The official website for the Solana memecoin launchpad, Bonk Fun, has been hijacked. A malicious actor seized control of the domain on Wednesday (March 11), deploying a wallet drainer disguised as a standard interaction.

The platform’s team has issued an urgent warning: do not interact with the website until further notice. Users who connect their wallets and sign the current prompts face immediate theft of their assets.

A malicious actor has compromised the BONKfun domain, do not interact with the website until we have secured everything.

— BONK.fun (@bonkfun) March 12, 2026

As news of the BONK meme coin spreads, it has dropped nearly 1% over the past 24 hours, following a disastrous year in which the Solana meme coin lost -45% of its value.

It is a bad time for a platform hack, as the meme coin sector has enjoyed a +2.5% daily pump, taking the total market cap back above $32Bn, with tokens like DOGE, PEPE, Memecore, and SHIB all posting green candles.

SOURCE: TradingView

How Did the Malicious Actor Breach the Bonk Fun Front-End?

The attack vector exploits user trust rather than the blockchain infrastructure itself. According to X user SolportTom, the platform’s operator, hackers hijacked a team account to force a drainer onto the domain. This is not a smart contract failure; it is a front-end takeover.

Visitors to the site are currently greeted with a fake terms-of-service message. This pop-up, which mimics standard compliance requests, is the trigger mechanism.

To answer the concerns I’m seeing:

1. No if you connected to bonk fun in the past you’re not affected

2. No if you trade bonk fun tokens on terminals etc you’re not affected

3. The only people affected were people who signed a fake TOS message on the bonkfun domain after…

— Tom (@SolportTom) March 12, 2026

If you sign this request, the protocol grants the attacker permission to empty your wallet, and it will happen within seconds.

“A malicious actor has compromised the BONKfun domain,” the platform announced via its official X account. “Do not interact with the website until we have secured everything.”

How Much Has Been Drained and Who Is Affected

The Bonk.fun team hasn’t confirmed how much was lost to the hack, but has stated that losses are “minimal,” attributing the low damage to the developers’ rapid detection.

Only users who interacted with the fraudulent terms-of-service prompt during the active hijack window were affected. However, the exact dollar figure verified by on-chain analysis remains pending.

AAVE ORACLE GLITCH TRIGGERS $26M IN WRONGFUL LIQUIDATIONS

A pricing oracle error on Aave caused about $26million in wstETH positions across 34 accounts to be unfairly liquidated after the system reported an incorrect exchange rate, with affected users set to be compensated. pic.twitter.com/qMbsAhQnnl

— Coin Bureau (@coinbureau) March 11, 2026

This incident mirrors broader risks in the sector, as an Aave oracle glitch triggered liquidations earlier this year due to interface and data anomalies.

While the mechanics differ, the result for user funds is identical: an unexpected loss due to a technical compromise.

Phishing attacks like this are becoming industrialized. According to Chainalysis, overall crypto scam losses reached approximately $17Bn in 2025.

The shift toward domain hijacking indicates attackers are bypassing protocol security to target the user interface directly.

EXPLORE: Best Crypto Presales to Buy in 2026

What Bonk.fun Users Need to Do Right Now

If you have visited Bonk.fun in the last 24 hours, assume your session security was compromised. Front-end attacks often bypass standard defenses, as the recent discovery by Ledger researchers of an Android flaw enabling wallet seed phrase theft demonstrates.

Take these steps immediately:

Disconnect your wallet: Remove Bonk.fun from your connected sites list in your wallet settings.

Revoke approvals: Use a tool like Revoke.cash to revoke any recent permissions granted to Bonk.fun contracts.

Check your history: Verify that no unauthorized transfers have occurred.

“We understand a lot of people are scared and rightly so, but we’re doing everything in our power to fix the situation,” SolportTom wrote.

Users should now sit tight and wait for an official “all-clear” from the Bonk.fun X account before returning to the site.

If the site remains compromised for another 24 hours, user migration to rival launchpads like Pump.fun will likely accelerate, and Bonk.fun may struggle to regain whatever was left of its userbase.

If the team resolves the DNS hijack quickly and refunds the “minimal” losses, confidence may stabilize, but the pressure is now on the operators to prove the domain is safe.

DISCOVER: The 16 Best Meme Coins to Buy in March 2025

The post Bonk Fun Website Hijacked: Live Exploit Is Draining User Funds appeared first on Cryptonews.

Author