Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Incidents

Pumpfun Ex-Employee Exploits 19M

May 16, 2024
Reading Time: 3 mins read
in Incidents
Pumpfun Ex-Employee Exploits 19M

Solana memecoin creation tool pump.fun has reported that an ex-employee exploited the platform, resulting in a loss of nearly $1.9 million through a sophisticated “bonding curve” attack. The former employee allegedly used their privileged access to a “withdraw authority” to breach the protocol’s internal systems. This exploit allowed the individual to siphon funds from pump.fun’s bonding curve contracts, which initially held $45 million. Despite the breach, pump.fun has reassured its users that its smart contracts remain secure and has promised to restore 100% of the impacted liquidity within the next 24 hours.

Prior to pump.fun’s official statement, Igor Igamberdiev, the head of research at cryptocurrency market maker Wintermute, suggested that the hack was due to an internal private key leak. The individual suspected of the leak, X user “STACCoverflow,” made cryptic posts implying their involvement and their readiness to face legal consequences. Despite these revelations, pump.fun has not named the former employee responsible and has stated that it is working with law enforcement to address the incident.

The attack was executed using flash loans on the Solana lending protocol Raydium. The attacker borrowed Solana’s SOL tokens to buy as many coins as possible, hitting 100% on their respective bonding curves. This allowed them to access the bonding curve liquidity and repay the flash loans, resulting in the theft of approximately 12,300 SOL, worth $1.9 million. The attack occurred between 3:21 pm and 5:00 pm UTC on May 16, and pump.fun has assured users impacted during this timeframe that they will recover 100% or more of their previous liquidity.

This incident highlights the vulnerabilities inherent in blockchain platforms and the importance of robust security measures. While pump.fun’s swift response and promise to reimburse affected users is commendable, the event underscores the need for ongoing vigilance and enhanced protective protocols in the rapidly evolving cryptocurrency landscape.

Reference:
  • Solana Memecoin Tool Pump.fun Hit by $1.9M Exploit
Tags: Cryptocurrenciescyber incidentsCyber Incidents 2024Cyber threatsMay 2024memecoinpump.funSolana memecoinWintermute
ADVERTISEMENT

Related Posts

Nippon Steel Solutions Data Breach

Bitcoin Depot Breach Exposes Data

July 10, 2025
Nippon Steel Solutions Data Breach

McDonald’s AI Hiring Bot Exposes Data

July 10, 2025
Nippon Steel Solutions Data Breach

Nippon Steel Solutions Data Breach

July 10, 2025
Recruiting Software Exposed 26M Resumes

Recruiting Software Exposed 26M Resumes

July 9, 2025
Recruiting Software Exposed 26M Resumes

Norwegian Municipalities Hit by Data Breach

July 9, 2025
Recruiting Software Exposed 26M Resumes

Credit Reports Breached And Sold On Dark Web

July 9, 2025

Latest Alerts

RondoDox Botnet Exploits Router Flaws

ServiceNow Data Exposure via ACLs

Hackers Revive SEO Poisoning

Windows BitLocker Vulnerability Flaw

Anatsa Android Trojan Targets 90K Users

Hackers Use Leaked Shellter License Malware

Subscribe to our newsletter

    Latest Incidents

    Bitcoin Depot Breach Exposes Data

    McDonald’s AI Hiring Bot Exposes Data

    Nippon Steel Solutions Data Breach

    Norwegian Municipalities Hit by Data Breach

    Credit Reports Breached And Sold On Dark Web

    Recruiting Software Exposed 26M Resumes

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial