Free 30-min Web3 Consultation
Book Now
Smart Contract Security Audits
Learn More
Custom DeFi Protocol Development
Explore
Full-Stack Web3 dApp Development
View Services
Free 30-min Web3 Consultation
Book Now
Smart Contract Security Audits
Learn More
Custom DeFi Protocol Development
Explore
Full-Stack Web3 dApp Development
View Services
Free 30-min Web3 Consultation
Book Now
Smart Contract Security Audits
Learn More
Custom DeFi Protocol Development
Explore
Full-Stack Web3 dApp Development
View Services
Free 30-min Web3 Consultation
Book Now
Smart Contract Security Audits
Learn More
Custom DeFi Protocol Development
Explore
Full-Stack Web3 dApp Development
View Services
LABS
Glossary

Majority Attack

A majority attack, also known as a 51% attack, is a security breach where a single entity gains control of more than half of a blockchain network's consensus power, allowing them to manipulate transaction history.
Chainscore © 2026
definition
BLOCKCHAIN SECURITY

What is a Majority Attack?

A majority attack, also known as a 51% attack, is a critical security vulnerability in blockchain networks where a single entity gains control of the majority of the network's hashing power or stake, enabling them to manipulate the ledger.

A majority attack is a scenario where a single miner or a coordinated group of miners (a sybil) gains control of more than 50% of a blockchain network's total computational power (hash rate) in a Proof-of-Work (PoW) system, or more than 50% of the total staked tokens in a Proof-of-Stake (PoS) system. This majority control allows the attacker to double-spend coins, censor transactions by excluding them from new blocks, and prevent other miners from confirming blocks, effectively halting the network. The fundamental security assumption of most blockchains is that no single entity will amass such a controlling share, making the network trustless and decentralized.

The primary mechanism of a majority attack involves chain reorganization. In a PoW attack, the malicious miner secretly mines an alternative version of the blockchain (a private fork) that excludes certain transactions, such as a large payment they made. Because they control the majority of hash power, they can mine this private chain faster than the honest network. Once ready, they release this longer, alternative chain to the network. According to the blockchain's longest chain rule, nodes will accept this new chain as the valid one, thereby erasing the original transaction and allowing the attacker to spend the same coins again. This is the classic double-spend attack.

While often associated with Proof-of-Work, majority attacks are also a theoretical risk in Proof-of-Stake (PoS) networks, where they are sometimes called staking attacks or long-range attacks. Here, an attacker would need to acquire a majority of the staked cryptocurrency to control block validation. However, PoS systems often implement slashing mechanisms, where malicious validators have a portion of their staked funds destroyed, and additional safeguards like weak subjectivity to mitigate these risks. The economic cost of acquiring 51% of the staked supply is typically prohibitive for established networks.

The feasibility and cost of executing a majority attack vary significantly by network. Smaller blockchains with lower total hash power, such as Bitcoin Cash (BCH) or Ethereum Classic (ETC), have been targeted in the past. Attackers often rent hash power from cloud mining services to temporarily boost their capacity. The defense against such attacks includes increasing the network's overall decentralized hash power, implementing checkpoints, or using alternative consensus mechanisms like Delegated Proof-of-Stake (DPoS) or Byzantine Fault Tolerance (BFT) variants that have different security assumptions.

It is crucial to distinguish a majority attack from a Sybil attack, where an attacker creates many fake identities to gain influence, and a Finney attack, which is a specific, lower-probability double-spend scenario that does not require majority control. While a successful majority attack can severely damage trust and the token's value, it does not typically allow the attacker to steal funds from existing wallets (as they cannot forge signatures) or alter historical blocks beyond a certain depth due to the cumulative proof-of-work, a concept known as immutability.

key-features
BLOCKCHAIN SECURITY

Key Features of a Majority Attack

A majority attack, also known as a 51% attack, is a scenario where a single entity gains control of the majority of a blockchain network's hashrate or stake, enabling them to manipulate the consensus process. This section details its core mechanisms and implications.

01

Double-Spending

The primary and most direct consequence of a majority attack. The attacker can:

  • Spend the same cryptocurrency in two or more transactions.
  • Reverse a confirmed transaction by secretly mining a longer, alternative chain where the funds were not spent.
  • Reorganize the blockchain to make their fraudulent chain the canonical one, invalidating legitimate transactions on the original chain.
02

Blockchain Reorganization

The attacker uses their majority control to create a longer chain in secret, which they then broadcast to the network. This forces honest nodes to orphan blocks from the original chain, accepting the attacker's version of history. This reorganization can erase minutes or hours of transaction history, depending on the attacker's resources.

