Blockchain technology has become very popular because it can store data and make it immutable.
If a user can reacquire the local currency of the network, they spend in one transaction and spend it again in another transaction. It is known as a double spending attack.
To double spend the local currency of the blockchain, such as Bitcoin, we need to make changes to a previous block. It's not possible if the person has average computing power. However, if the person has more than 51% of the network's compute power (in case of proof of work) or has staked 51% of the local currency (proof of stake). In that case, they can take over the entire network as they can process transactions and mine blocks faster than any other node on the network.
Usually, a 51% attack follows the following steps:
The malicious node (with 51% computation power) spends some cryptocurrency to purchase an item.
A miner includes their transaction in their block.
Then the malicious miner also mines the same block, excluding the transaction in which they spent those Bitcoins. They do not broadcast this block to other nodes and keep it private.
The malicious miner keeps mining new blocks and adding them to their private blockchain.
Meanwhile, the honest nodes keep adding new blocks to the original blockchain.
When the malicious miner receives that item, they broadcast their private blockchain, and as they have more computing power than the entire network, they would have mined more blocks than the whole network during that time.
All blocks are added to the blockchain with a majority vote, and the malicious miner has the majority vote (51%). Thus, their private blockchain will now replace the pre-existing blockchain of honest miners.
A typical 51% attack is shown below:
Malicious users can use the 51% attack to carry out the following activities:
Stop the confirmation of new transactions on the network.
Stop the generation of new blocks.
Rewrite parts of the blockchain (change transactions).
Take over the entire network.
Blockchain networks are usually considered very secure, but 51% attack poses a significant threat to the entire network's security. The attacker can take control of the whole network and stop all activities happening on the network. The 51% attack is a bigger threat to the smaller blockchain networks with a small amount of hash power and very little currency to acquire. It is not a threat to bigger networks, such as Bitcoin and Ethereum, because these are very big networks with hundreds and thousands of miners worldwide and very high hash rates.
Unlock your potential: Blockchain cyber security series, all in one place!
To continue your exploration of blockchain cyber security, check out our series of Answers below:
What is cyber security?
Understand the foundational concepts of cybersecurity and its importance.
How can blockchain improve cyber security?
Learn how blockchain enhances security by providing decentralized solutions.
What is a 51% attack?
Explore the dangers of a 51% attack and how it compromises blockchain networks.
What is a Sybil attack in blockchain?
Learn about Sybil attacks, where malicious actors create fake identities to undermine a blockchain system.
What is the double-spending problem in blockchain?
Understand the double-spending issue and how it poses risks to blockchain networks.
How to eliminate security threats in blockchain
Discover strategies and solutions for mitigating security risks in blockchain technology.
Free Resources