Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
LABS
Glossary

Reorg Attack

A Reorg Attack is a type of consensus-level Maximal Extractable Value (MEV) attack where a validator forces a blockchain reorganization to replace one or more previously confirmed blocks.
Chainscore © 2026
definition
BLOCKCHAIN SECURITY

What is a Reorg Attack?

A reorg attack, or blockchain reorganization attack, is a security threat where a malicious actor attempts to rewrite a blockchain's history by secretly mining a longer, alternative chain.

A reorg attack (short for reorganization attack) is a deliberate attempt to reverse confirmed transactions on a blockchain by creating a longer, competing chain in secret and then broadcasting it to the network. This exploits the fundamental Nakamoto Consensus rule, where the network accepts the longest valid chain as the canonical truth. If an attacker controls enough mining or staking power (hashrate or stake), they can orphan blocks that were previously considered final, effectively erasing the transactions they contain. This is also known as a chain reorganization or blockchain fork attack.

The feasibility of a reorg attack is directly tied to a blockchain's security model. In Proof of Work (PoW) systems like Bitcoin, it is quantified by the 51% attack threshold, where an entity controlling over half the network's hashrate can theoretically execute a reorg. In Proof of Stake (PoS) systems, a similar threat is a long-range attack or stake grinding, though modern PoS chains implement slashing and checkpointing to penalize such behavior. The primary motivations are double-spending (spending the same cryptocurrency twice) or censoring specific transactions.

Successful reorgs have occurred on smaller, less-secure blockchains with lower total hashrate or stake. A notable example is the 2018 attack on Bitcoin Gold (BTG), where attackers performed repeated reorgs to double-spend millions of dollars worth of coins. These events highlight that while reorgs are extremely costly and difficult on major networks like Bitcoin or Ethereum, they remain a critical security consideration for newer or smaller chains. Network participants measure finality—the point at which a transaction is irreversible—to gauge reorg risk.

To mitigate reorg risk, blockchains and services implement several defenses. Confirmation requirements for high-value transactions increase the cost of an attack exponentially with each block depth. PoS networks use finality gadgets like Ethereum's Casper FFG to provide economic finality, where reversing blocks would lead to the slashing of the attacker's staked assets. Exchanges and custodial services employ deep confirmation policies and monitor for chain splits. The fundamental trade-off is between liveness (the chain's ability to produce new blocks) and safety (the guarantee against transaction reversals).

For developers and analysts, understanding reorgs is essential for designing secure applications. Light clients and oracles must be aware of chain reorganizations to avoid providing data based on orphaned blocks. Smart contracts should not rely on instantaneous finality, and bridges between blockchains must have robust mechanisms to handle reorgs on either chain. The study of reorg attacks intersects with broader blockchain research into consensus resilience, network propagation, and cryptoeconomic security.

how-it-works
BLOCKCHAIN SECURITY

How a Reorg Attack Works

A reorg attack is a blockchain security threat where an attacker secretly mines an alternative, longer chain to replace the canonical history, enabling double-spending and transaction censorship.

A reorg attack (short for reorganization attack) is a deliberate attempt to rewrite the recent history of a blockchain. It occurs when a malicious miner or mining pool, controlling a significant portion of the network's hashrate, secretly mines blocks that form an alternative chain. This secret chain does not include certain transactions from the public chain, such as a large payment the attacker wants to reverse. Once the secret chain becomes longer than the current canonical chain, the network's consensus rules (like Nakamoto Consensus) will cause honest nodes to adopt it, orphaning the previously accepted blocks and their transactions.

The mechanics rely on the inherent probabilistic nature of proof-of-work. The attacker must consistently outpace the honest network's hashpower to extend their secret chain faster. This is often modeled as a race condition, famously analyzed in the Satoshi Nakamoto white paper as the "double-spend attack." The probability of success increases dramatically if the attacker controls more than 50% of the network's hashrate, a scenario known as a 51% attack. However, even with less hashpower, there is a non-zero chance of successfully reorganizing a small number of recent blocks, making block confirmations a critical security practice for high-value transactions.

