TL;DR
- ZachXBT questioned Phantom Chat, a function scheduled for 2026, for working alongside an lively address-poisoning subject throughout the Phantom pockets.
- The investigator cited a latest case through which a sufferer misplaced 3.5 WBTC after copying a pretend deal with from transaction historical past.
- Knowledge from Rip-off Sniffer reveals that deal with poisoning and signature phishing led losses in January, together with a theft exceeding $12.2 million.
On-chain investigator ZachXBT questioned the rollout of Phantom Chat, an built-in messaging function that the Phantom pockets plans to launch in 2026. His criticism focuses on the coexistence of this function with an lively address-poisoning downside affecting the pockets’s customers.
ZachXBT stated that Phantom has not mounted the rip-off vector that enables pretend addresses to be inserted into transaction historical past. For example, he cited a case from final week through which a sufferer misplaced 3.5 WBTC after copying a fraudulent deal with from latest transactions. The deal with mimicked the primary characters of the unique and handed a fast visible test. The investigator stated that Phantom’s interface doesn’t filter spam transactions, which retains scam-related addresses seen to customers.
So a brand new methodology for individuals to get drained.
Please contemplate fixing deal with poisoning first.
A sufferer misplaced 3.5 WBTC final week since your UI nonetheless doesn’t filter out spam txns customers so that they unintentionally copied the flawed deal with from latest transactions for the reason that first… pic.twitter.com/lid7ATYEvl
— ZachXBT (@zachxbt) February 10, 2026
Phantom Nonetheless Fails to Present Options
Handle poisoning is carried out by token transfers with little or no worth despatched to lively wallets. These transfers add pretend addresses to a person’s transaction historical past. Earlier than appearing, attackers analyze the blockchain to establish wallets with exercise. The addresses used are constructed as vainness addresses, designed to match the start and finish of the actual deal with utilizing open-source instruments similar to Profanity.
Bitcoin addresses comprise between 26 and 35 characters, whereas Ethereum-style addresses attain 42 characters. Their size makes full verification tough and encourages partial copying based mostly on the primary and final digits. Attackers tailor pretend addresses to go that visible test. MetaMask in contrast this methodology to conventional banking phishing, the place a pretend id replaces the actual one.

ZachXBT Critiques the Recorded Instances
ZachXBT stated that losses from this mechanism happen incessantly and shared screenshots of a number of instances. He stated that copying addresses from earlier transactions is pushed by person comfort.
Phantom examined in-wallet communication options in December by an integration with Kalshi that included a reside chat. Inside messaging permits contact impersonation and the distribution of malicious hyperlinks throughout the pockets atmosphere.
Pockets assaults usually are not restricted to handle poisoning. In December, a Solana person misplaced $9,000 after interacting with a fraudulent hyperlink promoted by an Instagram commercial. The location requested approval of an incoming transaction that activated malicious code recognized as SkyDrainer, which drained the pockets. Promotion of the drainer later appeared on underground boards similar to Cracked[.]sh and LolzTeam, the place it was supplied as a service with a ten% fee.
Knowledge from safety agency Rip-off Sniffer reveals that scams linked to handle poisoning and signature phishing recorded the most important losses in January. In one of many documented instances, a single sufferer misplaced $12.2 million after copying a malicious deal with
