Gemini CLI X Account Hacked to Push Pump.fun Scam Token

The official @geminicli X account was compromised and used to promote a fake $CLI token on Pump.fun. Users quickly identified it as a scam.

Gemini CLI X Account Hacked to Push Pump.fun Scam Token

TL;DR

  • The official @geminicli X account (associated with Google's Gemini CLI) was hacked and used to promote a fake $CLI token launch on Pump.fun
  • The scam post included a Solana contract address (AeWzjxPNT5mBhhXZrBTfbxK3fa52fNfnW8UymiRopump) and urged users to buy
  • Community members quickly flagged the token as fraudulent and warned others not to interact
  • The incident follows a pattern of developer tool accounts being targeted for crypto scams

The @geminicli X account - associated with Google's open-source Gemini CLI tool - was compromised today and used to post a fraudulent cryptocurrency token launch.

Screenshot of the hacked @geminicli account promoting the $CLI scam token The compromised @geminicli account promoting a fake $CLI token on Pump.fun.

What happened

The attackers posted an announcement promoting a "$CLI" token on Pump.fun, Solana's memecoin launchpad. The post included a contract address and encouraged followers to buy in - a standard playbook for account-takeover crypto scams.

Users identified it as fraudulent almost immediately. The token, the contract address, and the post itself are all scam infrastructure. Do not interact with the contract address or send any funds.

The pattern

This follows an established and accelerating trend of developer-adjacent accounts being hijacked for crypto promotion:

  • Pump.fun's own X account was hacked in February 2025 to promote a fake PUMP governance token
  • Fake Gemini AI chatbots have been used to push fraudulent "Google Coin" tokens, with Chainalysis research showing ~60% of funds flowing into crypto scam wallets now involve AI tools
  • Multiple open-source project accounts on X have been targeted in similar takeovers throughout 2025-2026

The targeting logic is straightforward: developer tool accounts have technically sophisticated followers who hold crypto. The @geminicli account's association with Google gives it implicit credibility that scammers exploit during the brief window before the hack is detected.

What to do

If you saw the $CLI token post from @geminicli:

  1. Do not buy, swap, or interact with the contract address
  2. Do not click any links posted during the compromised period
  3. Revoke any token approvals if you connected a wallet to any linked site
  4. Report the posts to help X remove them faster

Google has not yet publicly commented on the compromise. The Gemini CLI project itself (hosted on GitHub at google-gemini/gemini-cli) is not affected - this is a social media account takeover, not a supply chain attack.


Sources:

Gemini CLI X Account Hacked to Push Pump.fun Scam Token
About the author Senior AI Editor & Investigative Journalist

Elena is a technology journalist with over eight years of experience covering artificial intelligence, machine learning, and the startup ecosystem.