18 Feb 2025

light mode

What is an Eclipse attack?

What is an Eclipse attack?

Most attack scenarios on the public blockchain are difficult to implement. They require a large amount of computing power, which makes them infeasible. But hacking a single node or user is not a rare phenomenon.

On this page

An Eclipse attack is an attack executed within the Peer-to-Peer network. It can only be deployed in a decentralized environment, as it targets single nodes that accept incoming and outgoing connections from other nodes. 

For example, the bitcoin network, by default, has a maximum of 117 incoming and 8 outgoing TCP connections.

In an Eclipse Attack, the attacker attempts to redirect the target's connection from its neighboring nodes to the ones under the attacker's control. As a result, the victim is isolated from all honest peers, but remains connected to the attacker's node. 

In other words, an Eclipse Attack is about gaining control over access to information on a P2P network.

How do attackers eclipse nodes?

Attackers usually use a botnet to accomplish this task. For this purpose, they create a phantom network from host nodes to flood the target node with multiple IP addresses that it can synchronize with during the next connection to the blockchain. 

From this point on, the hacker simply waits for the target to connect to those nodes.

Sometimes it takes several attempts to hit the timeframe between automatic reconnections.

In essence, this attack works a lot like fishing. The hacker uses false connection addresses as bait and waits for the node to lap it up. Then he makes a quick strike and gets his “catch” to the shore, far from the native element.

What kind of “fish broth” can be made of a successful Eclipse Attack?

During an Eclipse Attack, the attacker hides the actual state of the blockchain ledger from the target and gains several options for generating criminal profits.

1. Double spending. If the attacker's nodes account for 25% of the total network hashing power, and the target node accounts for 26%, they can get the coveted 51% and a chance of double-spending by taking control of a node. That is, a hacker can send funds to a controlled node that have already been sent to other addresses. Then the compromised node receives information about a false transaction and returns all the money to the attacker's address. The fraud will be revealed only when the victim of the attack gets free and connects to the correctly working nodes. 

2. Stealing processing power of a miner. The hacker hides the information about blocks that have already been mined from the target, thereby pushing the victim to waste processing power on useless calculations. In this way, the attacker increases their personal hash power and wins the validation race (we extensively covered this case in our article about selfish mining). Or they may combine their hash rate with the target's power for more efficient mining and get all the fees.

Are there any ways to prevent an Eclipse Attack?

This is so far a purely theoretical question.

An attack can be eliminated if the peer-to-peer network design enables synchronization with the blockchain through random nodes. The network, where each node connects to the neighboring node, will always be at risk of being attacked.

Some security experts also suggest an alternative safe system, where each node connects to a large number of targets. That is, the network with an increased number of TCP connections. But this would greatly complicate the blockchain architecture and slow down transaction speed during the synchronization.

The content on The Coinomist is for informational purposes only and should not be interpreted as financial advice. While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, or reliability of any content. Neither we accept liability for any errors or omissions in the information provided or for any financial losses incurred as a result of relying on this information. Actions based on this content are at your own risk. Always do your own research and consult a professional. See our Terms, Privacy Policy, and Disclaimers for more details.

Articles by this author
HashFlare: The Story Behind the Infamous Crypto Ponzi Scheme

HashFlare: The Story Behind the Infamous Crypto Ponzi Scheme

The HashFlare cryptocurrency Ponzi scheme is coming to a close, with its founders admitting to a $577 million fraud. Let’s take a look back at how this infamous platform started and operated.

Anton Kryshtal
AI Is Making Crypto Scams Smarter—Insights from Chainalysis 2024

AI Is Making Crypto Scams Smarter—Insights from Chainalysis 2024

The 2024 Chainalysis report confirms that AI-driven fraud is on the rise, with crypto scammers cashing in at least $9.9 billion through advanced deception tactics.

The Coinomist
North Korean Hackers Infiltrate GitHub & NPM to Steal Crypto

North Korean Hackers Infiltrate GitHub & NPM to Steal Crypto

Lazarus Group, a North Korean hacking unit responsible for numerous cyber attacks, has launched a new campaign targeting software developers and crypto wallets.

Anahit Avetisyan
Solana Outpaces Rivals as App Revenues Surge in Crypto Revival

Solana Outpaces Rivals as App Revenues Surge in Crypto Revival

Messari reports that Solana-based apps saw an unbelievable 213% revenue spike, making Solana the top blockchain for app-generated earnings.

