A 51% attack (or majority attack) is a scenario in a decentralized blockchain network, particularly those using Proof-of-Work (PoW), where a single miner or a coordinated group of miners gains control of more than 50% of the network's total hash rate. This majority control of computational power allows the attacker to disrupt the network's normal operation by double-spending coins, preventing other miners from confirming new blocks (censorship), and even reorganizing the blockchain to reverse previously confirmed transactions. The term originates from the critical threshold of 50%+1 needed to theoretically control the consensus process.
51% Attack
What is a 51% Attack?
A 51% attack is a potential security vulnerability in a proof-of-work blockchain where a single entity gains majority control of the network's mining or staking power, enabling them to manipulate the transaction history.
The primary mechanism of a 51% attack involves blockchain reorganization. With majority hash power, an attacker can secretly mine an alternative, longer chain of blocks that excludes certain transactions (like one where they spent coins) and includes new ones (like returning those same coins to themselves). Once this private chain is longer than the public, honest chain, the attacker releases it. The network's consensus rules, which dictate that nodes adopt the longest valid chain, will then accept the attacker's version of history, effectively erasing the original transactions. This enables double-spending, the most common and financially damaging outcome of such an attack.
While theoretically devastating, executing a 51% attack is prohibitively expensive and logistically challenging for large, established networks like Bitcoin or Ethereum (pre-merge). The cost comes from acquiring and operating the vast amount of specialized hardware (ASICs) or staked assets needed to outpace the rest of the honest network. However, smaller blockchains with lower total hash rate or staked value are significantly more vulnerable. Real-world examples include attacks on chains like Bitcoin Gold (BTG), Ethereum Classic (ETC), and several smaller PoW cryptocurrencies, which suffered double-spend losses amounting to millions of dollars.
The defense against 51% attacks is inherent in the security model: a more decentralized and widely distributed mining or staking pool makes collusion exponentially harder. Networks can also implement defensive measures like checkpointing (periodically finalizing blocks) or increasing confirmation times for large transactions. The rise of Proof-of-Stake (PoS) consensus, as used by Ethereum 2.0, changes the attack vector from computational power to financial stake, but analogous majority stake attacks remain a theoretical concern, mitigated by mechanisms that can slash (destroy) the attacker's staked funds.
Key Features of a 51% Attack
A 51% attack is a scenario where a single entity gains majority control of a blockchain network's hashrate or stake, enabling them to disrupt consensus. This breakdown details its core mechanisms, prerequisites, and consequences.
Core Prerequisite: Majority Control
The attack's foundation is controlling >50% of the network's hashing power (Proof of Work) or >33% of the staked tokens (Proof of Stake). This majority allows the attacker to unilaterally determine the canonical chain, overriding the honest network. The probability and cost of achieving this control are the primary security metrics for any chain.
Double-Spending: The Primary Threat
The most direct financial exploit is double-spending. The attacker:
- Spends coins in a transaction on the public chain (e.g., buys goods).
- Secretly mines a parallel chain where those coins are not spent.
- Once the parallel chain is longer, they broadcast it, causing the original transaction to be orphaned, allowing them to spend the coins again.
Transaction Censorship & Reordering
With majority control, an attacker can censor transactions by excluding them from blocks they mine. They can also reorder transactions within blocks to gain financial advantage, such as front-running decentralized exchange trades. This undermines the network's neutrality and reliability for all users.
Prevention of Chain Reorganizations
An attacker can use their hashrate to prevent other miners' blocks from being added to the canonical chain, effectively freezing the legitimate network's progress. This can halt withdrawals from bridges or smart contracts, creating systemic risk for interconnected DeFi applications.
Economic Deterrence & Real-World Viability
For large networks like Bitcoin or Ethereum, executing a 51% attack is prohibitively expensive due to the immense cost of acquiring hardware or stake, which would likely crash the asset's value. However, smaller chains with low hashrate or market capitalization, like many Proof-of-Work altcoins, remain vulnerable to hashrate rental from services like NiceHash.
Distinction from Finality Attacks
In Proof of Stake systems with finality (e.g., Ethereum), a 51% attack is more accurately a >33% attack for censorship, but achieving >66% is required for a finality reversion. This is a catastrophic event where previously finalized blocks are reversed, requiring a social-layer consensus fork to resolve, as seen in past incidents on chains like Polygon.
How a 51% Attack Works
A 51% attack is a critical security vulnerability in proof-of-work blockchains where a single entity gains majority control of the network's mining or staking power, enabling them to manipulate the ledger.
A 51% attack (also known as a majority attack) is a scenario in a proof-of-work (PoW) blockchain where a single miner or a coordinated group of miners gains control of more than 50% of the network's total hash rate. This majority control of computational power allows the attacker to disrupt the normal consensus mechanism. They can perform malicious actions such as double-spending coins, preventing other miners from confirming new blocks (censorship), and even reorganizing the blockchain to erase recent transactions. The attack is named for the theoretical minimum threshold of control required, though in practice, the probability of success increases significantly as an attacker approaches this majority.
