{"id":9076,"date":"2023-02-22T12:17:51","date_gmt":"2023-02-22T12:17:51","guid":{"rendered":"https:\/\/www.bitnovo.com\/blog\/?p=9076"},"modified":"2025-09-10T15:27:17","modified_gmt":"2025-09-10T15:27:17","slug":"what-is-a-51-blockchain-attack","status":"publish","type":"post","link":"https:\/\/www.bitnovo.com\/blog\/en\/what-is-a-51-blockchain-attack","title":{"rendered":"What is a 51% Blockchain attack?"},"content":{"rendered":"<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_82_2 counter-hierarchy ez-toc-counter ez-toc-transparent ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Alternar tabla de contenidos\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #ffffff;color:#ffffff\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #ffffff;color:#ffffff\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 eztoc-toggle-hide-by-default' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.bitnovo.com\/blog\/en\/what-is-a-51-blockchain-attack\/#what_is_the_51_attack_definition\" >What is the 51% attack: definition<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.bitnovo.com\/blog\/en\/what-is-a-51-blockchain-attack\/#how_does_a_51_attack_work\" >How does a 51% attack work?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.bitnovo.com\/blog\/en\/what-is-a-51-blockchain-attack\/#examples_of_blockchain_platforms_that_suffered_a_51_attack\" >Examples of blockchain platforms that suffered a 51% attack<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.bitnovo.com\/blog\/en\/what-is-a-51-blockchain-attack\/#the_probability_of_a_51_attack_occurring\" >The probability of a 51% attack occurring<\/a><\/li><\/ul><\/nav><\/div>\n<span class=\"span-reading-time rt-reading-time\" style=\"display: block;\"><span class=\"rt-label rt-prefix\">Tiempo de lectura:<\/span> <span class=\"rt-time\"> 4<\/span> <span class=\"rt-label rt-postfix\">minutos<\/span><\/span><div id=\"row-1696379320\" class=\"row row-collapse row-full-width align-center\">\n<div class=\"col small-12 large-12\">\n<div class=\"col-inner\">\n<p>Blockchain technology is often associated with decentralization and security, without a decision center and control bodies that can be attacked or corrupted, making decisions against the rest of the network.<\/p>\n<p>In fact, the\u00a0<a href=\"https:\/\/www.bitnovo.com\/blog\/en\/what-is-blockchain-and-how-does-it-work\/\">Blockchain can be defined as a peer to peer system<\/a>, where nobody has privileges.<\/p>\n<p><b>So, what is a 51% attack on the Blockchain? Is it possible to attack and enter the network of this extraordinary technology?<\/b><\/p>\n<h2><span class=\"ez-toc-section\" id=\"what_is_the_51_attack_definition\"><\/span><b>What is the 51% attack: definition<\/b><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><b>A majority attack<\/b>\u00a0(usually called a 51% attack or attack &gt; 50%) is an attack that occurs on blockchain networks using the consensus mechanism of proof-of-work (PoW).<\/p>\n<p><b>\u00a0The Proof of Work<\/b>, or mining, is the first consensus method used by cryptosystems such as Bitcoin or Ethereum and is also the consensus method most vulnerable to these attacks.<\/p>\n<p>In the case of cryptomonies that use mining or Proof of Work (PoW), 51% of decision makers translate into\u00a0<b>51% of mining capacity<\/b>, and more precisely into the ability to calculate hashes.<\/p>\n<p>Although the main blockchains are very resistant to these types of attacks, the smaller cryptomonies are very vulnerable, as there are few people involved in mining.<\/p>\n<div id=\"row-2116691747\" class=\"row\">\n<div class=\"col small-12 large-12\">\n<div class=\"col-inner text-center\">\n<div id=\"image_1300856089\" class=\"img has-hover x md-x lg-x y md-y lg-y\">\n<div class=\"img-inner dark\"><img fetchpriority=\"high\" decoding=\"async\" class=\"attachment-large size-large ls-is-cached lazyloaded\" src=\"https:\/\/www.bitnovo.com\/blog\/wp-content\/uploads\/2020\/10\/51-attack-1024x576.jpg\" sizes=\"(max-width: 1020px) 100vw, 1020px\" srcset=\"https:\/\/www.bitnovo.com\/blog\/wp-content\/uploads\/2020\/10\/51-attack-1024x576.jpg 1024w, https:\/\/www.bitnovo.com\/blog\/wp-content\/uploads\/2020\/10\/51-attack-300x169.jpg 300w, https:\/\/www.bitnovo.com\/blog\/wp-content\/uploads\/2020\/10\/51-attack-768x432.jpg 768w, https:\/\/www.bitnovo.com\/blog\/wp-content\/uploads\/2020\/10\/51-attack.jpg 1280w\" alt=\"attacco del 51% Bitnovo\" width=\"1020\" height=\"574\" data-srcset=\"https:\/\/www.bitnovo.com\/blog\/wp-content\/uploads\/2020\/10\/51-attack-1024x576.jpg 1024w, https:\/\/www.bitnovo.com\/blog\/wp-content\/uploads\/2020\/10\/51-attack-300x169.jpg 300w, https:\/\/www.bitnovo.com\/blog\/wp-content\/uploads\/2020\/10\/51-attack-768x432.jpg 768w, https:\/\/www.bitnovo.com\/blog\/wp-content\/uploads\/2020\/10\/51-attack.jpg 1280w\" data-src=\"https:\/\/www.bitnovo.com\/blog\/wp-content\/uploads\/2020\/10\/51-attack-1024x576.jpg\" data-sizes=\"(max-width: 1020px) 100vw, 1020px\" \/><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><em><strong>Photo Credits:\u00a0Linkkoin.com\u00a0<\/strong><\/em><\/p>\n<p>Thus, a 51% attack occurs when a person or group controls 51% of the network\u2019s computing power. In other words, it would have more computing power than all other miners and voting participants than the rest.