HumidiFi plans a fresh token sale after a coordinated bot attack captured the entire WET supply during its public launch. The team described the incident as a major setback for early supporters, who expected a fair distribution after months of community growth. The project built momentum from DeFi trading activity on Solana, yet the event revealed critical vulnerabilities in the initial sale process. Consequently, HumidiFi moved quickly to design a new plan that protects legitimate participants and restores confidence across its user base.How the Snipe HappenedAccording to the team, the bot farm deployed thousands of funded wallets. Each wallet prepared an instruction to push funds into the DTF contract the moment the sale opened. Additionally, the setup allowed multiple instructions to execute within a single transaction bundle. Each bundle triggered four transactions, and each transaction activated six instructions. Consequently, every bundle pushed about 24,000 USDC into the sale and captured roughly 350,000 WET. Many bundles were sent at once, overwhelming the sale window and leaving genuine users without a chance to participate.HumidiFi said the event exposed how sophisticated automation can exploit public sale designs. The team described the attack as a coordinated rush that drained the entire allocation before real users could react. Moreover, the moment intensified calls across Solana’s DeFi community for smarter contract structures that defend distribution fairness.New Token, New Contract, New ApproachHumidiFi will now issue a new token. Supporters from the Wetlist and JUP staking groups will receive a pro-rata airdrop. The sniper wallets will not receive any allocation. Besides replacing the token, the team said it rebuilt the DTF contract with community protection as the priority. Temporal developers contributed to the redesign, and Osec completed an audit.The project plans to reopen the public sale on Monday. The team expects the improved contract to prevent the same exploit. Additionally, HumidiFi aims to reassure its early community that their role remains central. The group also said it wants to demonstrate that DeFi 2.0 requires fairer access paths rather than faster bots.HumidiFi plans a fresh token sale after a coordinated bot attack captured the entire WET supply during its public launch. The team described the incident as a major setback for early supporters, who expected a fair distribution after months of community growth. The project built momentum from DeFi trading activity on Solana, yet the event revealed critical vulnerabilities in the initial sale process. Consequently, HumidiFi moved quickly to design a new plan that protects legitimate participants and restores confidence across its user base.How the Snipe HappenedAccording to the team, the bot farm deployed thousands of funded wallets. Each wallet prepared an instruction to push funds into the DTF contract the moment the sale opened. Additionally, the setup allowed multiple instructions to execute within a single transaction bundle. Each bundle triggered four transactions, and each transaction activated six instructions. Consequently, every bundle pushed about 24,000 USDC into the sale and captured roughly 350,000 WET. Many bundles were sent at once, overwhelming the sale window and leaving genuine users without a chance to participate.HumidiFi said the event exposed how sophisticated automation can exploit public sale designs. The team described the attack as a coordinated rush that drained the entire allocation before real users could react. Moreover, the moment intensified calls across Solana’s DeFi community for smarter contract structures that defend distribution fairness.New Token, New Contract, New ApproachHumidiFi will now issue a new token. Supporters from the Wetlist and JUP staking groups will receive a pro-rata airdrop. The sniper wallets will not receive any allocation. Besides replacing the token, the team said it rebuilt the DTF contract with community protection as the priority. Temporal developers contributed to the redesign, and Osec completed an audit.The project plans to reopen the public sale on Monday. The team expects the improved contract to prevent the same exploit. Additionally, HumidiFi aims to reassure its early community that their role remains central. The group also said it wants to demonstrate that DeFi 2.0 requires fairer access paths rather than faster bots.

Solana’s HumidiFi Prepares New Token Sale After Bot Network Captures Entire WET Supply

2025/12/05 21:16

HumidiFi plans a fresh token sale after a coordinated bot attack captured the entire WET supply during its public launch. The team described the incident as a major setback for early supporters, who expected a fair distribution after months of community growth. 

The project built momentum from DeFi trading activity on Solana, yet the event revealed critical vulnerabilities in the initial sale process. Consequently, HumidiFi moved quickly to design a new plan that protects legitimate participants and restores confidence across its user base.

How the Snipe Happened

According to the team, the bot farm deployed thousands of funded wallets. Each wallet prepared an instruction to push funds into the DTF contract the moment the sale opened. Additionally, the setup allowed multiple instructions to execute within a single transaction bundle. 

Each bundle triggered four transactions, and each transaction activated six instructions. Consequently, every bundle pushed about 24,000 USDC into the sale and captured roughly 350,000 WET. Many bundles were sent at once, overwhelming the sale window and leaving genuine users without a chance to participate.

HumidiFi said the event exposed how sophisticated automation can exploit public sale designs. The team described the attack as a coordinated rush that drained the entire allocation before real users could react. Moreover, the moment intensified calls across Solana’s DeFi community for smarter contract structures that defend distribution fairness.

New Token, New Contract, New Approach

HumidiFi will now issue a new token. Supporters from the Wetlist and JUP staking groups will receive a pro-rata airdrop. The sniper wallets will not receive any allocation. 

Besides replacing the token, the team said it rebuilt the DTF contract with community protection as the priority. Temporal developers contributed to the redesign, and Osec completed an audit.

The project plans to reopen the public sale on Monday. The team expects the improved contract to prevent the same exploit. Additionally, HumidiFi aims to reassure its early community that their role remains central. The group also said it wants to demonstrate that DeFi 2.0 requires fairer access paths rather than faster bots.

Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact [email protected] for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

Maryland Man Sentenced for Allegedly Aiding North Korea’s US Company Infiltration and Sensitive Data Access

Maryland Man Sentenced for Allegedly Aiding North Korea’s US Company Infiltration and Sensitive Data Access

The post Maryland Man Sentenced for Allegedly Aiding North Korea’s US Company Infiltration and Sensitive Data Access appeared on BitcoinEthereumNews.com. North Korea’s IT workers infiltrated US companies through a Maryland man’s scheme, earning over $970,000 while enabling access to sensitive government systems. This operation supported the regime’s cyber activities, including crypto hacks that stole $2 billion in 2025, funding nuclear programs. Minh Phuong Ngoc Vong sentenced to 15 months in prison for aiding North Korean infiltration. He used fake credentials to secure jobs at 13 US firms, passing work to overseas conspirators. North Korea stole $2 billion in crypto in 2025 via hacks, totaling over $6 billion recently, per blockchain analytics firm Elliptic. Discover how North Korea’s IT infiltration and crypto hacking schemes threaten US security. Learn the details of the Maryland case and regime’s $6B theft. Stay informed on cybersecurity risks today. What is North Korea’s IT Infiltration Scheme in US Companies? North Korea’s IT infiltration scheme involves covertly placing regime-affiliated workers into US companies using fake identities to generate revenue and access sensitive systems. In a recent Maryland case, Minh Phuong Ngoc Vong was sentenced to 15 months in prison and three years of supervised release for facilitating this for three years across 13 companies. The operation netted over $970,000, much of which funded North Korea’s weapons programs through software work performed by overseas actors, including those in China near the border. How Does North Korea Use Crypto Hacking to Fund Its Programs? North Korea employs sophisticated cyber groups to target cryptocurrency exchanges and wallets, stealing digital assets that convert to fiat for regime funding. According to blockchain analytics firm Elliptic, these groups pilfered approximately $2 billion in cryptocurrencies in 2025 alone, contributing to a total exceeding $6 billion in recent years from hacks on platforms like Bybit and Upbit. This influx directly supports nuclear and missile development, as confirmed by US intelligence assessments. Experts note the regime’s…
Share
BitcoinEthereumNews2025/12/06 09:12