The primary objectives of a reorg attack are double-spending and transaction censorship. In a double-spend, the attacker broadcasts a transaction (e.g., to an exchange to receive cryptocurrency), waits for it to be confirmed on the public chain, and then releases a longer chain where that transaction never occurred, allowing them to spend the same funds again. Censorship involves preventing specific transactions from ever being included in the canonical chain. The financial cost of executing such an attack is substantial, as it requires immense computational resources that could otherwise be used for honest, rewarded mining, creating a significant economic disincentive.

key-features
REORG ATTACK

Key Features & Characteristics

A reorg attack is a blockchain security event where a malicious miner or validator creates an alternative, longer chain to replace the canonical chain, potentially reversing transactions. This section details its mechanisms, impacts, and mitigations.

01

Core Mechanism: Chain Reorganization

A reorg attack occurs when an attacker with significant hashing power (in Proof-of-Work) or stake (in Proof-of-Stake) secretly mines or validates blocks to create a competing chain. Once this private chain is longer (or has higher weight) than the current public chain, the attacker broadcasts it. The network's consensus rules then adopt this new chain as canonical, orphaning the blocks from the original chain and reversing the transactions they contained.

02

Primary Goal: Double-Spending

The most common objective of a reorg attack is double-spending. The attacker:

  • Makes a legitimate transaction on the public chain (e.g., sends crypto to an exchange, converts it to fiat, and withdraws).
  • Creates a private chain where that transaction is excluded.
  • Successfully reorgs the chain, erasing the original transaction, while keeping the withdrawn fiat. This allows the attacker to effectively spend the same coins twice.
03

Key Vulnerability: The 51% Attack

A successful reorg attack is often synonymous with a 51% attack (or majority attack). The attacker must control over 50% of the network's hashing power (PoW) or staking power (PoS) to consistently outpace the honest network and build the longest chain. The depth of the reorg (how many blocks are reversed) is directly proportional to the attacker's hashing/stake advantage and the speed at which they can produce blocks.

04

Impact on Finality & Security

Reorgs undermine probabilistic finality. In chains like Bitcoin, transactions are only considered secure after a sufficient number of confirmations (block depth). A reorg attack demonstrates that older blocks can still be reversed, requiring services like exchanges to wait for more confirmations for high-value transactions. This attacks the core security assumption of Nakamoto Consensus.

05

Mitigation: Checkpointing & Finality Gadgets

Blockchains employ defenses to limit reorg depth and establish finality:

  • Checkpointing: Periodically finalizing a block (e.g., every 200 blocks in Geth) to make earlier blocks immutable.
  • Finality Gadgets: Protocols like Ethereum's Casper FFG (Friendly Finality Gadget) add a layer of economic finality where validators explicitly vote to finalize epochs, making reorgs past a finalized checkpoint prohibitively expensive and detectable.
  • Longest Chain Rule Modifications: Some protocols penalize chain reorganizations beyond a certain depth.
06

Related Concept: Time-Bandit Attack

A Time-Bandit attack is a sophisticated variant where an attacker with significant historical hashing power attempts to reorg the chain from a point far in the past. This is not to double-spend recent transactions, but to alter the entire history of the chain, potentially to claim block rewards or transactions from the past. It highlights the importance of economic finality over pure longest-chain rules.

visual-explainer
BLOCKCHAIN SECURITY

Visualizing a Reorg Attack

A reorg attack is a blockchain security event where a malicious actor secretly builds a longer, alternative chain to replace the canonical one, invalidating recent transactions.

