51% Attack

51% Attack: When Consensus Gets Hijacked

A 51% attack occurs when a single entity controls the majority of a network’s mining power or stake, allowing them to manipulate transactions and double-spend coins.

A 51% attack is when an individual or group controls more than half of a blockchain network’s mining hash rate or staking power, giving them the ability to reverse transactions and manipulate the blockchain. It’s the digital equivalent of hijacking the entire banking system.

How 51% Attacks Work

Majority control allows attackers to mine or validate blocks faster than the honest network, eventually creating a longer chain that becomes the “true” blockchain according to consensus rules.

Double spending becomes possible when attackers reverse their own transactions after receiving goods or services, effectively spending the same coins twice.

Network disruption can halt transaction processing as attackers refuse to include certain transactions in blocks or reorganize the blockchain to exclude them.

Infographic showing a 51% attack with an honest network and an attacker’s chain that eventually overtakes the main chain

Real-World Examples

  • Bitcoin Gold suffered multiple 51% attacks resulting in millions in double-spent coins
  • Ethereum Classic experienced several attacks after major miners moved to Ethereum mainnet
  • Smaller altcoins are frequent targets due to lower hash rates and cheaper attack costs

Why Beginners Should Care

Network size matters for security. Bitcoin’s massive hash rate makes 51% attacks prohibitively expensive, while smaller networks remain vulnerable to well-funded attackers.

Exchange risks increase during 51% attacks as attackers often target high-value transactions on exchanges through double-spending schemes.

Recovery challenges exist after successful attacks. Networks must decide whether to reverse attacker transactions, which can undermine immutability principles.

Related Terms: Hash Rate, Mining, Consensus Mechanism, Double Spending

Back to Crypto Glossary

Similar Posts

  • Anti-Sybil Mechanism

    Anti-Sybil Mechanism: Preventing Fake Identity Attacks Anti-Sybil mechanisms prevent individuals from creating multiple fake identities to gain unfair advantages in voting, airdrops, or governance systems. They’re like requiring photo ID to prevent ballot stuffing. Anti-Sybil mechanisms are systems designed to prevent or detect when single entities create multiple fake identities to manipulate voting, governance, or…

  • Over-Collateralization

    Over-Collateralization: Excess Security DepositsOver-collateralization requires borrowers to deposit assets worth more than their loan amount as security against default. It's like putting down a $15,000 deposit to borrow $10,000, ensuring the lender is protected even if asset values decline.Over-collateralization refers to requiring collateral deposits that exceed the value of loans or borrowed assets, providing additional…

  • Democratic Governance

    Democratic Governance: Community-Controlled Decision MakingDemocratic governance enables community members to participate in project decisions through voting and proposal systems. It's like having a democracy where token holders are the citizens.Democratic governance refers to decision-making systems where community members have voting rights and influence over project direction, protocol changes, and resource allocation. Token holdings typically determine voting…

  • Lightning Network

    Lightning Network: Bitcoin Payment ScalingLightning Network enables instant, low-cost Bitcoin payments through off-chain payment channels. It's like having express lanes on a highway that bypass traffic congestion while still connecting to the same destination.Lightning Network is a Layer 2 scaling solution that enables fast, cheap Bitcoin transactions through a network of payment channels that settle…

  • Centralization Risk

    Centralization Risk: Single Point of Failure DangersCentralization risk refers to vulnerabilities created when critical functions are controlled by single entities rather than distributed among many participants. It's like having all eggs in one basket that could break everything at once.Centralization risk encompasses the potential negative impacts when blockchain networks, applications, or services become overly dependent…

  • MEV Protection

    MEV Protection: Defending Against Value ExtractionMEV protection shields users from having value extracted from their transactions by sophisticated bots and arbitrageurs. It's like having bodyguards that protect you from pickpockets in a crowded market.MEV protection refers to techniques and services that prevent or minimize Maximal Extractable Value extraction from user transactions. These solutions help users get…