Skip to main content

How Does a Double-Spend Attack Work in Practice after a 51% Control Is Achieved?

The attacker first initiates a transaction, often sending coins to an exchange to trade for another asset. Simultaneously, they begin mining a secret, alternative version of the blockchain where the initial transaction is reversed or never occurred.

Once the exchange confirms the initial transaction and releases the traded asset, the attacker releases their longer, secret chain. The network accepts the longer chain as the valid one, effectively erasing the initial transaction and allowing the attacker to retain their original coins while possessing the newly traded asset.

What Is the Relationship between a Private Key and a Public Key?
How Does an Attacker Cash out Their Illicit Gains?
What Is ‘Double-Spending’ and Why Is It the Primary Concern of a 51% Attack?
What Is “Liquidity” and How Does a Double-Spend Affect an Exchange’s Liquidity Pool?