How Does a 51% Attack Executed via a Hashrate Rental Market Actually Work?

An attacker first rents a massive amount of hashrate from a marketplace, directing it to secretly mine a private version of the target coin's blockchain. While mining in secret, they spend their coins on the public chain, for instance by depositing them to an exchange and trading them for another cryptocurrency.

Once the exchange confirms the transaction, the attacker releases their secretly mined, now longer, blockchain to the network. The network's consensus rules accept the longest chain as valid, thus erasing the original transaction and allowing the attacker to spend the same coins again.

Why Is Double-Spending Easier on a Blockchain with Low Hash Rate?
What Is the Difference between a 51 Percent Attack and a Double-Spending Attempt?
What Is ‘Double-Spending’ and Why Is It the Main Concern of a 51% Attack?
How Does the “Long-Range Attack” in PoS Compare to a 51% Attack in PoW?
Can a 51% Attack Steal Existing Private Keys or User Funds Directly from Wallets?
How Do Cryptocurrency Exchanges Protect Themselves from 51% Attacks?
Can a Validator’s Stake Be Rented in a Similar Way to Hashrate?
Explain the Concept of ‘Mining Centralization’ and Its Relation to Hashrate Rental

Glossar