13 Jan 2025

Different types of attacks on blockchain

Different types of attacks on blockchain

Reports of new database hacks appear in the news on a regular basis. Blockchain is regarded as a more secure technology. But it can also be attacked. We’ve compiled a list of the most common types of blockchain attacks.

On this page

Blockchain is an innovative technology and information security tool, but as you know, no technology or software is completely secure. Blockchain is also not an exception. Attacks on distributed registers differ in hacking methods and are mostly aimed at exploiting “gaps” in the consensus mechanism for monopolistic control of the hashrate or individual structural elements of the infrastructure — nodes. This kind of control makes it possible to change the data that is submitted to the registry and temporarily create transactional chaos in order to steal coins.

51% Attack

It is the most common danger facing blockchains. The name of the attack was derived from the analogy of holding a controlling stake or number of votes in the world of large corporations. This attack affects Proof-of-Work blockchains that use cryptocurrencies such as Bitcoin, Litecoin, Monero, and others.

The attack entails one person or a group of individuals controlling a sizable portion of the hashrate, typically more than 50% (over the mining capacity used for coin emission). This gives attackers the ability to reorder transactions, delete them, or prevent them from being confirmed. Additionally, attackers try to stop other miners from mining new coins. Such actions are intended to cause an artificial network failure. For example, deleting transactions allows attackers to use cryptocurrency multiple times, a practice known as double-spending.

The blockchain is actually “captured” as a result of such an attack, and there is a chance that all participant funds will end up in the attackers' possession. The likelihood of an attack is currently very low in large networks like Bitcoin because of the high number of participants (nodes) and relatively expensive mining equipment. Small networks with a small number of validators, unfortunately, are not immune to this. 

Blockchains of coins such as Zencash (ZEN), Litecoin Cash (LCC), MonaCoin (MONA), Verge (XVG), Bitcoin Gold (BTG), and a number of Ethereum blockchains such as Krypton and Shift were affected by the 51% attacks.

Eclipse attack

This is a type of blockchain attack in which an attacker focuses his efforts on controlling a single node or an entire group by redirecting outgoing and incoming data to his own nodes, thus isolating the deceived user from the real network and actual data. The specifics of this type of attack have previously been described.

Sybil attack

This is a larger attack format than the previous one and is most commonly used in peer-to-peer systems with equal participants. This method was named after a well-known case of a woman suffering from dissociative personality disorder. Nodes experience similar effects as a result of Sybil's attack.

Attackers join forces and attempt to gain control of a sizable portion of network nodes in order to launch an attack. Attackers try to bring down the network by manipulating valid transactions and generating invalid (false) ones once they have taken control of enough nodes. The Sybil attack was first described by Microsoft expert John Dossier, who believes that the blockchain cannot distinguish between physical and “virtual” network nodes. Following that, attempts were made to develop and implement mechanisms for recognizing and identifying the equipment on which the nodes are deployed, but the results were not as expected.

The damage from such an attack can range from artificial manipulation of the node owner's rating to vote falsification. If successful, the attacker can disconnect a group of real nodes from the network, replacing them with virtual counterparts. Under certain conditions, this can facilitate a 51% attack in order to do double spending and gain control of all transactions via specialized software.

This type of attack is a priori impossible on the Bitcoin blockchain due to the algorithm's requirements for the creation of new blocks. Sybil's attack on the blockchain of the first cryptocurrency is economically unprofitable because, according to the consensus algorithm's rules, the capacity to create a block is equal to the computing power of the Proof-of-Work mechanism.

Finney attack

Hal Finney is known to have been the first person to receive a Bitcoin transfer. He is one of the most likely candidates for the title of Bitcoin's creator, hiding his identity behind the pseudonym Satoshi Nakamoto. The idea that a blockchain attack might occur was also first put forth by him. As a result, it was dubbed “Finney's attack” in his honor. 

This is another type of double spending attack that is based on an unconfirmed network transaction. Finney predicted that any miner should be able to generate a block containing a transaction from address A to address B, where both addresses belong to the same person. He will then make a transfer in the same currency by sending coins from address A to address C, which belongs to another user. And if the recipient of the transfer accepts the transaction without confirmation from the network, the attacker can free the block where his original transaction was included. As a result, such a transfer would be rendered invalid, allowing the attacker to double spend.

