51% Attack

51% Attack: When Consensus Gets Hijacked

A 51% attack occurs when a single entity controls the majority of a network’s mining power or stake, allowing them to manipulate transactions and double-spend coins.

A 51% attack is when an individual or group controls more than half of a blockchain network’s mining hash rate or staking power, giving them the ability to reverse transactions and manipulate the blockchain. It’s the digital equivalent of hijacking the entire banking system.

How 51% Attacks Work

Majority control allows attackers to mine or validate blocks faster than the honest network, eventually creating a longer chain that becomes the “true” blockchain according to consensus rules.

Double spending becomes possible when attackers reverse their own transactions after receiving goods or services, effectively spending the same coins twice.

Network disruption can halt transaction processing as attackers refuse to include certain transactions in blocks or reorganize the blockchain to exclude them.

Infographic showing a 51% attack with an honest network and an attacker’s chain that eventually overtakes the main chain

Real-World Examples

  • Bitcoin Gold suffered multiple 51% attacks resulting in millions in double-spent coins
  • Ethereum Classic experienced several attacks after major miners moved to Ethereum mainnet
  • Smaller altcoins are frequent targets due to lower hash rates and cheaper attack costs

Why Beginners Should Care

Network size matters for security. Bitcoin’s massive hash rate makes 51% attacks prohibitively expensive, while smaller networks remain vulnerable to well-funded attackers.

Exchange risks increase during 51% attacks as attackers often target high-value transactions on exchanges through double-spending schemes.

Recovery challenges exist after successful attacks. Networks must decide whether to reverse attacker transactions, which can undermine immutability principles.

Related Terms: Hash Rate, Mining, Consensus Mechanism, Double Spending

Back to Crypto Glossary

Similar Posts

  • Tokenization

    Tokenization: Converting Assets into Digital Tokens Tokenization transforms real-world assets into blockchain-based tokens that can be traded, divided, and managed digitally. It’s like turning everything into tradeable game pieces. Tokenization is the process of converting ownership rights to assets into digital tokens on a blockchain. This enables fractional ownership, easier trading, and programmable functionality for…

  • Stealth Address

    Stealth Address: Private Payment DestinationsStealth addresses create unique, one-time addresses for each transaction to enhance privacy by breaking the link between payments and recipient identities. They're like using a different PO box for every package delivery so no one can track all your mail to the same location.Stealth addresses are unique, one-time payment destinations generated…

  • Verification

    Verification: Confirming Accuracy and AuthenticityVerification is the process of confirming that information, transactions, or claims are accurate and authentic without requiring trust in the information source. It's like being able to personally test that a diamond is real using scientific instruments instead of just believing the jeweler's word.Verification refers to the mathematical and cryptographic processes…

  • Hardware Wallet

    Hardware Wallet: Your Crypto’s Personal Vault If you’re serious about crypto, you need a hardware wallet. It’s the difference between keeping cash in your wallet versus storing it in a bank vault. A hardware wallet is a physical device that stores your cryptocurrency private keys offline, away from internet hackers. Think of it as a…

  • Crypto Vesting Schedule

    Crypto Vesting Schedule: Gradual Token Release Vesting schedules control when team members, investors, or community members can access their allocated tokens. It’s like having a time-locked savings account that prevents dumping. A crypto vesting schedule defines when and how allocated tokens become available for use, typically spreading releases over months or years to prevent market…

  • Node

    Node: The Network’s Backbone Nodes are individual computers that maintain copies of the blockchain and enforce network rules. They’re the distributed infrastructure that makes cryptocurrency possible. A node is a computer that participates in a blockchain network by maintaining a copy of the distributed ledger and relaying transactions. Nodes validate transactions, store blockchain history, and…