Pump.fun Hacked, Solana Airdropped to Users

Pump.fun, a Solana-based platform renowned for launching memecoins, has been hit by a significant security breach resulting in a loss of approximately $2 million. The attacker exploited vulnerabilities in the platform’s bonding curve contracts through the use of flash loans, severely disrupting Pump.fun’s token launch mechanism.

The Incident

Based on Pump.fun tweet, the breach occurred when the attacker used flash loans to manipulate the bonding curve contracts, a critical component of Pump.fun’s token launch process. Flash loans allow for large sums of money to be borrowed without collateral, provided the borrowed amount is returned within the same transaction. This technique enabled the attacker to create artificial price fluctuations, ultimately siphoning off a substantial amount of funds. This significantly disrupted Pump.fun’s token launch mechanism and raised serious concerns about the platform’s security.

The attacker distributed it to various old community wallets. If you hold tokens like Slerf, Stacc, Saga, or Risklol, you might want to check your Phantom wallet. This unusual method of distribution has sparked a debate: is STACCOverflow a hero or a villain?

The Attacker

The wallet address of the exploiter was identified as 7ihN8QaTfNoDTRTQGULCzbUT3PHwPDTu5Brcu4iT2paP. Initially, an unidentified user named ‘Stacc’ claimed responsibility for the attack, describing it as a protest rather than a financial gain. The identity of the attacker was later revealed to be a former employee named Jarrett, who goes by the online alias STACCOverflow. He expressed his dissatisfaction with the company and aimed to disrupt the platform’s operations. He took to social media to criticize Pump.fun, declaring his intent to change the course of history and expressing no fear of imprisonment. This bold stance has earned him the nickname “Web3 Robinhood.”

Post-Hack Feedback from STACCOverflow

Interestingly, STACCOverflow provided feedback to Pump.fun after the hack, pointing out their use of an outdated Solana command-line interface and suggesting improvements like using box accounts. This underscores ongoing security issues within the platform, which is closed-source and lacks public APIs, making independent verification difficult.

Pump.fun’s Response

In response to the breach, Pump.fun’s team has promised a thorough investigation and immediate steps to enhance security. They are working to identify the specific vulnerabilities exploited and plan to implement more robust security measures to prevent future attacks. Additionally, they have committed to compensating affected users, though the details of this compensation plan are still being finalized.

Pump.fun’s Profitability and User Base

Despite the hack, Pump.fun continues to make significant revenue, ranking 11th in fee generation with $800,000 per day. This shows that the user base is still active, although concerns about security remain due to its closed-source nature. Users are essentially at the platform’s mercy.

Exploring Alternatives to Pump.fun

Given these concerns, users are looking at other meme coin platforms. Competitors like Degen Fund, Ape Store, and Start.Cooking offer potentially safer options, especially if they are open source. For example, Radium allows users to review its code on GitHub, providing transparency and added security.

How to Ensure Platform Safety

If you’re worried about safety, knowing how to navigate GitHub and read code is crucial. Key files, like the state.rs file in Rust-based projects, contain important information about ownership and authorization checks within the smart contract.

Final Thoughts

While Pump.fun remains profitable, its security issues and the recent hack make it a risky choice. Exploring open-source alternatives might be a safer bet. As for Stack Overflow, whether he’s a hero or a villain is up for debate. His actions have highlighted critical security flaws within Pump.fun.

Avatar photo

By Airdroplet

Professional Airdrops Farmer I Only speculation | Intern | Sybil Overlord

Leave a Reply

Your email address will not be published. Required fields are marked *