Cointime

Download App
iOS & Android

51% Attack: What It Is and What You Need to Know

Validated Venture

More than a decade ago, when Satoshi Nakamoto released the Bitcoin whitepaper, it was thought that perpetrating a 51% attack (also called a majority attack) would be impossible. Today, blockchains remain difficult to target, but they are still vulnerable.

What exactly is a 51% attack, and what do you need to know to help reduce the risk of one? We’ll discuss the answers to those questions in this article.

What Is a 51% Attack?

If a group or individual controls the majority of the hashing power of a given network, they have the ability to reorganize the blockchain and perpetuate a 51% attack.

This, essentially, involves reversing a transaction in order to spend the same cryptocurrency twice (a.k.a. double-spending). Here are the components that make this type of theft possible.

Hash Rate

The foundation of the 51% attack has to do with the hash rate for a particular blockchain. Hash rate is the measure of the computational power in a proof-of-work (PoW) system and is used to determine the health, security, and mining difficulty of a network.

At its most basic, a hash is a randomly generated string of letters and numbers. Hashing is the process of guessing the hash. The hash rate is the rate at which those guesses are submitted across the entire network.

On larger networks, there are typically hundreds or thousands of computers making millions of guesses per second. Because of that, the hash rate for these networks is typically measured in terahashes (or 1 trillion hashes) per second.

On smaller networks, there are typically fewer miners making fewer guesses, so the hash rate may be measured in kilohashes per second (1 thousand/s), megahashes per second (1 million/s), or gigahashes per second (1 billion/s).

As an example, in the last quarter of 2022, the hash rate for the Bitcoin network was around 240 million terahashes per second.

Because the volume of data on the Bitcoin network is so high, it makes it extremely difficult for any one person or organization to amass a majority of the hashing power.

But, on smaller altcoin networks, the possibility still exists that the majority of hashing power could be controlled by a single individual or organization. If that happens, it opens the door to double-spending.

Double-Spending

While modern cryptocurrency networks are generally secure, there is some risk involved, and coin or token owners are still susceptible to scams, like the rug pull and the double spend.

A double spend is a set of transactions where the same cryptocurrency is used twice. This allows the person perpetrating the transactions to get something for nothing and, potentially, make off with a large number of digital assets.

To make this type of transaction possible, the bad actor has to go back within the blockchain and alter the initial transaction so they can reacquire the original cryptocurrency. They can only do this if they have a majority of the hashing power on the network.

While there are other types of double-spend scams, the 51% attack is the most common.

Examples of the 51% Attack

A Simple Example of a 51% Attack

After gaining majority control of the network, a bad actor (individual or organization) sends a large amount of Coin A to a crypto exchange. Next, they convert Coin A into Coin B.

Once that’s done, they move Coin B off the crypto platform onto their own storage site.

Then, using their majority control of Coin A’s blockchain, they go back in and reorganize things to erase the first transaction (Coin A to Coin B) and “recover” all the Coin A that they spent.

That leaves them with the original Coin A they started with and all of the Coin B they traded for.

A More Advanced Example of a 51% Attack

After gaining majority control of Coin A’s network, a bad actor sets up an alternate blockchain that runs in parallel (Coin A2) and starts mining blocks in secret.

Next, the bad actor transfers their legitimate Coin A to a crypto platform where they can use it to trade or buy other digital assets.

After that, they continue to mine blocks on the alternate blockchain as fast as possible and without the rest of the ‘true’ blockchain knowing.

Eventually, the alternate blockchain grows to the point that it is longer than the original chain (because the attacker can mine blocks faster than the other 49% of the network).

When that happens, the bad actor announces the alternate blockchain to the rest of the nodes on the original network. Since the alternate blockchain is longer, the rest of the network is forced to accept those blocks as true.

On the alternate chain, the transfer of Coin A to the crypto platform never happened, so once it’s integrated into the original chain, the bad actor is free to spend those funds again.

What a Majority Attack Can and Can’t Do

What’s Possible

With majority control of a network, an attacker could, theoretically, reverse transactions they made while having 51% of the hash rate.

They could also potentially:

  • Modify the ordering of transactions
  • Exclude some transactions
  • Prevent some or all transactions from being confirmed (a Transaction Denial of Service)
  • Prevent some or all other miners from mining (a mining monopoly)

For cryptocurrency investors, the biggest risk associated with a 51% attack may be the devaluation of a particular digital currency.

Again, the larger the blockchain, the less likelihood there is that these types of attacks can occur.

What’s Impossible

While a 51% Attack does give bad actors a significant amount of power over the network, there are certain things that they can’t do, including:

  • Reverse transactions from other users
  • Prevent transactions from being created and broadcast to the network
  • Change the block rewards
  • Create coins out of thin air
  • Steal coins that never belonged to them in the first place

How Likely Are 51% Attacks?

As we’ve mentioned, the larger the network, the lower the likelihood that a 51% attack will occur.

This is because as the magnitude of a network grows, it becomes more and more difficult to obtain enough computing power (hash rate) to overwhelm, override, and overrule the other nodes on the chain.

In addition, as the chain grows and becomes linked through cryptographic proofs, it becomes more and more difficult to change the blocks that have already been confirmed.

As a result, it becomes cost-prohibitive — meaning that it would cost more than the bad actor could get out of it — to even attempt to change blocks with a high number of confirmations.

On these larger chains, the bad actor would likely only be able to modify the transactions of a few recent blocks for a short time. To do any real damage, they would need to modify much older transactions, which would take a considerably longer amount of time.

This makes the odds of a 51% attack happening for monetary gain very low on most of the larger blockchains.

There is, however, potential for a bad actor who is not motivated by profit to attack a network with the sole aim of destroying it.