03

Censorship of Transactions

With control over block production, the attacker can exclude specific transactions from being included in new blocks. This allows them to:

  • Prevent confirmations for transactions from certain addresses.
  • Halt network operations for targeted users or services.
  • Disrupt decentralized applications (dApps) that rely on timely transaction processing.
04

Economic Disincentives

While technically possible, executing a majority attack is often economically irrational. The attacker must invest heavily in hardware (Proof of Work) or capital (Proof of Stake). A successful attack typically crashes the asset's value, destroying the profitability of the attack and the attacker's own holdings, making it a form of economic suicide.

05

Proof of Work vs. Proof of Stake

The attack vector differs by consensus mechanism:

  • Proof of Work (PoW): Requires controlling >50% of the total hashrate. Seen in attacks on smaller chains like Ethereum Classic and Bitcoin Gold.
  • Proof of Stake (PoS): Requires controlling >50% of the total staked cryptocurrency. This is often more expensive to acquire and can be mitigated by slashing penalties, where the attacker's staked funds are destroyed.
06

Prevention and Mitigation

Networks defend against majority attacks through several means:

  • Increasing decentralization to make acquiring a majority prohibitively expensive.
  • Implementing checkpointing, where older blocks are made immutable.
  • Using chain finality gadgets (e.g., Casper FFG in Ethereum) that make reorganization after finalization impossible.
  • Monitoring hashrate/stake distribution for signs of centralization.
how-it-works
BLOCKCHAIN SECURITY

How a Majority Attack Works

A majority attack, also known as a 51% attack, is a critical security vulnerability in blockchain networks where a single entity gains control over the majority of the network's hashing power or stake, enabling them to manipulate the ledger.

A majority attack occurs when a malicious actor or coalition gains control of more than 50% of a blockchain network's total computational power (in Proof of Work) or total staked assets (in Proof of Stake). This majority control allows the attacker to double-spend cryptocurrency, censor transactions by excluding them from new blocks, and halt block production for other participants. The attack fundamentally exploits the consensus mechanism's reliance on the assumption that the majority of participants are honest. While executing such an attack is prohibitively expensive on large networks like Bitcoin or Ethereum, it remains a credible threat to smaller chains with less distributed hash power.

The primary mechanism of a majority attack involves chain reorganization. The attacker secretly mines or validates a private, alternative version of the blockchain that excludes certain transactions (like a large payment they made). Once they have built a longer private chain, they broadcast it to the network. Because the attacker controls the majority, the network's consensus rules will accept this longer chain as the valid one, orphaning the blocks that contained the original transaction. This allows the attacker to reclaim the spent coins, effectively spending them twice. The attack can also be used to prevent transaction confirmation by consistently out-competing honest miners and excluding specific addresses from new blocks.

The feasibility and cost of a majority attack vary significantly between consensus models. In Proof of Work (PoW), the cost is tied to acquiring and operating enough mining hardware to surpass the network's total hash rate, making it a function of hardware cost and electricity. For Proof of Stake (PoS), the cost is the capital required to acquire a majority stake of the native cryptocurrency, which would likely devalue the asset itself. Networks defend against these attacks through decentralization, making it economically and logistically impractical to amass a majority, and implementing checkpointing or finality gadgets that make past blocks immutable after a certain number of confirmations.

attack-capabilities
MAJORITY ATTACK

What an Attacker Can and Cannot Do

A majority attack, also known as a 51% attack, occurs when a single entity gains control of the majority of a blockchain network's hashrate (Proof of Work) or stake (Proof of Stake), enabling them to manipulate the ledger. This section details the specific capabilities and limitations of an attacker in this position.

01

Double-Spend Transactions

The primary and most feasible action for an attacker. By controlling the majority of consensus power, they can:

  • Exclude or reverse recent transactions from the canonical chain.
  • Spend the same coins twice by creating a private, longer chain where the initial transaction never occurred, then broadcasting it to overwrite the public ledger.
  • This directly undermines the immutability and finality guarantees of the blockchain for a limited time window.
02

Censor Transactions

An attacker can prevent specific transactions from being confirmed.

  • They can refuse to include transactions from certain addresses in the blocks they mine or validate.
  • This can be used for targeted denial-of-service, to freeze assets, or to extract value (e.g., via MEV extraction).
  • However, they cannot alter or forge transactions they do not control the private keys for, nor can they prevent transactions from being broadcast to the network.
03

Cannot Steal Existing Funds

A critical limitation of a majority attack. The attacker cannot:

  • Create transactions from addresses they do not own, as this requires the private key.
  • Change the block reward or arbitrarily mint new coins (outside of the protocol's rules).
  • Alter the history of transactions buried under sufficient confirmations (e.g., blocks older than the reorg depth). Their power is generally limited to recent chain tips.
04

Cannot Alter Protocol Rules

The attacker's power is constrained by the existing consensus rules. They cannot:

