CONFIDENTIAL
CLASSIFIED: PUBLIC RECORD — SECURITY INCIDENTS

FILE 007

INTERNAL SECURITY INCIDENTS & EXPLOITS

COMPILED: JANUARY 2026 · STATUS: RESOLVED · SOURCES: 6 VERIFIED
Pump.fun Security Incidents

Baton Corporation Ltd. operating entity — Documented internal-access related incidents and exploits

Internal Exploit by Former Developer
Incident ID: MAY-2024-001
INSIDER THREAT — PRIVILEGED ACCESS ABUSE

Perpetrator Profile

  • Name: Jarett Dunn
  • Aliases: Stacc, StaccOverflow, @STACCoverflow
  • Role: Former senior developer/contractor

Attack Methodology

Abuse of privileged admin/withdraw authority:

  • Leveraged flash loans on Solana lending protocol
  • Artificially graduated multiple bonding curve contracts by purchasing tokens to reach migration threshold
  • Redirected intended liquidity migration SOL to attacker-controlled addresses instead of Raydium DEX pools
Amount Stolen
12,300–12,600 SOL
~$1.9–2 million USD at time of exploit
Attack Duration
30–60 min
Flash loan costs eventually made further exploitation unprofitable
Funds Distribution
Dispersed
Airdrops to random Solana wallets; attacker retained no funds
Stated Motive
Protest
Claimed "revenge" against platform

Distribution Details

  • Stolen SOL dispersed to random Solana wallet addresses (airdrops to users/projects)
  • Attacker retained no funds personally
  • Some sources note ~$600,000 in meme coins briefly held, later handed over
MAY 16, 2024 — IMMEDIATE

Emergency Measures

  • Immediate contract upgrade to revoke compromised authority
  • Temporary site shutdown
MAY 17, 2024

Public Post-Mortem

Official post-mortem published confirming insider nature of attack

User Compensation: Full restoration of affected liquidity from platform treasury

Fee Waiver: 7 days post-incident

Source: [2]
RESOLUTION
FULL USER COMPENSATION COMPLETED — NO PROTOCOL FUNDS LOST
MAY 18–19, 2024

Arrest

Dunn arrested in London (hotel near Pump.fun WeWork office)

Initially bailed; mental health evaluation/hospitalization noted post-arrest

Source: [3]
AUGUST 2024

Initial Guilty Plea

Pleaded guilty to:

  • Fraud by abuse of position
  • Transfer of criminal property
Source: [4]
OCTOBER 2024

Attempted Plea Withdrawal

Legal team withdrew; Dunn re-pleaded guilty

DECEMBER 18, 2025

Sentencing

SENTENCE

Two concurrent six-year prison terms

Wood Green Crown Court, London

Source: [1]
CURRENT STATUS (JAN 31, 2026)
INCARCERATION ONGOING — NO REPORTED DEPORTATION OR APPEALS
X Account Compromise
Incident ID: FEB-2025-001
EXTERNAL SOCIAL ENGINEERING
FEBRUARY 26, 2025

Official X Account Compromised

Account: @pumpdotfun

Activity: Used to promote fake "PUMP" governance token and other fraudulent coins (e.g., "GPT-4.5")

Resolution: Team regained control same day

Impact: No protocol/smart contract compromise

Source: [5]

Attribution

Linked to broader chain of X hacks including Jupiter DAO, DogWifCoin

External social engineering; not internal access compromise

SECURITY POSTURE
NO ADDITIONAL INTERNAL EXPLOITS DOCUMENTED POST-MAY 2024
  • No additional internal/employee-access exploits documented (as of January 31, 2026)
  • No protocol-level breaches in public sources
  • PumpSwap launch (March 2025) passed multiple audits
  • No confirmed follow-on insider incidents
  • Exact final recovered amount from dispersed funds (platform compensated fully; no public recovery breakdown)
  • Full forensic details of admin authority compromise mechanics (beyond flash loan + withdraw redirect; partial descriptions in post-mortem and court reporting)
  • Any unreported minor internal incidents or attempted accesses (none surfaced in litigation, media, or on-chain analyses)
  • Potential civil recovery actions by Pump.fun against Dunn (no public filings documented beyond UK criminal case)