Race attack

This is yet another example of a threat of double spending. Inexperienced and hasty sellers risk selling a product or service as a result of a failed funds transfer by simulating a payment attempt. Some entrepreneurs accept micropayments for small amounts without waiting for confirmation.  A fraudster may attempt to imitate such a transfer by simultaneously sending a transaction to his own network address and the seller's address, exposing only the first transaction to the blockchain. During the check, the last transaction will be considered valid, while the first (slower) will be invalid.

It is not advised to automatically accept transactions at the node level without holding out for at least a few confirmations in order to avoid such an attack.

Vector76 attack

The attack, also referred to as the “single confirmation attack,” received its name from a Bitcointalk forum user going by the handle Vector76, who in 2011 shared a precise description of this double-spending technique. The synergy of “Race attack” and “Finney attack” is the foundation of this type of attack.

To counteract such a threat, drop incoming connections to a node and only send outgoing connections to authenticated nodes. To carry out the attack, the attacker must sacrifice one block that will not be exposed to the general network and will only go to the victim's node.

The following conditions must be met for the attack to succeed:

  • use the wallet to withdraw funds with the condition of one confirmation of the network;
  • get permission from the wallet provider for direct incoming connections to the node;
  • the victim node must have a static IP address.

Cryptographic Attacks

Nobody has resolved the “human factor” problem. The most high-profile case occurred when a fraudster discovered a vulnerability in the Ethereum blockchain's source code and stole coins worth approximately $50 million (nearly 30% of the total coin emission at the time).  The community divided into two groups as a result of this unfortunate event. Outraged by the theft, the first group, led by the well-known Ethereum co-founder, proposed performing a hard fork to return the coins to their rightful owners. However, opponents from another group held the view that the hacker was already the rightful owner of the coins because of the unwritten rule that “the code is the law.” As a result, both groups were able to reach an agreement and decide to create a soft fork.

In conclusion

There are other types of attacks, but we've covered the most well-known ones in this article. Node owners and blockchain designers should be aware of the aforementioned threats and take steps to reduce the risks associated with their implementation.

The content on The Coinomist is for informational purposes only and should not be interpreted as financial advice. While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, or reliability of any content. Neither we accept liability for any errors or omissions in the information provided or for any financial losses incurred as a result of relying on this information. Actions based on this content are at your own risk. Always do your own research and consult a professional. See our Terms, Privacy Policy, and Disclaimers for more details.

Articles by this author

Latest News

MORE
The Future of Crypto in 2025: Fidelity’s Predictions

The Future of Crypto in 2025: Fidelity’s Predictions

What’s next for the biggest cryptocurrencies in 2025? Fidelity Digital Assets analyst Chris Kuiper shares insights on how Bitcoin will navigate volatility, Ethereum will address scaling challenges, and stablecoins will adapt to evolving regulations.

13 Jan 2025
The Crypto Rollercoaster of 2024 — Wins and Woes

The Crypto Rollercoaster of 2024 — Wins and Woes

The crypto sector evolved at breakneck speed in 2024. With major wins and notable setbacks, it’s time to reflect on the year’s key developments and their implications for the future.

31 Dec 2024
OpenSea Token: Release Date and How to Qualify for the Airdrop

OpenSea Token: Release Date and How to Qualify for the Airdrop

The NFT marketplace OpenSea, a pioneer in the space for the past seven years, is expected to launch its native token in 2025. A significant portion of the tokens will likely be distributed through a retroactive airdrop—a common way to reward the community for their past activity and support.

30 Dec 2024
5 Most Exciting Token Launches to Watch in 2025

5 Most Exciting Token Launches to Watch in 2025

In 2024, we saw a number of hot airdrops and token launches, from AI-powered projects to the rise of memecoins. Now, as we head into 2025, the crypto space is set to expand even further with an increasing number of cryptocurrencies.

27 Dec 2024

Latest News Alt

MORE
Weekly Analysis of BTC, ETH, and the Stock Market (Jan 6, 2025)

Weekly Analysis of BTC, ETH, and the Stock Market (Jan 6, 2025)

An overview of BTC, ETH, XAUT, and S&P500 charts, along with the current cryptocurrency market dynamics.

06 Jan 2025
Weekly Analysis of BTC, ETH, and the Stock Market (Dec 30, 2024)

Weekly Analysis of BTC, ETH, and the Stock Market (Dec 30, 2024)

An overview of BTC, ETH, XAUT, and S&P500 charts, and the current cryptocurrency market dynamics.

