Skip to main content
Glossary·Technical

51% Attack

A hostile takeover where one party controls a majority of a network's hash rate or stake.

A "51% Attack," sometimes called a majority attack, is a hypothetical but serious threat to a blockchain network. It occurs when a single entity or a coordinated group gains control of over half of the network's total computational power (hash rate for Proof-of-Work systems) or staked cryptocurrency (for Proof-of-Stake systems), allowing them to manipulate the blockchain. This control gives them undue influence over transaction confirmations and potentially the network's history.

How it works

In a Proof-of-Work (PoW) blockchain, like Bitcoin, miners compete to solve complex cryptographic puzzles to add new blocks of transactions to the chain. The first miner to solve the puzzle gets to propose the next block and earns a reward. A 51% attacker, by controlling more than half of the network's hash rate, has a statistical advantage in solving these puzzles. This means they are more likely to be the one to propose valid blocks and confirm transactions.

With this majority hash rate, an attacker could engage in several malicious activities. They could prevent new transactions from being confirmed, effectively censoring the network. More concerningly, they could perform "double-spending" attacks. This involves making a transaction, receiving goods or services, and then using their majority control to reverse that transaction on the blockchain, effectively spending the same cryptocurrency twice. They could also stop other miners from completing blocks, disrupting the network's integrity. For Proof-of-Stake (PoS) blockchains, the principle is similar, but instead of hash rate, the control comes from possessing over 51% of the total staked cryptocurrency, which grants them the majority voting power to validate blocks.

Why it matters for Australian investors

For Australian investors, understanding 51% attacks is crucial for assessing the security and decentralisation of different cryptocurrency projects. A successful 51% attack on a blockchain could severely impact its trustworthiness and, consequently, its market value. While well-established cryptocurrencies like Bitcoin and Ethereum (post-Merge to PoS) are considered highly resistant due to their immense hash rate or staked capital, smaller or newer projects might be more vulnerable. If an Australian investor holds a cryptocurrency that experiences a 51% attack, the value of their holdings could plummet. This isn't specifically an Australian regulatory concern from the perspective of AUSTRAC or ATO, but rather a fundamental risk assessment that any savvy investor, Australian or otherwise, should consider when evaluating their portfolio's exposure to such vulnerabilities. It highlights the importance of diversifying and choosing projects with strong security fundamentals.

Common questions

Q: Has a 51% attack ever successfully occurred on a major cryptocurrency like Bitcoin or Ethereum?

A: While hypothetical discussions abound, Bitcoin and Ethereum have never successfully experienced a sustained 51% attack. Their vast network sizes, distributed mining (or staking) power, and economic incentives make such an attack incredibly costly and difficult to maintain. However, smaller cryptocurrencies with less hash rate or staked capital have been targeted and suffered 51% attacks in the past.

A: A 51% attack can enable an attacker to perform a double-spend, where they spend the same cryptocurrency twice. They can also censor specific transactions, preventing them from being confirmed on the blockchain. Furthermore, they could prevent other miners (or validators) from adding new blocks, effectively disrupting the network's operation and potentially causing a halt in transaction processing. They cannot, however, create new coins out of thin air or reverse transactions that occurred before their control began.

Q: What countermeasures do blockchain networks have against 51% attacks?

A: Blockchain networks employ several strategies to mitigate the risk of 51% attacks. The primary defence is a sufficiently large and decentralised network, making it economically infeasible for any single entity to acquire a majority of the hash rate or stake. Many Proof-of-Stake protocols also include "slashing" mechanisms, which penalise validators who attempt malicious acts or demonstrate dishonesty by seizing part of their staked cryptocurrency. Additionally, some projects implement community governance mechanisms to roll back malicious chains if an attack were to occur, though this is a measure of last resort.

Definitions are educational and general in nature. Nothing here is financial, investment or tax advice. For tax-specific questions, speak with a registered Australian tax agent.