<\/p>\n<p>An example of what someone can do with 51% of the network is the\u00a0<b>double-spending attack<\/b>: a payment is sent with a transaction, just before it starts mining blocks in secret. The transaction is validated by the entire network and arrives at its destination, with the payment being accepted as such.<\/p>\n<p>Once what has been purchased has been secured, the attacker makes public the chain of blocks he has secretly extracted (so-called<b>\u00a0shadow mining<\/b>).<\/p>\n<p>Having 51% of the network, that blockchain will be validated by the rest of the network, in some kind of consensus or democratic process. After acceptance, the transaction that took place immediately afterwards will disappear and the payment money will return to the attacker, who will be able to spend it again. In addition, all subsequent blocks will be rewritten, in what is known as deep chain reorders.<\/p>\n<p>A 51% attack would probably not completely destroy bitcoin or other blockchain-based currency, even if it was very harmful.<\/p>\n<div id=\"row-990586153\" class=\"row\">\n<div class=\"col small-12 large-12\">\n<div class=\"col-inner text-center\">\n<div id=\"image_2019010558\" class=\"img has-hover x md-x lg-x y md-y lg-y\">\n<div class=\"img-inner dark\"><img decoding=\"async\" class=\"attachment-large size-large lazyloaded\" src=\"https:\/\/www.bitnovo.com\/blog\/wp-content\/uploads\/2021\/02\/costi-attacco-51-1024x640-1.jpg\" sizes=\"(max-width: 1020px) 100vw, 1020px\" srcset=\"https:\/\/www.bitnovo.com\/blog\/wp-content\/uploads\/2021\/02\/costi-attacco-51-1024x640-1.jpg 1024w, https:\/\/www.bitnovo.com\/blog\/wp-content\/uploads\/2021\/02\/costi-attacco-51-1024x640-1-300x188.jpg 300w, https:\/\/www.bitnovo.com\/blog\/wp-content\/uploads\/2021\/02\/costi-attacco-51-1024x640-1-768x480.jpg 768w\" alt=\"costi attacco 51% Bitnovo\" width=\"1020\" height=\"638\" data-srcset=\"https:\/\/www.bitnovo.com\/blog\/wp-content\/uploads\/2021\/02\/costi-attacco-51-1024x640-1.jpg 1024w, https:\/\/www.bitnovo.com\/blog\/wp-content\/uploads\/2021\/02\/costi-attacco-51-1024x640-1-300x188.jpg 300w, https:\/\/www.bitnovo.com\/blog\/wp-content\/uploads\/2021\/02\/costi-attacco-51-1024x640-1-768x480.jpg 768w\" data-src=\"https:\/\/www.bitnovo.com\/blog\/wp-content\/uploads\/2021\/02\/costi-attacco-51-1024x640-1.jpg\" data-sizes=\"(max-width: 1020px) 100vw, 1020px\" \/><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><a href=\"https:\/\/www.crypto51.app\/\">The Crypto51 page<\/a>\u00a0<b>calculates the dollar costs involved in controlling the 51% network of some crypto-currencies that work with Pow (PROOF OF WORK).<\/b><\/p>\n<\/div>\n<\/div>\n<\/div>\n<div id=\"row-805475134\" class=\"row row-collapse row-full-width align-center\">\n<div class=\"col small-12 large-12\">\n<div class=\"col-inner\">\n<h2><span class=\"ez-toc-section\" id=\"how_does_a_51_attack_work\"><\/span><b>How does a 51% attack work?<\/b><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Bitcoin and other crypto currencies are based on the blockchain, a chain of blocks and a distributed ledger form. These digital files record every transaction made on a crypto-currency network during a specified period. For bitcoin, a new block is generated approximately every 10 minutes. Once a block has been completed or extracted, it cannot be changed, as network users would quickly detect and reject a fraudulent version of the public ledger. As a result,\u00a0<b>no one can spend a coin twice.<\/b><\/p>\n<p>However, if an attacker or group of attackers control most of the computing power of the network, they could interfere with the process of registering new blocks.<\/p>\n<p>For example, they can prevent other miners from completing blocks, which theoretically allows them to monopolize the extraction of new blocks and earn all the rewards.<\/p>\n<p>In the case of bitcoin,\u00a0<b>a 51% attack could block the transactions of other users and could send a transaction and then cancel it<\/b>, making it appear that they still have the currency they just spent. This vulnerability is known as\u00a0<b>double-spending<\/b>\u00a0and occurs when someone can spend the same token several times. This is the digital equivalent of a counterfeit.<\/p>\n<p>A network that allows double spending would quickly suffer a loss of confidence.