Skip to main content

What Specific Actions Can an Attacker Perform with a Successful 51% Attack?

With a successful 51% attack, the attacker can perform a double-spend, where they spend their coins and then use their majority hash power to reverse the transaction, effectively spending the coins twice. They can also prevent new transactions from being confirmed, essentially censoring or halting network activity.

Furthermore, they can prevent other miners from mining valid blocks, allowing them to monopolize block rewards.

What Is the Role of Network Latency in Preventing Double-Spending?
What Is ‘Double-Spending’?
How Do UTXOs Help Prevent “Double-Spending” in a Decentralized Network?
What Is Double-Spending and Why Is a 51% Attack Necessary to Execute It?