A reorg attack, short for reorganization attack, occurs when a miner or mining pool with significant hashing power (often called a selfish miner) discovers a new block but withholds it from the network. Instead of broadcasting it immediately, they continue mining in secret on top of this hidden block, creating a longer, private chain. During this time, the honest network continues building on the public chain, unaware of the competing fork. The attacker's goal is to eventually release their longer chain, causing the network nodes to adopt it as the new canonical chain according to the longest chain rule (or in Proof-of-Stake, the heaviest chain rule).

The primary consequence of a successful reorg is the orphaning of blocks from the original public chain. All transactions contained within those orphaned blocks are effectively reversed, as the state of the ledger reverts to the point of the fork. This allows the attacker to execute double-spending attacks, where they spend cryptocurrency in a transaction on the public chain (e.g., to purchase goods), then ensure that transaction is invalidated when their private chain takes over, allowing them to keep their original funds. The depth of the reorg—how many blocks are replaced—directly correlates with the attack's cost and the value at risk.

Visualizing the process clarifies the attack vector. Imagine the public chain with blocks 1, 2, 3, and 4. At block 3, the attacker finds block 3' but keeps it secret. The honest network mines block 4 on top of block 3. Meanwhile, the attacker mines blocks 4' and 5' on their private chain (3' -> 4' -> 5'). When the attacker broadcasts their three-block chain (3', 4', 5'), it is longer than the public chain (3, 4). Network consensus rules force a switch, orphaning blocks 3 and 4. Transactions confirmed in those blocks, once thought final, are now unconfirmed.

The feasibility of a reorg attack is a direct function of a blockchain's consensus mechanism and security assumptions. In Proof-of-Work, it requires controlling a majority of hashing power (a 51% attack), making it expensive but not impossible, especially on smaller networks. In Proof-of-Stake systems, it would require controlling a majority of staked assets. To mitigate reorg risks, exchanges and high-value services implement confirmation delays, waiting for a sufficient number of subsequent blocks (block confirmations) before considering a transaction settled, as deeper reorgs become exponentially less probable.

security-considerations
BLOCKCHAIN ATTACK VECTORS

Security Considerations & Risks

A reorganization attack (reorg) is a security risk where a blockchain's canonical history is forcibly rewritten, potentially reversing transactions. This section details its mechanics, impacts, and defensive strategies.

01

Core Definition & Mechanism

A reorganization attack occurs when a malicious miner or validator with significant hashing power (or stake) secretly mines a longer, alternative chain that does not include certain transactions from the main chain. When this longer chain is broadcast, network consensus rules force nodes to adopt it, orphaning the previous blocks and reversing the transactions they contained.

  • Key Mechanism: The attacker must produce blocks faster than the honest network, a 51% attack in Proof-of-Work or a comparable stake majority in Proof-of-Stake.
  • Goal: To double-spend cryptocurrency or censor specific transactions.
02

Primary Risk: Double-Spending

The most direct financial impact of a successful reorg is double-spending. An attacker can:

  1. Deposit funds into an exchange or purchase goods in a transaction on the main chain.
  2. Secretly build a parallel chain where that transaction does not exist.
  3. Release the longer chain, causing the original deposit/transaction to be invalidated.
  4. Spend the same funds again, as they were never truly transferred.

This undermines the fundamental immutability and finality guarantees of the blockchain for affected parties.

03

Depth & Finality

The security against reorgs increases with block depth (confirmations). A transaction 1 block deep is highly vulnerable, while one 100 blocks deep is considered extremely secure on robust networks like Bitcoin.

