A 51% attack occurs when a single entity or coordinated group controls more than 50% of a blockchain’s consensus power — hash rate in Proof of Work networks, or staked capital in Proof of Stake networks. With majority control, the attacker can rewrite recent history, double-spend coins, and censor transactions — up to the limits of their control window.
What a 51% Attack Can (and Cannot) Do
CAN DO:
- Double-spend: Send coins to an exchange, receive goods/other crypto, then rewrite history to reverse the original deposit — effectively spending the same coins twice
- Reverse recent transactions: Unpublish confirmed transactions from the last N blocks
- Censor transactions: Exclude specific transactions from all mined blocks
- Collect double block rewards: Mine blocks in secret and release them all at once
CANNOT DO:
- Steal coins from addresses you don’t control (no private keys)
- Create coins out of thin air (beyond the protocol reward)
- Modify the total supply or protocol rules
- Access others’ wallets
The key constraint: attackers must constantly outrun the honest chain. As the attack extends to longer history, the resources required grow prohibitively.
Why Mining-Based Attacks Work
In Nakamoto consensus (Bitcoin), the valid chain is the one with the most accumulated proof-of-work. If an attacker controls 51% of hash rate:
- Attacker mines a secret chain from block N, excluding victim’s transactions
- Honest chain extends normally (attacker ignores it)
- Attacker’s chain accumulates faster (51% vs. 49%) — eventually it’s longer
- Attacker reveals their chain — the network switches to the longer chain
- The honest chain’s blocks are orphaned; the attacker’s chain is now canonical
Time to catch up is a function of attacker hash advantage. At 51%, the attacker’s chain grows at $0.51/(0.51-0.49) = 25.5times$ slower but inevitably surpasses the honest chain given enough time.
Cost of Attacking Bitcoin
Bitcoin is too expensive to attack. At current hash rates (2024-2026):
- Renting 51% of Bitcoin’s hash rate: >$20M/hour (and no such rental market exists for this scale)
- Building the hardware: Hundreds of billions in ASICs + energy infrastructure
- Energy cost alone: Billions annually for sustained attacks
This is by design. PoW’s security model converts electricity and hardware into irreversible economic commitment.
Real Attacks on Smaller Chains
51% attacks are consistently executed against smaller PoW coins where hash rate can be rented cheaply:
| Event | Target | Damage |
|---|---|---|
| Jan 2019 | Ethereum Classic (ETC) | ~$1.1M double-spent |
| Aug 2020 | Ethereum Classic (ETC) | 3 attacks in 2 weeks; $5.6M |
| May 2018 | Bitcoin Gold (BTG) | $18M double-spent |
| 2018 | Vertcoin (VTC) | Multiple attacks |
| 2014 | Ghash.io pool | Approached 51% on Bitcoin briefly; pool voluntarily reduced |
The pattern: coins using the same algorithm as larger chains (ETC uses ETHash/Etchash) can be attacked by renting GPU/ASIC hash from NiceHash or similar markets.
Proof of Stake Equivalent
In PoS, a “51% attack” requires controlling 33%+ of staked ETH to perform certain attacks, or 51%+ for full double-spend capability. On Ethereum (2024):
- 51% of staked ETH ≈ $180B+ of ETH required
- The attacker’s stake would be slashed (burned by the protocol) upon detection
- The attack destroys the attacker’s investment in the very asset they’re attacking
This skin-in-the-game mechanism makes PoS 51% attacks far more costly than PoW counterparts for established networks.
Social Media Sentiment
51% attacks generate significant community discussion when they occur, particularly against Ethereum Classic — which has suffered multiple attacks and sparked ongoing debate about whether smaller chains secured by shared algorithm hash rate are fundamentally insecure. Bitcoin maximalists cite 51% attack resistance as a core argument for Bitcoin’s superior security model vs. altcoins.
Last updated: 2026-04
Related Terms
Sources
- Bitcoin Whitepaper — Satoshi Nakamoto — original discussion of majority-hash-rate attacks
- Binance Academy — 51% Attack — accessible explainer
- Crypto51.app — live hourly cost estimates for 51% attacks on PoW chains