Employing crypto-mining malware is among the most favored methods of crypto-jackers in infiltrating a system and stealing cryptocurrencies. But there’s another one that’s also feared: the 51 percent attack.
In a nutshell, this method of infiltration requires the attacker to take control of a network’s hashing power exceeding 50 percent. If an attacker manages this, they will be able to inhibit new transactions from requiring authentication, allowing the cessation of payments between some, or even all, users. This will also allow the hackers to double-spend coins by reversing completed transactions during the time they are in control of the network.
Double-spending is unique in the cryptocurrency market. It is the act of completing a transaction and reversing it, essentially creating a duplicate of the coin that was supposedly spent.
So why does this kind of attack not happen on a regular basis? The problem with this approach is that it is ridiculously difficult to gain a 51 percent control of a network’s hashing power since the cost of launching an attack is higher than the value of any gains from it. Some would argue that the amount of hashing power will be better off being used in mining cryptocurrencies instead.
A 51 percent attack is so rare that some experts argue that those operating in cryptocurrency who have a longer ledger of transactions will be immune to it, which makes sense since the bigger the block, the more hashing power it will take to change the prime transaction. However, it seems that this isn’t the case anymore, according to Coindesk.
Joseph Bonneau, an NYU computer science researcher, released a report last year that lowered the cost of a 51 percent attack by simply renting hashing power, rather than going out and buying the equipment needed. He concluded in his research that the 51 percent attack will grow over time.
Now, that prediction is starting to take shape. In the last month alone, there were at least five reported cryptocurrencies that were hit using a 51 percent method. With each hit, the attackers were able to take control of the small networks, tamper with their transactions and bag hundreds of thousands of dollars.
Cornell professor Emin Gün Sirer said in a tweet that digital coins that take less than $1 million to attack are the ones that are at risk and those who have savings on them better think fast before they get in a hacker’s cross hairs. There’s even a website that calculates how much it will cost to attack cryptocurrencies today, from the popular Bitcoin and Ethereum to the obscure CryCash and Linx.


Nintendo Switch 2 Production Cut as Holiday Sales Miss Targets
OpenAI Pulls the Plug on Sora, Ending $1 Billion Disney Partnership
SK Hynix Eyes Up to $14 Billion U.S. IPO to Fund AI Chip Expansion
NVIDIA's Feynman AI Chip May Face Redesign Amid TSMC Capacity Crunch
Super Micro Computer Shares Plunge After Co-Founder Charged in AI Chip Smuggling Case
Reflection AI Eyes $25 Billion Valuation in Massive $2.5 Billion Funding Round
Golden Dome Missile Defense: Anduril and Palantir Join Forces on Trump's $185B Space Shield
Nanya Technology Shares Surge 10% After $2.5 Billion Private Placement from Sandisk and Cisco
SpaceX IPO Filing Expected This Week as Valuation Could Surpass $75 Billion
SMIC Allegedly Supplies Chipmaking Tools to Iran's Military, U.S. Officials Warn
Federal Judge Blocks Pentagon's Blacklisting of AI Company Anthropic
Elon Musk Confirms SpaceX, xAI, and Tesla Will Continue Large-Scale Nvidia Chip Orders
Judge Dismisses Sam Altman Sexual Abuse Lawsuit, But Sister Can Refile
Palantir's Maven AI Earns Pentagon "Program of Record" Status, Reshaping Military AI Strategy
Meta Ties Executive Pay to Aggressive Stock Price Targets in Major Retention Push 