  • Probabilistic Finality: In Proof-of-Work, finality is not absolute but becomes exponentially more certain with each new block.
  • Absolute Finality: Modern Proof-of-Stake chains (e.g., Ethereum post-merge) use checkpointing and finality gadgets to provide cryptographic finality after a certain number of blocks, making reorgs beyond that point practically impossible.
04

Economic & Network Impact

Beyond double-spending, reorgs can cause significant disruption:

  • Network Instability: Frequent reorgs create uncertainty, degrading user and developer trust.
  • Miner/Validator Revenue Loss: Honest miners lose block rewards and transaction fees from orphaned blocks.
  • Smart Contract State Corruption: Applications relying on recent block hashes (e.g., for randomness via blockhash) can malfunction if history changes.
  • Exchange & Bridge Vulnerabilities: Services with short confirmation policies are primary targets for double-spend attacks.
05

Mitigation Strategies

Protocols and services defend against reorgs through several methods:

  • Increasing Confirmations: Exchanges and merchants require more block confirmations for high-value transactions.
  • Checkpointing: Embedding authoritative block hashes at intervals to prevent rewriting past a certain point.
  • Finality Mechanisms: Using Casper FFG (Ethereum) or Tendermint finality for instant, irreversible settlement.
  • Monitoring & Alerting: Services monitor chain health and hash rate/stake distribution for signs of an impending attack.
06

Related Concepts

Understanding reorgs requires knowledge of adjacent security topics:

  • 51% Attack: The possession of majority hashing power that enables a reorg attack on Proof-of-Work chains.
  • Nothing at Stake: A theoretical problem in early Proof-of-Stake where validators could vote on multiple chains without cost, encouraging reorgs.
  • Long-Range Attack: A reorg attempt that rewrites history from far back in the chain's past, often mitigated by checkpointing or weak subjectivity.
  • Chain Finality: The property that a block/transaction cannot be reversed, a key security goal.
CONSENSUS ATTACK MATRIX

Reorg Attack vs. Related Consensus Attacks

A comparison of reorg attacks with other common consensus-level attacks, highlighting their primary mechanisms, objectives, and mitigations.

FeatureReorg Attack51% AttackNothing-at-Stake AttackLong-Range Attack

Primary Mechanism

Mining/validating a competing chain in secret

Controlling majority of network hash/stake

Validators voting on multiple conflicting blocks

Rewriting history from an early point in the chain

Primary Goal

Double-spend or censor recent blocks

Double-spend or halt the network

Prevent consensus finality, cause chain instability

Alter distant transaction history

Chain Depth Affected

Recent blocks (e.g., 1-100)

Recent blocks (depth depends on hashpower lead)

Latest block(s) during consensus

Ancient blocks (weeks/months old)

Consensus Model Target

Proof of Work, Proof of Stake

Primarily Proof of Work

Primarily Proof of Stake (early designs)

Primarily Proof of Stake

Key Mitigation

Increased confirmation depth, checkpointing

Higher network hash rate, monitoring

Slashing penalties, finalized checkpoints

Checkpointing, subjective client configurations

Attack Cost

High (requires significant hash/stake)

Extremely High (requires >50% hashpower)

Low (in pure PoS without slashing)

Low (cost to create alternative history)

Time to Execute

Minutes to hours

Hours to days

Seconds (per block)

Theoretical, requires old key compromise

ecosystem-usage-context
REORG ATTACK

Ecosystem Context & Mitigations

A reorg attack is a blockchain security event where a malicious miner or validator creates a longer, alternative chain to replace the canonical chain, potentially reversing transactions. This section details its mechanics, risks, and the ecosystem's defenses.

01

Core Mechanism: Chain Reorganization

A reorg attack exploits the Nakamoto Consensus rule that the longest valid chain is accepted as truth. An attacker with significant hashing power (in Proof-of-Work) or stake (in Proof-of-Stake) secretly mines or validates blocks, creating a competing chain. When this private chain surpasses the public chain in length, the network nodes will reorganize to adopt it, orphaning the previously accepted blocks and their transactions.

