51% Attack

A 51% attack occurs when a single entity or coordinated group controls more than 50% of a blockchain’s consensus power — hash rate in Proof of Work networks, or staked capital in Proof of Stake networks. With majority control, the attacker can rewrite recent history, double-spend coins, and censor transactions — up to the limits of their control window.


What a 51% Attack Can (and Cannot) Do

CAN DO:

  • Double-spend: Send coins to an exchange, receive goods/other crypto, then rewrite history to reverse the original deposit — effectively spending the same coins twice
  • Reverse recent transactions: Unpublish confirmed transactions from the last N blocks
  • Censor transactions: Exclude specific transactions from all mined blocks
  • Collect double block rewards: Mine blocks in secret and release them all at once

CANNOT DO:

  • Steal coins from addresses you don’t control (no private keys)
  • Create coins out of thin air (beyond the protocol reward)
  • Modify the total supply or protocol rules
  • Access others’ wallets

The key constraint: attackers must constantly outrun the honest chain. As the attack extends to longer history, the resources required grow prohibitively.


Why Mining-Based Attacks Work

In Nakamoto consensus (Bitcoin), the valid chain is the one with the most accumulated proof-of-work. If an attacker controls 51% of hash rate:

  1. Attacker mines a secret chain from block N, excluding victim’s transactions
  2. Honest chain extends normally (attacker ignores it)
  3. Attacker’s chain accumulates faster (51% vs. 49%) — eventually it’s longer
  4. Attacker reveals their chain — the network switches to the longer chain
  5. The honest chain’s blocks are orphaned; the attacker’s chain is now canonical

Time to catch up is a function of attacker hash advantage. At 51%, the attacker’s chain grows at $0.51/(0.51-0.49) = 25.5times$ slower but inevitably surpasses the honest chain given enough time.


Cost of Attacking Bitcoin

Bitcoin is too expensive to attack. At current hash rates (2024-2026):

  • Renting 51% of Bitcoin’s hash rate: >$20M/hour (and no such rental market exists for this scale)
  • Building the hardware: Hundreds of billions in ASICs + energy infrastructure
  • Energy cost alone: Billions annually for sustained attacks

This is by design. PoW’s security model converts electricity and hardware into irreversible economic commitment.


Real Attacks on Smaller Chains

51% attacks are consistently executed against smaller PoW coins where hash rate can be rented cheaply:

Event Target Damage
Jan 2019 Ethereum Classic (ETC) ~$1.1M double-spent
Aug 2020 Ethereum Classic (ETC) 3 attacks in 2 weeks; $5.6M
May 2018 Bitcoin Gold (BTG) $18M double-spent
2018 Vertcoin (VTC) Multiple attacks
2014 Ghash.io pool Approached 51% on Bitcoin briefly; pool voluntarily reduced

The pattern: coins using the same algorithm as larger chains (ETC uses ETHash/Etchash) can be attacked by renting GPU/ASIC hash from NiceHash or similar markets.


Proof of Stake Equivalent

In PoS, a “51% attack” requires controlling 33%+ of staked ETH to perform certain attacks, or 51%+ for full double-spend capability. On Ethereum (2024):

  • 51% of staked ETH ≈ $180B+ of ETH required
  • The attacker’s stake would be slashed (burned by the protocol) upon detection
  • The attack destroys the attacker’s investment in the very asset they’re attacking

This skin-in-the-game mechanism makes PoS 51% attacks far more costly than PoW counterparts for established networks.


Social Media Sentiment

51% attacks generate significant community discussion when they occur, particularly against Ethereum Classic — which has suffered multiple attacks and sparked ongoing debate about whether smaller chains secured by shared algorithm hash rate are fundamentally insecure. Bitcoin maximalists cite 51% attack resistance as a core argument for Bitcoin’s superior security model vs. altcoins.


Last updated: 2026-04

Related Terms


Sources