Anton Kryshtal
Weekly Analysis of BTC, ETH, and the Stock Market (Feb 10, 2025)

Weekly Analysis of BTC, ETH, and the Stock Market (Feb 10, 2025)

An overview of BTC, ETH, XAUT, and S&P500 charts, and the current cryptocurrency market dynamics.

Artem Khomenko
Weekly Analysis of BTC, ETH, and the Stock Market (Feb 3, 2025)

Weekly Analysis of BTC, ETH, and the Stock Market (Feb 3, 2025)

An overview of BTC, ETH, XAUT, and S&P500 charts, and the current cryptocurrency market dynamics.

Artem Khomenko
Weekly Analysis of BTC, ETH, and the Stock Market (Jan 27, 2025)

Weekly Analysis of BTC, ETH, and the Stock Market (Jan 27, 2025)

An overview of BTC, ETH, XAUT, and S&P500 charts, and the current cryptocurrency market dynamics.

Artem Khomenko
How to Bump a Transaction in the Bitcoin Network

How to Bump a Transaction in the Bitcoin Network

Sometimes, Bitcoin transactions can get “stuck,” especially if a low fee was set. In such cases, you might wonder: Why is my Bitcoin transaction stuck?

bitOn
Inside Cryptocurrency Farms: How Digital Coins Are Mined

Inside Cryptocurrency Farms: How Digital Coins Are Mined

Cryptocurrency farms and mining have evolved significantly since Bitcoin launched in 2009. To understand their growth, it helps to look at the broader history of resource extraction.

The Coinomist
From Bulls to Ballers — Why Celebrities Are Flocking to Crypto

From Bulls to Ballers — Why Celebrities Are Flocking to Crypto

Trump’s meme coin isn’t an outlier—it’s part of a broader trend. Back in 2021, celebrities were minting NFTs, and by 2024, they had moved on to personal token launches. The connection between fame and crypto has been growing for years, even if many failed to see it.

Vlad Vovk
Which Macroeconomic Factors Make Crypto Rise or Fall? 

Which Macroeconomic Factors Make Crypto Rise or Fall? 

It happens when you check the market and crypto prices are up or down for no obvious reason. Then you do some research and find out that there are actually reasons outside the crypto space.

Anahit Avetisyan
How Blockchain Helps Combat Disinformation

How Blockchain Helps Combat Disinformation

Fake news has become a global issue, shaping public opinion, fueling social tensions, and even influencing political decisions. With the rise of social media, the spread of misinformation has accelerated, making it increasingly difficult to regulate. However, blockchain technology offers a promising solution in the fight against fake news.

Daryna Nesterenko
Trading Psychology: How to Avoid Falling Victim to Your Own Biases

Trading Psychology: How to Avoid Falling Victim to Your Own Biases

The most successful traders aren’t always the smartest. More often, those who excel are the ones who understand psychological traps, manage their emotions, and maintain rationality under pressure.

Vlad Vovk
The Bitcoin Kid’s 2011 Prediction – How Right Was He? 

The Bitcoin Kid’s 2011 Prediction – How Right Was He? 

In May 2011, an unusual video surfaced on YouTube. A 12-year-old boy explained Bitcoin – how it works and what its future might hold.

Anahit Avetisyan
SBF’s Prosecutor Quits – What It Means for Crypto Crime

SBF’s Prosecutor Quits – What It Means for Crypto Crime

Danielle Sassoon, Acting U.S. Attorney for the Southern District of New York, has resigned, making headlines this week. And you’ve definitely heard of one of her biggest “client” names.

Anahit Avetisyan
MORE
«Mass Adoption Isn’t About Tech – It’s About Perception». Bitmedia Founder Matvii Diadkov – About RWA, Web3, And Marketing

«Mass Adoption Isn’t About Tech – It’s About Perception». Bitmedia Founder Matvii Diadkov – About RWA, Web3, And Marketing

Matvii Diadkov, founder of Bitmedia, shared with us in an exclusive interview his expert insights on Web3 adoption, impact of GameFi and community-centering tendencies in the market.

The Coinomist
“Satoshi is CIA”: Swedish crypto bro opens up about his Bitcoin journey

“Satoshi is CIA”: Swedish crypto bro opens up about his Bitcoin journey

The first crypto craze took place almost a decade ago. Overnight, many people found out about Bitcoin and its underlying technology, blockchain.

Lesia Dubenko
MORE