24 May 2025

Sybil Attack: Dissociative Identity Disorder in Blockchain

According to Chainalysis’ statistics, over $3 billion was stolen in hacker attacks in 2022.

On this page

The title is taken from a book by Flora Schreiber about a young woman, Sybil Dorsett, who suffered from a dissociative identity disorder. The term was coined by computer scientist Brian Zill.

How does a Sybil attack work?

A Sybil attack is an attack on a decentralized network where a hacker runs a computer node and creates multiple identities based on it. Then they distribute malicious data to honest nodes to gain control over the blockchain. Most often, manipulations come down to the theft of funds.

Just as one person can create multiple social media accounts, in the blockchain, a user can own multiple IDs that belong to different nodes. Outwardly, it is impossible to determine that there is one user behind them; they look unique.

This feature is needed to share a large number of resources, create block copies, or check the data integrity. The negative side is the ability to carry out Sybil attacks.

Although achieving complete control over all nodes is impossible, this is not necessary for an attacker. It is enough for him to gain a foothold in the network and transmit incorrect information from allegedly different nodes to loyal nodes so that they take it as valid and transmit it further. Over half of the network participants who confirmed hostile transactions would be enough to launch an attack.

Which blockchains are susceptible to the Sybil attack?

The Sybil attack will primarily target those blockchains that have few node requirements. If launching a node does not require additional funds, effort, skills, and considerable computing power, it will be easy for an attacker to take over the system.

Peer-to-peer networks are particularly susceptible to Sybil attacks because they do not require their nodes to prove that they are interested in acting honestly regarding the blockchain ecosystem. If the registry trusts the nodes for no reason, it can be easily manipulated for malicious purposes.

How to prevent Sybil Attacks?

The first barrier to this type of hack is consensus algorithms.

A Sybil attack is hard to carry out on a blockchain backed by a Proof-of-Work consensus. It assumes that the participant must prove their competence by performing complex equations requiring a powerful computer to solve. Only in this case can it affect the blockchain. Therefore, it is almost impossible for a hacker to take control of more than half of these blockchain-type nodes.

Other algorithms also minimize the risk of hacking. For example, Proof-of-Authority. It is a reputation-based consensus algorithm – each network member has their own level of authority and trust. Suppose the user has long supported the functioning of the blockchain and has proven authority. In that case, more actions are available to him within the blockchain structure. In addition, in such blockchains, transactions can only be verified by trusted users.

Proof-of-Stake also protects against a Sybil attack. Participants need to lock up (stake) their coins in the blockchain network that reach a consensus on proof of stake. Therefore, the hacker will have to transfer a considerable amount of funds to the blockchain every time they create a new ID, which can burn out if it is discovered. In general, when the cost of preparing and implementing an attack can exceed the potential profit, the risk of its occurrence is reduced.

Finally, blockchains may require users to verify their identity before running a node. This may include providing a credit card number or IP address or enabling two-factor authentication. In other networks, new members may not be required to do all of the above but will be asked to pass a test to confirm that they control only a few nodes.

While blockchains make payments easier through decentralization, they remain vulnerable to hacking due to their peer-to-peer structure. However, as more cases of theft from the blockchain appear, the number of security measures increases. Typically, a Sybil attack is a problem for smaller networks and newcomers to the market. Large blockchains hardly suffer from these hacks, as they have many nodes and validators.

The content on The Coinomist is for informational purposes only and should not be interpreted as financial advice. While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, or reliability of any content. Neither we accept liability for any errors or omissions in the information provided or for any financial losses incurred as a result of relying on this information. Actions based on this content are at your own risk. Always do your own research and consult a professional. See our Terms, Privacy Policy, and Disclaimers for more details.

Articles by this author
Major U.S. Banks, Including JPMorgan, Discuss Joint Stablecoin Launch — WSJ

Major U.S. Banks, Including JPMorgan, Discuss Joint Stablecoin Launch — WSJ

JPMorgan, Bank of America, Citigroup, and Wells Fargo are in early discussions to develop a joint stablecoin, working through The Clearing House and Zelle amid the advancement of the GENIUS Act.

Dmytro Psevdonimenko
Jupiter Launches Jupiter Lend on Solana in Partnership with Fluid

Jupiter Launches Jupiter Lend on Solana in Partnership with Fluid

Jupiter steps into the DeFi lending space with Fluid, offering up to 90% LTV and fees starting at just 0.1%.

Dmytro Psevdonimenko
Global Sting Busts Darknet Markets, Nets $200M in Seized Digital Assets

Global Sting Busts Darknet Markets, Nets $200M in Seized Digital Assets

On May 22, 2025, the U.S. DOJ announced global operation RapTor targeting darknet trafficking. The raid resulted in 270 arrests, $200 million seized, and over two tons of drugs confiscated.

