisoning and offline violent actions.

The times are testing traders online and offline, both inside and outside the bloc. As the crypto landscape grows more complex, traders would do well to heighten their caution: prefer direct contract interaction or trusted aggregators, and use tools to monitor and regularly revoke token approvals.

SOL’s price trends to the upside on the daily chart. Source: SOLUSDT on Tradingview

Cover image from Perplexity, SOLUSDT chart from Tradingview

Domande pertinenti

QWhat was the main security incident that occurred with Bonk.fun?

AThe main domain of Bonk.fun was hacked, and a wallet drainer was injected into the website, exposing users to a phishing scam.

QHow did the wallet drainer on Bonk.fun's compromised domain work?

AThe drainer set up a fake 'Terms of Services' (TOS) signature prompt. When users signed this prompt, it allowed the attacker to move their funds.

QAccording to the article, which users were affected by this security breach?

AOnly users who interacted with the fake TOS message on the compromised Bonk.fun domain after the hack were affected. Previously connected users and those trading on third-party terminals were not compromised.

QWhat type of exploit was this incident classified as, and what was its root cause?

AThis was not a smart contract exploit. It was a Web2 infrastructure failure (domain hijacking) that led to a Web3 phishing attack, where the frontend was compromised to present malicious prompts.

QWhat broader trend in crypto scams does the article mention, and what was a key statistic provided?

AThe article mentions that approval-phishing and 'fake UI' attacks have become a major trend. A Chainalysis investigation reported $14 billion in on-chain scam inflows in 2025, with projections exceeding $17 billion.

Letture associate

Utexo Partners with x402 to Provide Near-Instant USDT Settlement for the Agent Economy

Utexo, a Bitcoin-native stablecoin payment execution and settlement layer, has partnered with x402 to integrate USDT compatibility into the x402 payment protocol. This collaboration enables near-instant settlement for agent-to-agent transactions, with speeds as fast as 50 milliseconds. x402 is an open protocol that uses the HTTP 402 "Payment Required" status code to embed payment functionality directly into HTTP requests. This allows applications, APIs, and autonomous systems to pay for services in real-time without requiring pre-funded accounts. The integration expands x402’s initial USDC support to include USDT, one of the most widely used stablecoins globally. Utexo’s infrastructure is designed for high-frequency, low-latency transactions, making it well-suited for machine-driven payments. According to Utexo CEO Viktor Ihnatiuk, supporting USDT within the x402 framework significantly broadens access and provides developers the performance needed for real-time agent-based systems. Kevin Leffew of x402 at Coinbase added that expanding stablecoin access improves performance and accelerates developer adoption. This partnership supports growing use cases where software systems autonomously conduct transactions—such as paying for API calls, accessing data on-demand, and coordinating services across platforms without human intervention. By combining x402’s protocol with Utexo’s settlement infrastructure, the collaboration enables a payment model where transactions are as fast and efficient as the requests that trigger them.

marsbit2 h fa

Utexo Partners with x402 to Provide Near-Instant USDT Settlement for the Agent Economy

marsbit2 h fa

Trading

Spot
Futures
活动图片