Skip to main content

How Does a Double-Spend Transaction Work in the Context of a 51% Attack?

In a double-spend attack, the attacker first sends coins to an exchange and waits for a few confirmations, then sells or withdraws them. Simultaneously, the attacker secretly mines an alternative chain where the transaction to the exchange is replaced with a transaction sending the coins back to their own wallet.

Once the secret chain is longer than the public one, the attacker broadcasts it. The network adopts the longer chain, nullifying the exchange transaction and effectively "double-spending" the coins.

What Is the Difference between a Soft Fork and a Hard Fork in Response to a Chain Reorganization?
How Does a Hard Fork Differ from a Soft Fork in Terms of Network Consensus?
What Is a ‘Reorg’ (Reorganization) and How Is It Used in a 51% Attack?
What Is the Difference between a Soft Fork and a Hard Fork in the Context of Changing a Mining Algorithm?