02

Primary Risk: Double-Spending

The most critical threat from a successful reorg is double-spending. An attacker can:

  • Broadcast a transaction (e.g., pay for goods) that is included in the public chain.
  • Simultaneously, exclude that transaction from their private chain.
  • After the merchant delivers the goods, the attacker releases their longer chain, causing the original payment transaction to be reversed, while the attacker's funds remain unspent on the new canonical chain.
03

Economic & Finality Guarantees

Blockchains implement economic and finality mechanisms to deter reorgs:

  • Proof-of-Work: The cost of acquiring >51% hashing power makes attacks economically irrational for most chains.
  • Proof-of-Stake Finality: Many PoS networks (e.g., Ethereum) have finalized checkpoints. After two-thirds of validators attest to a block, it is cryptographically finalized and cannot be reorged without slashing a massive amount of staked ETH.
  • Settlement Layers: Networks like Bitcoin rely on probabilistic finality, where the cost of reverting a block grows exponentially with each subsequent confirmation.
04

Real-World Example: Ethereum Classic (ETC)

Ethereum Classic has suffered multiple successful 51% attacks resulting in deep reorgs:

  • January 2019: A reorg reversed over 4,000 blocks, enabling double-spends worth ~$1.1 million.
  • August 2020: Another attack caused a reorg of over 7,000 blocks. These events highlight the vulnerability of chains with lower total hash power, where renting sufficient mining capacity to attack becomes feasible.
05

Mitigation: Checkpointing & Monitoring

Projects employ active defenses against reorgs:

  • Exchange Confirmations: Exchanges require high confirmation counts (e.g., 100+ for ETC) before crediting deposits.
  • Chain Monitoring Services: Tools like Chainalysis and internal systems watch for hash rate fluctuations and unusual chain dynamics to provide early warnings.
  • Modified Consensus: Some chains implement timestamps or checkpointing of known-good blocks from trusted authorities to prevent deep reorgs.
06

Related Concept: Time-Bandit Attacks

A Time-Bandit Attack is a sophisticated variant where an attacker uses future, more efficient mining hardware to rewrite distant history. By going back to a historical block and mining a new chain from there with superior hardware, they could potentially reverse long-settled transactions. This theoretical attack underscores the importance of cryptographic security assumptions and the immutability provided by sufficient cumulative proof-of-work.

CLARIFYING THE RISKS

Common Misconceptions About Reorg Attacks

Reorg attacks are often misunderstood, leading to incorrect assessments of blockchain security. This section debunks prevalent myths by explaining the technical realities of chain reorganizations, their feasibility, and their true impact on network participants.

A reorg attack is a deliberate attempt to replace a portion of the canonical blockchain with an alternative chain, invalidating previously confirmed transactions. It works when a malicious miner or validator secretly mines blocks in parallel to the public chain, then releases a longer, heavier, or higher-scoring chain that the network's consensus rules accept as the new truth. This process, a chain reorganization, can be used to double-spend cryptocurrency or censor transactions. The attack's success depends on the attacker controlling a significant portion of the network's total hashing power (in Proof of Work) or stake (in Proof of Stake) to outpace the honest chain.

REORG ATTACK

Frequently Asked Questions (FAQ)

A blockchain reorganization, or reorg, is a fundamental security event where the canonical chain is altered. These questions address the mechanics, risks, and implications of reorg attacks.

A reorg attack (short for reorganization attack) is a scenario where a blockchain's network discards a portion of its previously confirmed blocks and replaces them with a new, competing chain, effectively rewriting transaction history. This occurs when an alternative chain, typically mined by an attacker or a competing mining pool, becomes longer or has a higher accumulated proof-of-work (or proof-of-stake weight) than the current canonical chain, causing nodes to switch to this new chain as the valid one. The primary risk is double-spending, where transactions included in the orphaned blocks are reversed, allowing the attacker to spend the same coins again.

ENQUIRY

Get In Touch
today.

Our experts will offer a free quote and a 30min call to discuss your project.

NDA Protected
24h Response
Directly to Engineering Team
10+
Protocols Shipped
$20M+
TVL Overall
NDA Protected Directly to Engineering Team
Reorg Attack: Blockchain Consensus MEV Attack Vector | ChainScore Glossary