  • Change fundamental protocol parameters like the block size, difficulty algorithm, or reward schedule for the entire network.
  • Force other honest nodes to accept invalid blocks or transactions; they can only present an alternative valid chain.
  • Permanently fork the network unless a significant portion of the economic majority (users, exchanges, developers) chooses to follow their chain.
05

Risk of Chain Death Spiral

A successful attack often destroys the value it seeks to capture. Consequences include:

  • Loss of trust from users and exchanges, leading to a plummeting token price.
  • Network forking as the community rejects the attacked chain.
  • The attacker's own stake or mining hardware drastically loses value.
  • This economic disincentive is a primary defense, making attacks financially irrational on large, established networks.
CONSENSUS COMPARISON

Majority Attack: Proof of Work vs. Proof of Stake

A comparison of how a majority attack (51% attack) is executed, prevented, and mitigated under the two dominant consensus mechanisms.

Attack Vector / MetricProof of Work (PoW)Proof of Stake (PoS)

Primary Attack Resource

Hashing Power (Hashrate)

Staked Capital (Native Tokens)

Attack Execution Method

Out-mine the honest chain by controlling >50% of network hashrate.

Control >33% or >51% of the total staked tokens to influence block finality.

Primary Economic Cost

Hardware acquisition & operational energy costs.

Opportunity cost of locked capital & risk of slashing.

Attack Reversibility

Double-spends are possible; chain history can be rewritten.

Finalized blocks are cryptographically irreversible; only recent, non-finalized blocks are vulnerable.

Primary Defense Mechanism

Economic: High cost of acquiring a hardware/energy majority.

Cryptoeconomic: Slashing penalties that destroy the attacker's staked funds.

Typical Recovery Path

Community coordination for a hard fork to reject the attacked chain.

Automated slashing and inactivity leaks to restore chain liveness.

Real-World Feasibility

Possible against smaller chains; extremely costly for large chains like Bitcoin.

Theoretically more expensive per dollar of secured value due to slashing penalties.

real-world-examples
HISTORICAL CASES

Real-World Examples

While rare, several blockchain networks have experienced majority attacks, demonstrating the practical risks and consequences of insufficient decentralization.

02

Bitcoin Gold (BTG) Double Spend

In May 2018, Bitcoin Gold, a fork of Bitcoin, was hit by a 51% attack resulting in a confirmed double spend. The attackers gained majority control of the network's hashpower, allowing them to reverse transactions and steal an estimated $18 million worth of BTG from several exchanges. This attack exploited the network's use of the Equihash algorithm, which was vulnerable to concentration by large mining pools.

03

The Verge (XVG) Time Warp Attack

In April 2018, attackers exploited a bug in Verge's code, not by controlling hashpower, but by manipulating the network's timestamp validation—a variant of a majority attack. By spoofing timestamps, they artificially reduced the block difficulty, allowing them to mine blocks far faster than the honest chain. This resulted in a deep chain reorganization and the theft of roughly 35 million XVG (worth about $1.75 million at the time).

05

Proof-of-Stake (PoS) Slashing Defense

Modern Proof-of-Stake (PoS) networks like Ethereum 2.0 are designed to make majority attacks economically prohibitive through slashing and inactivity leaks. If a validator attempts to finalize two conflicting blocks (a key part of an attack), a significant portion of their staked ETH is automatically burned. This creates a strong economic disincentive, making an attack catastrophically costly for the attacker.

06

Exchange Response & Chain Reorgs

Exchanges are primary targets for double-spend attacks. In response to historical incidents, major exchanges have implemented stricter policies:

  • Increasing confirmation times for deposits from vulnerable chains.
  • Halting deposits and withdrawals upon detecting unusual chain reorganization depth.
  • Using advanced monitoring to detect potential chain splits and orphaned blocks. These measures shift the economic risk back to the attacker, who must sustain the attack longer.
security-considerations
BLOCKCHAIN ATTACK VECTORS

Security Considerations & Mitigations

A majority attack, also known as a 51% attack, is a scenario where a single entity or coalition gains control of the majority of a blockchain network's hashrate (Proof of Work) or stake (Proof of Stake), enabling them to manipulate the ledger. This section details its mechanics, real-world examples, and the primary defenses.

01

Core Definition & Mechanism

A majority attack occurs when an attacker controls more than 50% of a blockchain's consensus power, allowing them to double-spend coins and censor transactions. In Proof of Work, this means controlling the majority of the computational hashrate. In Proof of Stake, it means controlling the majority of the staked cryptocurrency. The attacker can then:

  • Create a private, longer chain of blocks.
  • Release it to the network, causing a chain reorganization that invalidates legitimate transactions.
  • Reverse their own payments, effectively spending the same coins twice.
02

Real-World Examples & Impact

Majority attacks have successfully targeted smaller, less secure blockchains, demonstrating the practical risk.