But, in the Bitcoin blockchain, for example, even if they did manage to disrupt the network in some way, the software, protocols, and nodes would react to the attack and adapt fairly quickly.

It’s worth reiterating here that while larger blockchains are more or less immune to majority attacks like this, smaller blockchains are still susceptible.

Ethereum Classic suffered 51% attacks in 2019 and 2020, and Bitcoin Gold suffered 51% attacks in 2018 and 2020.

To prevent these types of attacks, some platforms have increased the number of confirmations necessary to implement transactions and trades, thus making it more difficult to execute a majority attack.

Can You Prevent a 51% Attack?

Unfortunately, there isn’t a whole lot you, as an individual crypto enthusiast, can do to prevent a 51% attack.

These attacks aren’t directed at one individual, per se, so the standard security strategies — e.g., using a cold wallet, not talking about your holdings, keeping your private key secure, etc. — don’t really apply.

In addition, the majority of the work for these types of attacks often happens behind the scenes and is then dropped on the blockchain in one fell swoop. That means that no one sees it coming until it’s too late.

You can, however, protect your portfolio just a bit by diversifying into other digital assets instead of putting all of your funds into one coin or token.

Comments

All Comments

Recommended for you

  • BTC Surpasses $78,000

    Market data shows that BTC has surpassed $78,000, currently priced at $78,042.78, with a 24-hour increase of 0.69%. The market is experiencing significant volatility, so please ensure proper risk management.

  • Trump: Does Not Believe Shooting Incident is Related to Iran Conflict

    On April 26, U.S. President Trump stated (when asked if the shooting incident was related to the Iran conflict) that he does not believe so. (Jinshi)

  • Latest Progress on DeFi United Ecological Rescue Initiative: Over 100,000 ETH Raised at Designated Donation Address

    On April 26, the DeFi United ecological rescue initiative, led by Aave, continues to advance. The Arbitrum DAO has released 30,765 ETH that was frozen after the rsETH incident on April 18. Currently, the designated donation address has raised a total of 100,360 ETH to address the collateral asset gap caused by the rsETH incident. The plan aims to restore the backing assets of rsETH through multi-party collaboration, stabilize the market, and prevent the spread of bad debts across protocols. The funds will be used to support the restoration of collateral rates and to gradually normalize the market in conjunction with relevant protocols. Key contributors or participants currently include: Arbitrum DAO releasing 30,765 ETH frozen after the rsETH incident, Mantle proposing to contribute 30,000 ETH, Aave DAO proposing to contribute 25,000 ETH, Aave founder Stani Kulechov confirming a contribution of 5,000 ETH, EtherFi proposing to provide 5,000 ETH, Lido proposing to provide 2,500 stETH, and the Golem Foundation and related projects contributing a total of 1,000 ETH, among others. Additionally, LayerZero, Ethena, Frax Finance, and Ink Foundation have also confirmed their participation, although the specific amounts have not yet been disclosed. It is important to note that the progress of this rescue initiative still relies on several external key conditions, including KelpDAO's restoration of rsETH redemptions and the Arbitrum Security Council's release of frozen assets, resulting in uncertainty regarding the overall recovery time and effectiveness.

  • Trump Evacuated from White House Correspondents' Dinner Due to Security Incident

    On April 26, local time April 25, U.S. President Trump was urgently evacuated from the White House Correspondents' Dinner due to a security incident. (CCTV News)

  • Shooting Incident at White House Correspondents' Dinner; Gunman Dead

    On April 26, local time on April 25, a shooting incident occurred in the hall of the White House Correspondents' Dinner, and the gunman is now deceased. (CCTV News)

  • Trump States He Will Not Allow Banks to Undermine Cryptocurrency Market Legislation

    On April 26, CoinDesk reported, citing attendees at a Trump cryptocurrency event, that Trump stated he would not allow banks to undermine cryptocurrency market legislation.

  • Iranian Officials to Depart Pakistan Without Meeting U.S. Representatives

    On April 25, according to a reporter from the New York Post: The Iranian delegation is set to leave Islamabad, the capital of Pakistan, and has consistently emphasized that they did not meet with U.S. officials during their brief visit.

  • Foreign Media: Second Round of Iran-U.S. Talks Scheduled for April 27

    On April 25, according to New Delhi Television: The second round of talks between Iran and the United States is scheduled to take place on April 27.

  • Iranian Lawmaker: Comprehensive Plan for Managing the Strait of Hormuz Formed

    On April 25, according to a report by Iran's Mehr News Agency, Iranian Islamic Parliament member Behnam Saidi stated that Iran has developed a comprehensive plan for managing the Strait of Hormuz. In an interview with Mehr News Agency, Saidi mentioned that an important aspect of this plan is the exclusive recognition of the name 'Persian Gulf' in all correspondence and commercial documents, rejecting any other names. Vessels and ships navigating in the region must obtain permission from Iran. Sovereignty over the Strait of Hormuz will be entirely under Iran's control. He also stated that vessels identified as hostile by the Supreme National Security Council or the General Staff of the Armed Forces of Iran are not allowed to pass through the Strait of Hormuz, and Israeli vessels are absolutely prohibited from entering the area. Ships passing through the region must pay relevant fees concerning safety, environmental protection, shipping management, and licensing, with priority given to payments in rials.

  • DeepSeek Plans to Raise $1.8 Billion with a Valuation of Approximately $20 Billion

    Sources reveal that the main reason for DeepSeek's current fundraising effort is the significant recent talent loss. Several core researchers have left the company to join ByteDance, Tencent, Xiaomi, and autonomous driving company Yuanrong Qihang. Meanwhile, competitors Zhiyu Technology and MiniMax have listed on the Hong Kong Stock Exchange, and the company Dark Side of the Moon has completed three rounds of financing in the first three months of this year, with a valuation more than quadrupling since the end of last year.