What Is a 51% Attack? | The Motley Fool (2024)

One of the hallmarks of the cryptocurrency space is decentralization. The idea is to give all participants a voice in a crypto network, to provide them with the ability to earn rewards from a network’s growth, and to prevent any single player or authority from taking control and making decisions that benefit them more than other stakeholders.

What Is a 51% Attack? | The Motley Fool (1)

Source: Getty images

However, decentralization is more than just a democratic feature to woo developers and investors. Decentralization is also a design to keep crypto safe from cyberattacks. One type of technique utilized by hackers is known as a 51% attack. Here’s what you need to know and how it affects cryptocurrency investors.

What is it?

What is a 51% attack?

A 51% attack occurs when a single miner (or group of miners) controls more than half of a blockchain network’s hash rate (or computing power). In gaining control over a blockchain network, a hacker can block transactions from taking place, reroute the priority of new transactions being computed, and even reverse some of their own past transaction records (an issue called “double spending”) by altering the data embedded in the blockchain.

51% attacks on a blockchain explained

To understand how a 51% attack works, consider the function of a blockchain. Blockchain is a string of code that contains all the historical information about transactions that have taken place using the blockchain network. The code is distributed to all of a blockchain network’s miners -- the powerful computers used to validate transactions and add the new block of data onto the blockchain.

By distributing this code to all of the miners, a blockchain network becomes decentralized. In other words, no single minority party can arbitrarily alter or add blocks of data. All participants must agree that a block of data is valid before it is added to the chain. However, by taking more than half of the total computing power operating a blockchain, a hacker or group can create its own consensus on block validity.

A majority gives the miner the ability to block new transactions from taking place or to reorder transactions waiting in line to be processed. Besides the “double spend” issue where its own past blocks of data are altered, a 51% attack could also alter and steal any new transactions after it has gained control. However, a 51% attack would unlikely be able to create new crypto coins built on a blockchain or steal crypto holdings from other accounts.

Is it possible?

Is a 51% attack possible?

Blockchain networks become more decentralized and more secure as they grow larger. Not only does scale increase the difficulty of pulling off a 51% attack, a larger network hash rate also increases the expense involved in executing an attack. Creating and validating blocks, especially older blocks of transaction data with lots of subsequent blocks added since, requires a great deal of computing power.

As with all things, computing power costs money -- in this case, the cost of operating the computers and the electricity consumed to power the computation. So large blockchain networks such as Bitcoin (BTC 3.27%) and Ethereum (ETH 2.86%) have a low likelihood of a 51% attack being carried out against them. And, even if a single miner accumulated enough hash rate, the expense of trying to reverse past transactions would likely be too cost-prohibitive to carry out.

Although a 51% attack could be somewhat contained, it can significantly harm the reputation of a blockchain network and crypto tokens used on it. As a result, miners might choose to leave, which could further reduce security and lower the value of any crypto assets built on the blockchain.

Examples

Past examples of 51% attacks

Some smaller blockchain networks in particular can be subject to malicious tampering. A hacker could use more powerful computing equipment, such as ASICs (application-specific integrated circuits), on a network, primarily using off-the-shelf purchased GPUs (graphics processing units) to carry out a 51% attack. Although even more unlikely, a proof-of-stake system could also be attacked by accumulating more than half of the value of crypto tokens on a network.

Although unlikely, a 51% attack is possible -- and has occurred in some instances.

One example is Bitcoin Gold (CRYPTO:BTG), a hard fork from Bitcoin, that suffered a 51% attack in 2018. More than $18 million of Bitcoin Gold was stolen. Another attempted hack came in 2020 but was quickly thwarted.

In 2021, another Bitcoin hard fork called Bitcoin SV (CRYPTO:BSV) suffered a series of 51% attacks. The hackers were able to delete or alter the newest blocks after it took control of the network.

Ethereum Classic (ETC 1.66%), which was also created by a hard fork from Ethereum in 2016, got hit by a 51% attack in 2020. Several million dollars were reportedly stolen.