The primary mechanism of a 51% attack involves blockchain reorganization. The attacker secretly mines an alternative chain of blocks, diverging from the public, honest chain. Because they control the majority of hash power, their private chain can be mined faster and will eventually become longer than the honest chain. When the attacker reveals this longer chain to the network, the protocol's longest chain rule forces nodes to accept it as the valid version of history. This allows the attacker to reverse transactions that were previously confirmed on the honest chain, most notably enabling double-spending where the same cryptocurrency is spent twice.
Executing a 51% attack is prohibitively expensive on large, established networks like Bitcoin or Ethereum (pre-merge) due to the immense, globally distributed hash rate required. However, smaller altcoins with lower hash rates are frequent targets. Real-world examples include attacks on Bitcoin Gold (BTG) and Ethereum Classic (ETC), which suffered multiple successful 51% attacks resulting in significant financial losses from double-spends. The economic incentive is a key factor: the cost of renting hash power (e.g., from hash rate marketplaces) must be less than the potential profit from the double-spent coins.
While most associated with PoW, similar majority attacks are possible in proof-of-stake (PoS) systems, often called long-range attacks or staking attacks, where an entity controls a majority of the staked cryptocurrency. Modern PoS protocols like Ethereum's implementation incorporate slashing penalties and checkpointing to make such attacks economically irrational and technically more difficult. The fundamental defense across all consensus models is a highly decentralized and widely distributed network of validators or miners, making it economically and logistically infeasible for any single party to amass a controlling share.
Attacker Capabilities and Limitations
A 51% attack is a scenario where a single entity gains majority control of a blockchain network's hashrate or stake, enabling them to disrupt the network's normal operations. This section details what an attacker can and cannot do with this power.
Core Capability: Double Spending
The primary and most economically damaging action in a 51% attack. An attacker with majority control can:
- Reverse transactions they sent, allowing them to spend the same coins twice.
- Create a private chain where they send coins to an exchange, then reorganize the main chain to erase that transaction after withdrawing fiat.
- This undermines the fundamental immutability and finality guarantees of the blockchain for their own transactions.
Capability: Transaction Censorship
The attacker can selectively exclude or censor transactions from being included in new blocks.
- They can prevent specific addresses from sending or receiving funds.
- This can be used for targeted denial-of-service against individuals, businesses, or smart contracts.
- However, they cannot alter or forge transactions from other users, as this requires the sender's private keys.
Limitation: Cannot Steal Funds
A critical boundary of a 51% attack. The attacker cannot:
- Spend coins from addresses they do not control, as this requires forging digital signatures.
- Alter the content of existing, confirmed transactions from other users.
- Change the blockchain's protocol rules, such as the block reward or difficulty adjustment algorithm.
Limitation: Cannot Create Coins
The attacker is constrained by the network's native monetary policy.
- They cannot arbitrarily inflate the supply by creating coins out of thin air.
- They are limited to the block rewards and transaction fees available to the miner or validator of each new block.
- This makes sustained attacks economically costly, as they must cover hardware and energy expenses.
Economic & Practical Constraints
Executing a 51% attack is not just a technical challenge but an economic one.
- Cost: Renting or acquiring majority hashrate (Proof of Work) or stake (Proof of Stake) is extremely expensive.
- Detection: Network monitoring services and nodes can detect unusual chain reorganizations, alerting the community.
- Defense: The community can execute a hard fork to reject the attacker's chain, rendering the attack futile if consensus is reached.
51% Attack: Proof of Work vs. Proof of Stake
A comparison of how a 51% attack is executed, prevented, and mitigated under the two dominant consensus mechanisms.
| Feature / Metric | Proof of Work (PoW) | Proof of Stake (PoS) |
|---|---|---|
Attack Vector | Control >50% of total network hashrate | Control >33% or >51% of total staked cryptocurrency |
Primary Resource Required | Computational power (hardware & electricity) | Financial capital (staked cryptocurrency) |
Attack Cost (Theoretical) | High, scales with network security | Extremely high, requires acquiring vast stake; capital is at risk of slashing |
Attack Reversibility | Transactions can be reversed; double-spends possible | Less reversible; validators can be slashed, making attack economically irrational |
Primary Defense Mechanism | Economic cost of acquiring hardware/energy | Economic penalties (slashing) and social consensus (fork choice rules) |
Recovery Post-Attack | Community-coordinated hard fork to reject malicious chain | Automated slashing of malicious validators; social consensus fork if necessary |
Notable Example | Bitcoin Gold (2018), Ethereum Classic (2020) | Theoretically possible, but no major successful attack on a top-tier PoS chain to date |
Real-World 51% Attack Examples
These incidents demonstrate the practical risks and consequences of a 51% attack on proof-of-work blockchains with low hash rate security.
