Key Points:
The alleged pump.fun attacker, known as @STACCoverflow, was later released on bail and could potentially be identified as Jarett Reginald Dunn.
The attack targeted pump.fun, a popular platform for launching meme coins on Solana, resulting in the compromise of the protocol and the theft of approximately $1.9 million worth of SOL coins. Exploiting bonding curve contracts, the pump.fun attacker redirected funds intended for the Solana decentralized exchange Raydium to unrelated wallet addresses, according to insights from on-chain analysts.
Igor Igamberdiev, head of research at Wintermute, assessed the situation, indicating a possible compromise of a key, although the prospect of insider involvement remains under scrutiny. The exploit utilized flashloans, borrowed and repaid within a single blockchain block, facilitated by MarginFi’s services.
Notably, a former pump.fun employee claimed responsibility on X shortly after the attack, boasting about their actions and acknowledging the risk of imprisonment.
Following the incident, pump.fun has relaunched, with the affected liquidity totaling around $45 million. The team has reintroduced the contract, resumed trading, and announced a 0% trading fee for the next seven days. Despite the setback, pump.fun is striving to restore trust and stability to its platform.
DISCLAIMER: The information on this website is provided as general market commentary and does not constitute investment advice. We encourage you to do your own research before investing. |
Bitcoin Spot ETF Inflows continued strong with $275M on Dec 18, while BlackRock's IBIT ETF…
UTXO Stack funding successfully completed its Series A round at a $50M valuation, paving the…
Explore BTFD Coin’s $4.1M presale success, Brett’s Base Chain growth, and Dogwifhat’s volume surge in…
Bitcoin Mining Machines are in high demand due to Bitcoin's surge, with prices rising 30%…
The Bank of Japan rate remains at 0.25%, delaying further hikes. For future decisions, the…
Fed Chair Jerome Powell stated that the central bank could not and would not hold…
This website uses cookies.