Vlad Vovk
DOGE Goes Native on Solana — Powered by Wormhole

DOGE Goes Native on Solana — Powered by Wormhole

Thanks to Wormhole, DOGE will be integrated as a true native asset on Solana, skipping the usual wrapped token approach.

Anton Kryshtal
Lyn Alden vs the System: A New Philosophy of Money

Lyn Alden vs the System: A New Philosophy of Money

She avoids hype, doesn’t promise miracles, and refuses to trade on fear—yet Wall Street reads her. Who is Lyn Alden, and why are her ideas challenging the foundations of modern finance?

Iaroslava Kramarenko
Sergey Nazarov (Chainlink): The Man Who Wants to Chain the World Together

Sergey Nazarov (Chainlink): The Man Who Wants to Chain the World Together

How Sergey Nazarov built the rails for a global internet of contracts — and why 2025 might be the year it all locks in.

Elina Moskovchuk
Monica Long: How Ripple’s Quiet Force Is Redrawing Crypto’s Map

Monica Long: How Ripple’s Quiet Force Is Redrawing Crypto’s Map

Ripple’s Monica Long isn’t chasing headlines—she’s quietly building crypto’s future. From payments to tokenization, here’s how she’s reshaping finance from the inside.

Elina Moskovchuk
What Are Altcoins and How Do They Differ from Bitcoin?

What Are Altcoins and How Do They Differ from Bitcoin?

In the early days of crypto, Bitcoin stood alone as a digital asset. But as interest in blockchain deepened, so did the desire to improve, and diversify. This exploration gave rise to altcoins.

The Coinomist
Ripple On-Demand Liquidity: Solutions to Fixing DeFi Slippage

Ripple On-Demand Liquidity: Solutions to Fixing DeFi Slippage

Ripple’s On-Demand Liquidity (ODL) is redefining cross-border transactions. Instead of slow, intermediary-heavy transfers, ODL enables near-instant payments powered by the XRP token.

Vlad Vovk
Resistance levels: logic, methods, techniques

Resistance levels: logic, methods, techniques

Resistance levels are places where price struggles to move higher, often stalling or reversing after several attempts. Let’s learn how to find, draw and interact with them when trading.

The Coinomist
What Is Bitcoin Knots, a Fork by Luke Dashjr?

What Is Bitcoin Knots, a Fork by Luke Dashjr?

Bitcoin Knots (formerly Bitcoin LJR) is an alternative to Bitcoin Core, both allowing network participants to interact with the Bitcoin blockchain.

Anahit Avetisyan
How to Buy New Crypto Before Listing: A Step-by-Step Guide

How to Buy New Crypto Before Listing: A Step-by-Step Guide

Buying a cryptocurrency before it’s listed publicly has become one of the most talked-about strategies in the space, offering the potential for major upside—if done carefully.

The Coinomist
The Rise and Fall of Web3 Darlings: A Guide to Crypto Longevity

The Rise and Fall of Web3 Darlings: A Guide to Crypto Longevity

Most Web3 projects don’t collapse—they just stop being talked about. What makes one protocol a star and another a ghost? And why, in crypto, silence might signal transformation rather than failure?

Vlad Vovk
Bitcoin Retreats from ATH, But Shows No Sign of Investor Exit

Bitcoin Retreats from ATH, But Shows No Sign of Investor Exit

Bitcoin price down to $108,500 after hitting an all-time high, but open interest in futures keeps growing. Profit-taking activity is also muted — just half of what we saw at previous ATH.

Anton Kryshtal
Crypto Market Rotation: HYPE, SPX, and TAO Outperform as Altcoin Momentum Builds

Crypto Market Rotation: HYPE, SPX, and TAO Outperform as Altcoin Momentum Builds

Altcoins are gaining momentum as Bitcoin hits a new all-time high. Our spotlight falls on three standout tokens: HYPE, SPX, and WLD.

Vlad Vovk
MORE
Networking in Crypto: How It Really Works

Networking in Crypto: How It Really Works

In the crypto world, the most valuable connections aren’t made in interviews—they’re formed in the hallways of events and across social platforms. Here, it’s not about business cards. It’s about ideas, engagement, and reputation.

Iaroslava Kramarenko
Earning by Habit: How Crypto Weaves into Everyday Actions

Earning by Habit: How Crypto Weaves into Everyday Actions

You can now earn crypto tokens for your most routine daily habits — shopping, working out, or grabbing breakfast at a café. But how does it actually work?

Yara Zornell
MORE