51% Attack

Home » 51% Attack
« Back to Glossary Index

TL;DR – How a 51% Attack Works

A 51% attack occurs when a single entity or group gains control of more than 50% of a blockchain’s mining or validation power. This lets them manipulate the network by reversing transactions, preventing confirmations, or executing double spends. While proof-of-work (PoW) blockchains like Bitcoin and Ethereum Classic are more exposed to such attacks, proof-of-stake (PoS) networks also face risks if stakers collude.

❓ What Is a 51% Attack?

A 51% attack refers to a situation where an attacker controls the majority (51% or more) of a blockchain network’s computational power (in PoW) or staked tokens (in PoS). This majority control allows the attacker to:

  • Reorganize the blockchain (i.e., rewrite transaction history).
  • Prevent new transactions from being confirmed.
  • Double spend tokens, essentially defrauding exchanges, users, or services.

This type of attack does not allow stealing funds from other wallets, but it can undermine trust in the network and cause financial damage to protocols, platforms, and investors.

How Does a 51% Attack Work?

In a Proof-of-Work blockchain (like Bitcoin or Litecoin), miners compete to solve complex mathematical puzzles to validate blocks. If an attacker controls more than half of the network’s total hash power, they can:

  1. Outpace honest miners and build a longer chain.
  2. Reverse transactions made in blocks they mine.
  3. Double spend by sending the same coins to multiple recipients.

In Proof-of-Stake blockchains (like Solana, Cardano, or Ethereum post-Merge), a similar scenario occurs if an entity controls the majority of staked tokens or delegates.

What Are the Risks of a 51% Attack?

  • Loss of Trust – Rewriting transactions undermines credibility.
  • Financial Losses – Double spending can exploit exchanges and apps.
  • Network Forks – Disagreements may cause a hard fork.
  • Token Devaluation – Investor confidence drops, and price may crash.

Can It Be Prevented?

While no system is entirely immune, these defenses help:

  • Decentralized Mining/Validation – The more distributed the hash power or stake, the harder it is to control 51%.
  • Checkpointing – Some blockchains like Komodo use permanent checkpoints that reject reorganizations.
  • Penalties for Malicious Validators – PoS networks can slash staked tokens from attackers.
  • High Cost of Attack – On large networks like Bitcoin, the energy cost makes such attacks economically irrational.

Examples of 51% Attacks

  • Ethereum Classic (ETC) – Suffered multiple 51% attacks in 2019 and 2020, leading to losses of over $5M.
  • Bitcoin Gold (BTG) – Was exploited via 51% attacks resulting in double-spending and delistings from exchanges.
  • Verge, Vertcoin – Smaller PoW chains have been frequent targets due to low mining difficulty.

🔑 Key Takeaways

  • A 51% attack allows an entity to manipulate a blockchain by gaining majority control of hash power or stake.
  • These attacks enable double spending and transaction censorship, but not the theft of other users’ funds.
  • Bitcoin, Ethereum Classic, and other PoW networks are more prone if their mining power becomes centralized.
  • PoS networks mitigate risk via slashing, decentralization, and governance models.

❓ Frequently Asked Questions About the 51% Attack

Can a 51% attack steal your crypto?

No. It cannot steal directly from wallets, but it can reverse or double-spend transactions involving the attacker’s own wallet.

Is Bitcoin vulnerable to a 51% attack?

Technically yes, but it’s extremely unlikely due to the massive cost of acquiring over 50% of its hash rate.

What happens during a double spend?

The attacker sends crypto to a recipient, then uses their majority power to reverse the transaction, reclaiming the coins.

Do Proof-of-Stake blockchains face 51% risks?

Yes, but in a different form. If someone controls over 50% of the staked tokens, they can manipulate consensus, though penalties exist.

How can networks protect themselves?

By decentralizing validators, using slashing mechanisms, and increasing the cost and complexity of attacks.

« Back to Glossary Index

Best Trading Platforms

Binance is the world’s leading crypto exchange, offering hundreds of coins, low fees, and powerful tools for traders of all levels.

Bybit is a global crypto exchange offering advanced trading tools, deep liquidity, and support for 650+ assets — including spot, futures, and copy trading features for all experience levels.

Axiom brings you seamless Solana trading with built-in tools for sniping memecoins, farming yield, and exploring perps — all in one place.

Buy, sell, and snipe instantly with Trojan. Exclusive real-time data and automation. Be first. Every trade.

Photon is a cross-chain trading bot that supports Base, ETH, Solana, Blast, TRON, and BNB. Designed for fast sniping, wallet monitoring, and limit orders — all inside a non-custodial web interface.