How Does a Double-Spend Attack Work in Practice after a 51% Control Is Achieved?

The attacker first initiates a transaction, often sending coins to an exchange to trade for another asset. Simultaneously, they begin mining a secret, alternative version of the blockchain where the initial transaction is reversed or never occurred.

Once the exchange confirms the initial transaction and releases the traded asset, the attacker releases their longer, secret chain. The network accepts the longer chain as the valid one, effectively erasing the initial transaction and allowing the attacker to retain their original coins while possessing the newly traded asset.

Why Is a Double-Spend Attack More Profitable When Targeting a Centralized Exchange?
How Does the CFTC Make Aggregated Market Data Publicly Available?
What Is the Significance of the “Longest Chain Rule” in Executing a Double-Spend Attack?
How Does the Longest Chain Rule Prevent Double-Spending in PoW?
How Does a Double-Spend Attack Work Using 51% Control?
What Is a “Double-Spend” in the Context of a 51% Attack?
How Does the Reporting of ‘Block Trades’ Differ from Standard Exchange Trades?
What Are the Differences between a “Liveness” Attack and a “Safety” Attack in the Context of PoS?