Start now →

Hackers Hijack Bonk.fun Domain, Deploy Wallet-Draining Phishing Prompt

By Sebastian Sinclair · Published March 12, 2026 · 2 min read · Source: Decrypt
Security
Hackers Hijack Bonk.fun Domain, Deploy Wallet-Draining Phishing Prompt
NewsTechnology

Hackers Hijack Bonk.fun Domain, Deploy Wallet-Draining Phishing Prompt

Browser warnings flagged the site for suspected phishing after attackers pushed a fake TOS message designed to trick users.

Sebastian SinclairBy Sebastian SinclairMar 12, 2026Mar 12, 20262 min read
BONK. Image: Shutterstock/Decrypt
BONK. Image: Shutterstock/Decrypt
Create an account to save your articles.Add on GoogleAdd Decrypt as your preferred source to see more of our stories on Google.

In brief

Hackers hijacked the domain of the Solana-based token launch platform Bonk.fun on Wednesday, prompting the team to warn users not to interact with the site after attackers deployed a wallet-draining phishing message.

An operator associated with Bonk.fun, known as Tom, said in a post on X that a team account had been compromised, allowing attackers to push a malicious prompt through the bonk.fun domain. 

The prompt reportedly asked users to sign a fake terms-of-service message designed to authorize transactions that could drain connected crypto wallets.

Phishing attacks remain a persistent threat in crypto, where malicious websites and wallet-signing prompts can give attackers direct access to users’ funds if approved.

“Do not use the bonk.fun domain until further notice,” Tom wrote. “Hackers have hijacked a team account, forcing a drainer on the domain.”

Visitors attempting to access the site late Wednesday were met with browser security warnings flagging the page for suspected phishing, Decrypt confirmed.

The team said the attack targeted only users who interacted with the malicious prompt after the compromise. According to Bonk.fun, users who had previously connected their wallets to the site or who traded tokens launched through the platform on external terminals are not affected.

“The only people affected were people who signed a fake TOS message on the bonkfun domain after the incident,” Tom said in a follow-up post. He added that the issue was detected quickly and that warnings spread across social media soon after the incident, limiting potential losses.

“We understand a lot of people are scared and rightly so,” he wrote. “We’re doing everything in our power to fix the situation.”

Bonk.fun did not immediately disclose how many users may have signed the malicious transaction or the estimated value of funds lost.

The platform has operated for roughly eight months and is part of the broader Bonk ecosystem built on the Solana blockchain.

A representative did not immediately respond to Decrypt’s request for comment.

Daily Debrief Newsletter

Start every day with the top news stories right now, plus original features, a podcast, videos and more.
This article was originally published on Decrypt and is republished here under RSS syndication for informational purposes. All rights and intellectual property remain with the original author. If you are the author and wish to have this article removed, please contact us at [email protected].

NexaPay — Accept Card Payments, Receive Crypto

No KYC · Instant Settlement · Visa, Mastercard, Apple Pay, Google Pay

Get Started →