30 Dec 2024
Weekly Analysis of BTC, ETH, and the Stock Market (Dec 23, 2024)

Weekly Analysis of BTC, ETH, and the Stock Market (Dec 23, 2024)

An overview of BTC, ETH, XAUT, and S&P500 charts, and the current cryptocurrency market dynamics.

23 Dec 2024

Might Be Interesting

MORE
Mining Farms Uncovered — How Crypto Is Mined at Scale

Mining Farms Uncovered — How Crypto Is Mined at Scale

As a cornerstone of the crypto industry, mining farms drive blockchain networks. But how do they work? Uncover the mechanics behind these cutting-edge hubs and their role in the crypto landscape.

07 Jan 2025
William Quigley, WAX/Tether: Stablecoins’ Role in Global Payments

William Quigley, WAX/Tether: Stablecoins’ Role in Global Payments

William Quigley, co-founder of WAX and Tether, firmly believes that stablecoins are more than a tool for traders—they’re the key to transforming the global economy. Already central to crypto trading and cross-border payments, their future potential is even more exciting.

04 Jan 2025
Why Blockchain Is Different from Traditional Databases

Why Blockchain Is Different from Traditional Databases

In the world of business and finance, information is everything. Traditional databases have been reliable tools for decades, but blockchain presents a groundbreaking alternative. What sets it apart, and could it lead to a paradigm shift?

03 Jan 2025
How Does Multisig Works and Protect Your Assets?

How Does Multisig Works and Protect Your Assets?

As threats to digital assets evolve, multisig technology provides a highly effective security layer. By requiring multiple signatures for transactions, it significantly reduces risks such as hacking and access loss.

02 Jan 2025
Crypto Price Gaps: Why Platforms Show Different Prices

Crypto Price Gaps: Why Platforms Show Different Prices

The crypto market has nuances you may not have noticed at first glance. For example, when you want to check the Bitcoin price, you probably Google it without thinking to compare the results. But when you monitor the market regularly and engage in trading, you notice the prices aren’t the same on all platforms.

24 Dec 2024
The Czech Republic and Its Crypto-Friendly Policies

The Czech Republic and Its Crypto-Friendly Policies

The Czech Republic is emerging as a crypto-friendly nation, recognizing cryptocurrencies as legitimate payment methods and encouraging their use in business. But its regulatory framework is still taking shape. Here’s how crypto is managed today.

23 Dec 2024

Opinions

8 Commandments for Crypto Exchange Users

8 Commandments for Crypto Exchange Users

While cryptocurrency exchanges offer many security features, they are still vulnerable to hacks, fraud, and other criminal activity. Remember, no online platform can guarantee 100% protection for your funds. Follow these eight key rules to reduce your risks. Rule #1: Don’t Believe in the Myth of Absolute Exchange Security Even the largest and most seemingly […]

12 Jan 2025
10 Key Investment Trends to Watch in 2025: Green Crypto, Regulations, and More

10 Key Investment Trends to Watch in 2025: Green Crypto, Regulations, and More

Donald Trump is back, Germany’s economy is in trouble, while U.S. economic indicators seem to have a robust momentum, and interest rates are sliding downhill. Sounds dramatic? It is. But 2025 isn’t all doom and gloom—it’s full of opportunities for investors who know where to look. Whether you’re a seasoned pro or someone still figuring […]

12 Jan 2025
MORE

Interviews

Dmytro Gordon and Volodymyr Nosov: A Sensational Interview

Dmytro Gordon and Volodymyr Nosov: A Sensational Interview

Volodymyr Nosov, CEO of Europe’s largest crypto exchange WhiteBIT, sat down with Dmytro Gordon, one of Ukraine’s most prominent journalists. The interview touched on Bitcoin, crypto, WhiteBIT, cars, keys to success, and business vision.

18 Dec 2024
WhiteBIT CEO: Standing Strong Against Russian Aggression

WhiteBIT CEO: Standing Strong Against Russian Aggression

In an interview with BTC-ECHO, Volodymyr Nosov, the founder and CEO of WhiteBIT, discussed the impact of Russian aggression on the crypto exchange’s business, how WhiteBIT stays a top competitor in the industry, and when he believes our financial system will be completely transformed.

04 Oct 2024
MORE