Crypto investigator ZachXBT warns that Phantom’s upcoming chat feature could expose users to theft amid ongoing address-poisoning scams.Crypto investigator ZachXBT warns that Phantom’s upcoming chat feature could expose users to theft amid ongoing address-poisoning scams.

ZachXBT calls out Phantom Chat over address poisoning issue

2026/02/10 17:10
4 min di lettura
Per feedback o dubbi su questo contenuto, contattateci all'indirizzo crypto.news@mexc.com.

On-chain investigator ZachXBT warned that an advertised social feature for the Phantom wallet, “Phantom Chat,” is a new method for “investors to get drained.” 

In an announcement made Sunday, multichain wallet Phantom said its new integrated social platform is a messaging tool slated for release in 2026, as part of its evolution of in-wallet interaction.

ZachXBT commented on Phantom’s X post, saying the company has not resolved the scam vector affecting its users, known as “address poisoning.” He cited a recent case in which a victim lost 3.5 wrapped bitcoin after copying a fraudulent address from the transaction history. The loss occurred last week, according to the investigator’s public post.

“A victim lost 3.5 WBTC last week since your UI still does not filter out spam txns users so they accidentally copied the wrong address from recent transactions since the first characters looked similar,” he stated.

The 2D investigator identified the address of the theft was 0x85cB…Af11D8f6, with the transaction hash 0x9f0fc3cd…267a647a4.

How does address poisoning work?

According to wallet provider MetaMask, address poisoning begins by attackers sending victims token transfers worth little or nothing. The purpose of these “useless” transfers is to add vanity addresses to a potential victim’s transaction history. But before they decide which target to go after, they first scan the blockchain for active wallets. 

Vanity addresses are made to match the beginning and ending characters of a target’s address using tools such as Profanity, an open-source wallet address generator. Most users cannot memorize full wallet addresses because they are so long. 

Looking at the two most popular blockchains, Bitcoin addresses have 26-35 characters, while Ethereum-style addresses have 42 characters. Instead of checking every character, a user may slightly glance at the first and last digits, unknowingly copying the wrong address. The perpetrator will purposefully design their spoofed addresses to survive that quick check. 

MetaMask said spoofing crypto addresses is very similar to how hackers use phishing to steal from banking brands. Criminals clone the appearance of institutions such as Wells Fargo to steal credentials, but in crypto, the address itself is the disguise.

ZachXBT shared screenshots of several poisoning victims after an X user questioned why anyone would copy old transactions. He replied, “Convenience (thefts happen way more frequently than you’d expect)”.

Phantom previously tested in-wallet communication through a prediction markets partnership with Kalshi in December, which included a live chat feature. Wallet messaging could allow scammers to impersonate trusted contacts or send malicious links.

“Honestly, my exGF downloaded Phantom when Elon mentioned the companions I sent her like 200 bucks worth of Ani, and she said she got scammed because it went to zero … I assumed she clicked the wrong button somehow but never put the pieces together until now,” another X user complained, reacting to ZachXBT’s findings.

Phantom users struggle with phishing attacks

Last December, a Solana user named Jack reported losing $9,000 through a wallet drainer. Explaining the ordeal to several news outlets, Jack surmised that the incident began with an Instagram advertisement where SOL holders were convinced to enter a promo offering “fast returns,” although the link shared led them to a fraudulent website.

After clicking on the phishing link, he approved an incoming transfer that exposed his wallet to a malicious JavaScript called “SkyDrainer.” The code drained his wallet, and the website vanished from his browser tabs.

The victim later traced the drainer’s promotion, where he found listings on underground forums such as Cracked[.]sh and the Russian site LolzTeam. One forum post advertised “Supreme #1 Solana Drainer,” promoting security bypassing methods, hosting, and cloaking at a 10% operator fee.

Data from blockchain security firm Scam Sniffer shows wallet scams involving address poisoning and signature phishing caused the biggest losses in January. In one case, a single victim lost $12.2 million after copying a poisoned address.

If you're reading this, you’re already ahead. Stay there with our newsletter.

Disclaimer: gli articoli ripubblicati su questo sito provengono da piattaforme pubbliche e sono forniti esclusivamente a scopo informativo. Non riflettono necessariamente le opinioni di MEXC. Tutti i diritti rimangono agli autori originali. Se ritieni che un contenuto violi i diritti di terze parti, contatta crypto.news@mexc.com per la rimozione. MEXC non fornisce alcuna garanzia in merito all'accuratezza, completezza o tempestività del contenuto e non è responsabile per eventuali azioni intraprese sulla base delle informazioni fornite. Il contenuto non costituisce consulenza finanziaria, legale o professionale di altro tipo, né deve essere considerato una raccomandazione o un'approvazione da parte di MEXC.

Potrebbe anche piacerti

Covéa Chooses Shift Technology as Strategic Partner for Fraud and Risk Management

Covéa Chooses Shift Technology as Strategic Partner for Fraud and Risk Management

Covéa has selected Shift Technology as a long-term partner to support a consistent and shared view of risk from policy inception through to claims settlement The
Condividi
ffnews2026/04/02 07:00
On-chain ransom negotiations show ShibaSwap hacker won’t be low-balled

On-chain ransom negotiations show ShibaSwap hacker won’t be low-balled

The post On-chain ransom negotiations show ShibaSwap hacker won’t be low-balled appeared on BitcoinEthereumNews.com. On-chain messages between hacker and victim reveal a ransom standoff, with every demand etched permanently on the blockchain. Last Friday, $2.8 million worth of (mostly dog-themed) crypto tokens were stolen from ShibaSwap, a “next generation decentralized exchange” for the Shiba Inu ecosystem. Among the loot were approximately 250 billion KNINE tokens, from liquid staking protocol K9 Finance. K9 wants them back, and is willing to pay the hacker a bounty. The tokens are ostensibly worth over $600,000 at current market prices. Though a simulated swap, through extremely thin liquidity, paints a rather different picture. The hack was flagged by security firms Peckshield and Tikkala Security and involved using a “flash” loan to buy up enough tokens to achieve “majority validator power.” Then, the hacker signed “a malicious state to drain assets from the bridge.” They subsequently split up most of the stolen assets between various addresses but the stash of KNINE tokens, though, clearly not worth swapping, remains in their primary address. Read more: Circle and Tether bug bounties aren’t enough says LlamaRisk ShibaSwap hack negotiations begin On Monday, an address labelled “k9dev.eth” reached out to their “Dear Shibarium Bridge Hacker” on-chain, offering a five-ether (ETH) “bounty to return stolen KNINE tokens.” Presumably, the K9 team is very keen to avoid the hacker swapping such a large quantity of KNINE which would likely send its price to near zero. The message also contains the address of a bounty contract to facilitate the exchange, piling on the pressure with the warning that the “bounty will start to decrease in seven days.” Not one to be low-balled, however, the hacker has responded, “I can’t accept five ETH.” They instead propose no less than 50 ETH (around $225,000), adding “let me know when you are willing to meet that price.” The full exchange…
Condividi
BitcoinEthereumNews2025/09/18 03:25
Cardano Price Review: Can ADA Reach $1 by 2028?

Cardano Price Review: Can ADA Reach $1 by 2028?

As the second quarter begins, established networks are launching massive upgrades, yet their market value remains under heavy pressure. This disconnect is forcing
Condividi
Techbullion2026/04/02 19:51

USD1 Genesis: 0 Fees + 12% APR

USD1 Genesis: 0 Fees + 12% APRUSD1 Genesis: 0 Fees + 12% APR

New users: stake for up to 600% APR. Limited time!