In all three cases, developers were able to implement new protocols to help prevent further malicious tampering. However, all three cryptos deteriorated in value in the months immediately following these events.

Related Investing Topics

9 Blockchain Stocks to Invest InThis form of ledger technology is what's behind cryptocurrencies and other tech trends.
Investing in Top FinTech CompaniesCombine finance and technology and you get companies in this space.
Investing in Cryptocurrency StocksThese technologies serve as the gateway between the digital blockchain and human society.
What Are Non-Fungible Tokens (NFTs)?Tokens based on a blockchain, NFTs are used to guarantee ownership of an asset.

Blockchain attacks and investors

Blockchain attacks and investors

All computing systems are going to be subject to attempted attack from bad actors. This is a risk that digital currencies in general face, and it’s a factor investors should consider before buying a cryptocurrency or participating in a blockchain network’s activity. However, more traditional money has its issues, too, such as forgery.

While 51% attacks are rare, there are other risks with the blockchain and cryptocurrency industry. This is new technology, and it's still developing and rapidly evolving. Additionally, many disagree on how to properly value cryptocurrencies and digital assets, so cryptocurrency prices are highly volatile. If you decide to invest in this space at all, remember to make it part of a well-diversified portfolio that features other asset classes.

Nicholas Rossolillo has positions in Bitcoin and Ethereum. The Motley Fool has positions in and recommends Bitcoin and Ethereum. The Motley Fool has a disclosure policy.

What Is a 51% Attack? | The Motley Fool (2024)

FAQs

What is the 51% attack? ›

A 51% attack is an attack on a blockchain by an entity or group that controls more than 50% of the network. Attackers with majority network control can interrupt the recording of new blocks by preventing other miners from completing blocks.

What is the solution to 51% attack? ›

On preventing 51% attacks

By always ensuring that no single miner, group of miners or a mining pool is controlling more than 50% of the Bitcoin network's computing power, a single miner or group wanting to attack the network will most likely not be able to outbuild the longest existing and validated blockchain.

What is the proof of work in a 51 attack? ›

In a 51% attack, the individual or group performing the attack exploits the proof-of-work[2] (PoW) element that blockchains use to verify information. Since the attacker controls the majority of the processing power, they are able to relay new information to all nodes.

What are the consequences of 51% attack? ›

The Risks of a 51% Attack

If successful, attackers may interrupt the recording of new blocks by preventing other miners from completing blocks. They may also reverse transactions, allowing them to double-spend coins. This undermines the integrity of the blockchain and can lead to a loss of trust in the network.

What is the main difference between a 51% attack and selfish mining? ›

A 51% attack has four types of consequences, which can sometimes be very dangerous for network victims: One of them is selfish mining when attackers take advantage of their majority in terms of receiving rewards. If a block is mined simultaneously, miners must vote on whose block they choose.

What is the perfect solution for the man in the middle attack? ›

VPN. One of the best practices for network security is to use a VPN (virtual private network) when connecting online. A VPN encrypts the data you send online. This encryption stops the MITM attack from infiltrating your network traffic.

What is the key for support attack in hoi4? ›

With a unit selected, hold down control ^Ctrl and right click on an existing battle to "support" that battle.

Is a 51% attack illegal? ›

Is a 51% Attack Illegal? There do not appear to be any laws that specifically prevent miners from seeking to control more than 50% of a network's computing power. However, acts that miners or mining groups take after gaining network control (the actual attacks) can create criminal liability.

Is 51 attack possible on PoS? ›

Proof-of-Stake Security

Long touted as a threat to cryptocurrency fans, the 51% attack is a concern when PoS is used, but it is doubtful it will occur. Under PoW, a 51% attack occurs when an entity controls more than 50% of the miners in a network and uses that majority to alter the blockchain.

What is my proof of work? ›

Proof of work (PoW) is a form of cryptographic proof in which one party (the prover) proves to others (the verifiers) that a certain amount of a specific computational effort has been expended. Verifiers can subsequently confirm this expenditure with minimal effort on their part.

