51% Attack

51% Attack: When Consensus Gets Hijacked

A 51% attack occurs when a single entity controls the majority of a network’s mining power or stake, allowing them to manipulate transactions and double-spend coins.

A 51% attack is when an individual or group controls more than half of a blockchain network’s mining hash rate or staking power, giving them the ability to reverse transactions and manipulate the blockchain. It’s the digital equivalent of hijacking the entire banking system.

How 51% Attacks Work

Majority control allows attackers to mine or validate blocks faster than the honest network, eventually creating a longer chain that becomes the “true” blockchain according to consensus rules.

Double spending becomes possible when attackers reverse their own transactions after receiving goods or services, effectively spending the same coins twice.

Network disruption can halt transaction processing as attackers refuse to include certain transactions in blocks or reorganize the blockchain to exclude them.

Infographic showing a 51% attack with an honest network and an attacker’s chain that eventually overtakes the main chain

Real-World Examples

  • Bitcoin Gold suffered multiple 51% attacks resulting in millions in double-spent coins
  • Ethereum Classic experienced several attacks after major miners moved to Ethereum mainnet
  • Smaller altcoins are frequent targets due to lower hash rates and cheaper attack costs

Why Beginners Should Care

Network size matters for security. Bitcoin’s massive hash rate makes 51% attacks prohibitively expensive, while smaller networks remain vulnerable to well-funded attackers.

Exchange risks increase during 51% attacks as attackers often target high-value transactions on exchanges through double-spending schemes.

Recovery challenges exist after successful attacks. Networks must decide whether to reverse attacker transactions, which can undermine immutability principles.

Related Terms: Hash Rate, Mining, Consensus Mechanism, Double Spending

Back to Crypto Glossary

Similar Posts

  • Sequencer

    Sequencer: Transaction Order ControllerA sequencer determines the order in which transactions are processed in Layer 2 networks and some blockchain systems. It's like the traffic controller that decides which cars go through the intersection first.A sequencer is a component in Layer 2 scaling solutions that collects, orders, and batches transactions before submitting them to the…

  • Gas Refund Token

    Gas Refund Token: Optimizing Transaction Costs Gas refund tokens exploit Ethereum’s gas refund mechanism to reduce transaction costs by clearing unused storage. They’re like getting paid to clean up the blockchain. A gas refund token uses Ethereum’s gas refund mechanism to partially offset transaction costs by clearing unused contract storage during token transfers. The protocol…

  • Appchain

    Appchain: Application-Specific Blockchains Appchains are blockchains designed for single applications or use cases rather than general-purpose smart contracts. They’re like having a dedicated highway for one type of vehicle instead of mixed traffic. An appchain is a blockchain optimized for a specific application or use case rather than supporting general-purpose smart contracts. This specialization enables…

  • Security

    Security: Protecting Digital Assets and InformationSecurity in cryptocurrency encompasses all measures taken to protect digital assets, private keys, and personal information from theft or compromise. It's the foundation that makes cryptocurrency ownership safe and reliable.Security refers to the comprehensive protection of cryptocurrency assets, private keys, wallet access, and personal information through technical measures and careful…

  • Autonomous World (AW)

    Autonomous World (AW): Persistent Virtual Realities Autonomous worlds are persistent virtual environments that continue existing and evolving even when no players are actively participating. They’re like having a Minecraft world that keeps running and changing forever. An Autonomous World (AW) is a virtual environment that operates independently through blockchain infrastructure, maintaining state and enabling interactions…

  • Security Token

    Security Token: Regulated Digital AssetsSecurity tokens are cryptocurrency tokens that represent ownership in real-world assets and are subject to securities regulations. They're like digital stock certificates that comply with financial laws.Security tokens are cryptocurrency tokens that represent ownership stakes in real-world assets and are subject to securities regulations and compliance requirements. These bridge traditional finance with…