Connect with us


Memecoin launcher claims ex-employee behind $1.9M exploit said its smart contracts are safe, and impacted users will receive “100% of the liquidity” that it previously had within the next 24 hours.



Source: Cointelegraph

Solana memecoin creation tool has claimed a former employee exploited the firm for nearly $2 million through a “bonding curve” attack.

The ex-employee used their “privileged position” to access a “withdraw authority” and compromise the protocol’s internal systems, alleged in a May 16 X post.

About $1.9 million was stolen from the total $45 million held in’s bonding curve contracts.

The platform temporarily paused trading but it is now back up and running.

The smart contracts “are safe,” and users impacted by the incident will receive “100% of the liquidity” that it previously had within the next 24 hours, said.


Prior to’s post, Igor Igamberdiev, the head of research at cryptocurrency market maker Wintermute, claimed the hack came about from an internal private key leak, which he suspected to be X user “STACCoverflow.”

In a series of cryptic X posts, STACCoverflow claimed they were “about to change the course of history. n [sic] then rot in jail.” They added in a separate post they “do not care, I am already fully doxxed.”

In an earlier X post, said it has been collaborating with law enforcement. It did not name the former employee and did not immediately respond to a request for comment.

How the hack unfolded

The alleged exploiter used flash loans on a Solana lending protocol Raydium to borrow Solana’s SOL $170 token, which was then used to “buy as many coins” as possible, said.

Once the coins hit 100% on their respective bonding curves, the exploiter could then access the bonding curve liquidity and repay the flash loans.

Approximately 12,300 SOL, worth $1.9 million, was stolen in the attack, which sai occurred between 3:21 pm and 5:00 pm UTC on May 16.

The Solana memecoin launchpad said users impacted between these hours would recover 100% or more of the liquidity held prior to the attack.

Continue Reading
Click to comment

Leave a Reply

Tu dirección de correo electrónico no será publicada. Los campos obligatorios están marcados con *