How Can Cryptocurrency Exchanges Protect Themselves from Attacks on Low-Difficulty Coins?
Exchanges can implement higher confirmation requirements for deposits of low-difficulty coins to mitigate 51% attacks. They should also monitor the network hash rate and block history for anomalies, such as sudden spikes or deep reorganizations.
Delisting extremely vulnerable or inactive coins is another prudent measure. Utilizing third-party security services for real-time monitoring can also enhance defense.
Implementing time-locked withdrawals for new deposits can slow down attackers.