Common Attack Vector: Hash Power Rental
Most successful 51% attacks are facilitated by the rental of hash power from services like NiceHash. Attackers can temporarily redirect massive computational power to a target chain at a known cost. The economic calculation is simple: if the cost of renting hash power is less than the potential profit from double-spending, an attack is viable. This makes low-hash-rate chains perpetually vulnerable to this Sybil attack variant.
Defensive Measures & Industry Response
In response to these attacks, the industry developed several countermeasures:
- Checkpointing: Networks like Ethereum Classic implemented MESS to make deep reorgs computationally prohibitive.
- Exchange Safeguards: Major exchanges increased confirmation requirements for deposits from vulnerable chains and implemented chain monitoring.
- Consensus Shifts: Some projects migrated from Proof-of-Work (PoW) to Proof-of-Stake (PoS) or hybrid models to eliminate hash power-based attacks entirely, as seen with Ethereum's Merge.
Security Considerations and Defense
A 51% attack is a scenario where a single entity or coalition gains control of the majority of a blockchain network's hashrate or staked assets, enabling them to disrupt the network's consensus. This section details its mechanics, consequences, and mitigation strategies.
Core Mechanism
A 51% attack occurs when an attacker controls more than 50% of the network's mining power (hashrate) in Proof of Work, or staked assets in Proof of Stake. This majority control allows them to:
- Orphan legitimate blocks by creating a longer, competing chain.
- Double-spend coins by reversing confirmed transactions.
- Censor transactions by excluding them from newly mined blocks.
Primary Consequences
Successful execution undermines the fundamental security guarantees of a blockchain.
- Loss of Finality: Previously confirmed transactions can be reversed, destroying trust.
- Network Disruption: The attack can halt or significantly slow down legitimate block production.
- Economic Damage: The native token's value typically plummets due to the breach of trust, and exchanges may halt deposits/withdrawals.
Economic Deterrence
The primary defense is making an attack prohibitively expensive. The cost is tied to acquiring the majority of the network's security budget.
- In Proof of Work: Attack cost ≈ cost of acquiring and operating >50% of the global hashrate.
- In Proof of Stake: Attack cost ≈ cost of acquiring >50% of the total staked supply, which the attacker risks having slashed (destroyed) if caught. Larger, more decentralized networks have a higher attack cost.
Real-World Examples
These attacks are most feasible against smaller, less secure chains.
- Bitcoin Gold (2018 & 2020): Suffered multiple 51% attacks leading to double-spends exceeding $70k.
- Ethereum Classic (2020): Attacked multiple times, with one reorganization depth of over 7,000 blocks.
- Verge (2018): Exploited via a flaw in its algorithm, not pure hashrate, but demonstrated the vulnerability of low-hashrate chains.
Detection & Mitigation
Networks and services employ monitoring and response strategies.
- Chain Analysis: Services like Coinbase monitor for deep chain reorganizations.
- Checkpointing: Some chains (e.g., Ethereum Classic post-attack) implement modified consensus with trusted checkpoints.
- Increased Confirmations: Exchanges dramatically increase the required confirmation count for deposits from vulnerable chains.
Related Concepts
Understanding a 51% attack requires knowledge of adjacent security models.
- Nothing at Stake (PoS): A theoretical problem where validators have no cost to validate on multiple chains, though mitigated by slashing.
- Long-Range Attack: A PoS-specific attack where an attacker rewrites history from a distant past block.
- Sybil Attack: Creating many fake identities to gain influence, which Proof of Work and Proof of Stake are designed to resist.
Common Misconceptions About 51% Attacks
The 51% attack is a widely misunderstood security concept in blockchain. This section clarifies persistent myths about its mechanics, impact, and feasibility across different consensus protocols.
No, a 51% attack does not allow an attacker to steal coins from existing wallets or compromise private keys. The attack targets the blockchain's consensus mechanism, not individual accounts. The primary capabilities are double-spending (spending the same coins twice) and transaction censorship (preventing certain transactions from being confirmed). An attacker cannot forge signatures or alter transactions they do not control the keys for. The security model of digital signatures remains intact, meaning your wallet's funds are safe from direct theft via this vector, though double-spending in trades or payments you accept is a risk.
Frequently Asked Questions (FAQ)
A 51% attack is a critical security vulnerability in blockchain networks. These questions address how it works, its consequences, and its relevance to different consensus mechanisms.
A 51% attack is a scenario where a single entity or a coordinated group gains control of more than 50% of a blockchain network's hashing power (in Proof of Work) or staking power (in Proof of Stake), enabling them to manipulate the network's transaction history. This majority control allows the attacker to double-spend coins, prevent new transactions from being confirmed, and halt the creation of new blocks. The attack exploits the core trust mechanism of decentralized consensus, where the longest valid chain is accepted as truth. While theoretically possible, executing a 51% attack on large, established networks like Bitcoin or Ethereum is prohibitively expensive and logistically complex.
Get In Touch
today.
Our experts will offer a free quote and a 30min call to discuss your project.