How much would a 51 attack on BTC cost? ›

By analyzing secondary market data and real-time hash rate output, the report found a 51% attack on Bitcoin would require an actor to purchase a staggering 7 million ASIC mining rigs, which would cost somewhere around the $20billion mark.

What is a 51 percent attack Wiki? ›

In a so-called "51% attack" a central entity gains control of more than half of a network and can then manipulate that specific blockchain record at will, allowing double-spending.

What is the research of the 51% attack based on blockchain? ›

As a potential security hazard in the payment field, 51% attack brings huge risks to the normal operation of the blockchain system. Miners with great computing power have the ability to monopolize the generation of blocks and modify the generated blocks.

Is double spending illegal? ›

Whether double-spending is illegal depends on the circ*mstances. With regards to a cryptocurrency with a market value, it is illegal because it is committing fraud. However, double spending is not limited to cryptocurrency.

Top Articles
Challenges And Criticism: Navigating The Controversies Surrounding The Shiba Inu Navigating the Shiba Inu Controversies – The Crypto Basic
How To Budget With The 50/30/20 Method - Investadisor %
What Is Single Sign-on (SSO)? Meaning and How It Works? | Fortinet
Where To Go After Howling Pit Code Vein
Radikale Landküche am Landgut Schönwalde
Davita Internet
Yogabella Babysitter
How To Be A Reseller: Heather Hooks Is Hooked On Pickin’ - Seeking Connection: Life Is Like A Crossword Puzzle
Overnight Cleaner Jobs
DENVER Überwachungskamera IOC-221, IP, WLAN, außen | 580950
Craigslist Cars And Trucks Buffalo Ny
Gw2 Legendary Amulet
Nwi Police Blotter
13 The Musical Common Sense Media
Zoebaby222
More Apt To Complain Crossword
Los Angeles Craigs List
Craigslist Mpls Cars And Trucks
Les Schwab Product Code Lookup
2016 Ford Fusion Belt Diagram
Wilmot Science Training Program for Deaf High School Students Expands Across the U.S.
SXSW Film & TV Alumni Releases – July & August 2024
Boscov's Bus Trips
Air Quality Index Endicott Ny
Craigslist Wilkes Barre Pa Pets
Parkeren Emmen | Reserveren vanaf €9,25 per dag | Q-Park
What Equals 16
Mjc Financial Aid Phone Number
Miller Plonka Obituaries
Halsted Bus Tracker
Fox And Friends Mega Morning Deals July 2022
Goodwill Houston Select Stores Photos
Shih Tzu dogs for sale in Ireland
Stafford Rotoworld
Craigslist Lakeside Az
Busted Newspaper Campbell County KY Arrests
Samantha Lyne Wikipedia
2007 Jaguar XK Low Miles for sale - Palm Desert, CA - craigslist
The Conners Season 5 Wiki
Achieving and Maintaining 10% Body Fat
Promo Code Blackout Bingo 2023
John M. Oakey & Son Funeral Home And Crematory Obituaries
Swoop Amazon S3
Frequently Asked Questions
Samsung 9C8
Cvs Minute Clinic Women's Services
Hampton Inn Corbin Ky Bed Bugs
What Is The Gcf Of 44J5K4 And 121J2K6
Turning Obsidian into My Perfect Writing App – The Sweet Setup
Southern Blotting: Principle, Steps, Applications | Microbe Online
Latest Posts
Article information

Author: Errol Quitzon

Last Updated:

Views: 5637

Rating: 4.9 / 5 (79 voted)

Reviews: 86% of readers found this page helpful

Author information

Name: Errol Quitzon

Birthday: 1993-04-02

Address: 70604 Haley Lane, Port Weldonside, TN 99233-0942

Phone: +9665282866296

Job: Product Retail Agent

Hobby: Computer programming, Horseback riding, Hooping, Dance, Ice skating, Backpacking, Rafting

Introduction: My name is Errol Quitzon, I am a fair, cute, fancy, clean, attractive, sparkling, kind person who loves writing and wants to share my knowledge and understanding with you.