What is a 51% attack? A 51% attack happens when an individual or group gains control of more than half of a blockchain network’s validation power (hashing power for proof-of-work or stake in proof-of-stake). With majority control they can:
* Prevent or delay new transactions from being confirmed.
* Reverse transactions they previously made, enabling double-spending.
* Potentially block other miners/validators from participating (a form of denial-of-service).
This attack undermines the consensus rules that make a blockchain trustworthy. It is difficult and costly on large, well-distributed networks but represents a real threat to smaller or poorly secured chains. Explore More Resources
How a 51% attack works
* Blockchains rely on majority consensus: the longest (or heaviest) chain accepted by most participants is treated as canonical.
* An attacker with majority power can privately build an alternate chain that excludes or changes transactions.
* If the attacker’s chain overtakes the honest chain, the network will adopt it, allowing reversed transactions and double-spends.
* Changing deep historical blocks is progressively harder; practical attacks target recent blocks and unconfirmed transactions.
Costs and practical obstacles Executing a successful 51% attack requires substantial resources and precise timing:
* Hardware and energy: For proof-of-work chains, attackers need vast hashing capacity—usually thousands of high-end ASICs—plus power and infrastructure, which is prohibitively expensive for large networks.
* Rental services: Cloud-based hashing marketplaces let attackers rent large amounts of hashpower for a limited time, lowering the barrier for attacking smaller networks.
* Timing: Attackers must outpace honest miners/validators to get their alternate chain accepted. Even with majority power, introducing the altered chain at the right moment is technically challenging.
* Economic disincentives on proof-of-stake: On proof-of-stake networks an attacker would need to control a majority of staked tokens. Protocol defenses (e.g., slashing) and social/community responses make such attacks costly and self-destructive for attackers.
Consequences of a successful attack
* Double-spending: The attacker can reverse their own transactions and spend the same funds twice.
* Transaction censorship: Honest users’ transactions can be blocked or delayed.
* Network disruption: Confidence in the chain drops, exchanges may halt withdrawals, and token value can collapse.
* Loss of long-term trust: Even a temporary takeover can have lasting reputational and economic damage.
Which networks are most at risk?
* Smaller chains with low total hashpower or low total staked value are the most vulnerable because attackers can acquire or rent sufficient resources at a manageable cost.
* GPU-mined or lightly secured networks are particularly exposed because rented hashpower can more easily match their capacity.
* Major, long-established networks with high distributed hashpower or large amounts of staked assets are considerably harder to attack.
Examples: Several smaller cryptocurrencies have experienced chain reorganizations and 51% attacks in the past, while major networks remain largely secure due to scale and decentralization. Explore More Resources
Bitcoin and Ethereum: how safe are they?
* Bitcoin (proof-of-work): Its enormous total hashpower and wide distribution of miners make a coordinated 51% attack extremely expensive and operationally difficult. However, concentration of mining in a few large pools is a point of ongoing concern if collusion were to occur.
* Ethereum (proof-of-stake): After its transition to proof-of-stake, an attacker would need to control a majority of the staked ETH. Protocol mechanisms (such as slashing) and the huge economic cost of acquiring such a stake make an attack highly impractical.
Has it happened before? Yes—smaller or newer blockchains with limited security have suffered successful 51% attacks and large chain reorganizations. These incidents typically targeted lower-hashrate or poorly distributed networks. Key takeaways
* A 51% attack gives an attacker temporary control to reverse transactions and censor activity, but it does not allow them to create coins out of thin air or break the underlying cryptography.
* The risk is highest for small or poorly decentralized networks; large networks are protected mainly by the cost and logistics required to gain majority control.
* Cloud hash rentals and concentrated mining power increase theoretical risk, so decentralization of validators and robust economic defenses remain important safeguards.