  • Bitcoin Gold (2018, 2020): Suffered multiple 51% attacks, resulting in over $18 million in double-spends. The attacker rented hashpower from mining marketplaces.
  • Ethereum Classic (2019, 2020): Attacked at least three times, with one reorganization erasing 7,000 blocks.
  • Verge (2018): Exploited a flaw in its algorithm, not raw hashrate, to execute a similar majority-style attack. These events highlight the vulnerability of chains with low hashrate or staking participation.
03

Proof of Stake (PoS) Specifics

In Proof of Stake, a majority attack requires controlling >50% of the total staked tokens, which is economically prohibitive on major networks but theoretically simpler on smaller ones. Key dynamics include:

  • Slashing: Penalties can destroy the attacker's staked funds, making attacks costly.
  • Long-Range Attacks: A historical variant where an attacker acquires old private keys to rewrite history from an early block.
  • Delegate Centralization: In Delegated Proof of Stake (DPoS) systems, attacks can target a small set of block producers. Networks like Ethereum use Casper FFG and LMD-GHOST to penalize malicious validators and ensure finality.
04

Primary Mitigations & Defenses

Blockchain networks employ several strategies to deter and mitigate majority attacks.

  • Increased Network Decentralization: A larger, more geographically distributed set of miners or validators raises the attack cost.
  • Checkpointing: Periodically finalizing blocks to prevent deep reorganizations.
  • ChainLocks & InstantSend (Dash): Using a network of masternodes to lock transactions and blocks.
  • Economic Disincentives: Slashing in PoS and the enormous hardware/energy cost in PoW make attacks unprofitable.
  • Monitoring & Alerting: Services track hashrate distribution and stake concentration to provide early warnings.
05

Related Concepts: Nothing-at-Stake & Selfish Mining

Majority attacks are related to other consensus vulnerabilities.

  • Nothing-at-Stake Problem: In early PoS, validators could vote on multiple blockchain histories without cost, encouraging forks. Mitigated by slashing penalties.
  • Selfish Mining: A minority miner (e.g., >25% hashrate) withholds found blocks to gain a disproportionate reward advantage, which can lead to centralization and pave the way for a majority attack.
  • Sybil Attack: Creating many fake identities to influence peer-to-peer networks, a prerequisite for influencing consensus in some models.
06

Security Audits & Risk Assessment

For developers and projects, assessing majority attack risk is critical.

  • Hashrate Distribution: Use blockchain explorers to monitor mining pool concentrations.
  • Staking Distribution: Analyze the distribution of staked tokens among validators/wallets.
  • Attack Cost Calculators: Tools estimate the USD cost to rent sufficient hashrate for a 1-hour attack on various PoW chains.
  • Consensus Code Audits: Regular security reviews of the consensus client implementation to prevent protocol-level exploits that could lower the practical attack threshold.
MAJORITY ATTACK

Common Misconceptions

Clarifying widespread misunderstandings about the nature, cost, and likelihood of a 51% attack on proof-of-work blockchains.

A 51% attack (or majority attack) is a scenario where a single entity gains control of more than 50% of a proof-of-work blockchain's total hash rate, enabling them to manipulate the network's consensus. The attacker can perform double-spending by secretly mining an alternative chain where a transaction is reversed, then broadcasting this longer chain to overwrite the legitimate history. They can also censor transactions by excluding them from blocks they mine. This attack does not allow the theft of existing funds from private wallets or the alteration of historical blocks beyond a recent window, as changing a block requires redoing all subsequent proof-of-work.

MAJORITY ATTACK

Frequently Asked Questions

A majority attack, also known as a 51% attack, is a critical security concern in blockchain networks. This section answers common questions about how these attacks work, their real-world impact, and the economic and technical factors that deter them.

A majority attack, also called a 51% attack, is a scenario where a single entity or a coordinated group gains control of more than 50% of a blockchain network's hash rate (in Proof of Work) or staked tokens (in Proof of Stake), enabling them to manipulate the ledger. This control allows the attacker to perform malicious actions such as double-spending coins, censoring transactions, and preventing other miners or validators from adding new blocks. The attack fundamentally exploits the consensus mechanism's reliance on the honest majority assumption, where network security is proportional to the cost of acquiring a controlling stake in its resources.

ENQUIRY

Get In Touch
today.

Our experts will offer a free quote and a 30min call to discuss your project.

NDA Protected
24h Response
Directly to Engineering Team
10+
Protocols Shipped
$20M+
TVL Overall
NDA Protected direct pipeline
Majority Attack: Definition & Blockchain Security | ChainScore Glossary