<\/p>\n<p>Changing the historical blocks, i.e. the transactions that were blocked before the attack began, would be extremely difficult even in the case of a 51% attack. The further back the transactions are, the more difficult it will be to change them.<\/p>\n<p>On the other hand, a 51% attack is possible with less than 50% of the network\u2019s mining power, but with less chance of success.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"examples_of_blockchain_platforms_that_suffered_a_51_attack\"><\/span><b>Examples of blockchain platforms that suffered a 51% attack<\/b><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Let\u2019s see below some\u00a0<b>real cases of 51% attacks<\/b>\u00a0against some networks and crypto-currencies.<\/p>\n<p><b>Bitcoin Gold:<\/b>\u00a0In May 2018, Bitcoin Gold, one of Bitcoin\u2019s forks, and at that time the 26th largest cryptomat, was attacked by 51%. The malicious actors controlled a large amount of Bitcoin Gold\u2019s hash power and were able to spend twice over several days, stealing over $18 million due to the double spending.<\/p>\n<p><b>Verge\u00a0<\/b>was attacked at least twice, the first and most serious attack in early April 2018. Because Verge\u2019s supply is not limited and new tokens can be extracted, the attacker issued new Verges worth more than $1 million. As a privacy-centric currency, the identity of the attacker is very easy to conceal.<\/p>\n<p><b>Ethereum Classic<\/b>\u00a0double spending reached $5.6 million.<\/p>\n<p><b>Vertcoin<\/b>\u00a0was attacked in November 2018. One or more attackers took control of the hash power and stole approximately $100,000.<\/p>\n<p><b>Krypton and Shift<\/b>, two ethereum-based blockchains, were attacked by 51% in August 2016.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"the_probability_of_a_51_attack_occurring\"><\/span><b>The probability of a 51% attack occurring<\/b><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Beyond the real-world examples,\u00a0<b>due to the enormous hash power in the Bitcoin and Ethereum block chains, it is not theoretically and economically feasible to carry out a 51% attack.<\/b>\u00a0In fact, it is estimated that a malicious miner would need computer power or hash power to replace that of millions of miners worldwide and would have to spend an enormous amount of money to acquire mining hardware that can compete with the rest of the network.<\/p>\n<p>However, that does not mean that there are no other ways to initiate 51% attacks. An error in the code of a block chain could, in some cases, open the door for a miner to produce new blocks at a much faster rate and start a 51% attack.<\/p>\n<p>This is why t<b>hese attacks are common in smaller working test block chains, as less computing power is required\u00a0<\/b>in this case.<\/p>\n<p>History shows us that\u00a0<b>the Bitcoin block chain has never suffered a 51% attack<\/b>, also because it has an active hash power that is difficult to compromise.<\/p>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p><span class=\"span-reading-time rt-reading-time\" style=\"display: block;\"><span class=\"rt-label rt-prefix\">Tiempo de lectura:<\/span> <span class=\"rt-time\"> 4<\/span> <span class=\"rt-label rt-postfix\">minutos<\/span><\/span>Blockchain technology is often associated with decentralization and security, without a decision center and control bodies that can be attacked or corrupted, making decisions against the rest of the network. In fact, the\u00a0Blockchain can be defined as a peer to peer system, where nobody has privileges. So, what is a 51% attack on the Blockchain? [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":6761,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[185],"tags":[],"class_list":["post-9076","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blockchain-en"],"_links":{"self":[{"href":"https:\/\/www.bitnovo.com\/blog\/wp-json\/wp\/v2\/posts\/9076","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.bitnovo.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.bitnovo.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.bitnovo.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.bitnovo.com\/blog\/wp-json\/wp\/v2\/comments?post=9076"}],"version-history":[{"count":3,"href":"https:\/\/www.bitnovo.com\/blog\/wp-json\/wp\/v2\/posts\/9076\/revisions"}],"predecessor-version":[{"id":24767,"href":"https:\/\/www.bitnovo.com\/blog\/wp-json\/wp\/v2\/posts\/9076\/revisions\/24767"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.bitnovo.com\/blog\/wp-json\/wp\/v2\/media\/6761"}],"wp:attachment":[{"href":"https:\/\/www.bitnovo.com\/blog\/wp-json\/wp\/v2\/media?parent=9076"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.bitnovo.com\/blog\/wp-json\/wp\/v2\/categories?post=9076"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.bitnovo.com\/blog\/wp-json\/wp\/v2\/tags?post=9076"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}