Blockchain 51% Attacks – Lessons Learned for Developers and Trading Platform Operators


Once purely theoretical, “majority” or “51%” attacks on public blockchains have dealt participants a reality check: The fundamental assumption of Satoshi Nakamoto’s 2008 Bitcoin whitepaper (that computing power will remain sufficiently decentralized in blockchain networks that rely on a “proof-of-work” consensus mechanism) can in practice actually be exploited to enable double spending.

“The system is secure as long as honest nodes collectively control more CPU power than any cooperating group of attacker nodes…. If a majority of CPU power is controlled by honest nodes, the honest chain will grow the fastest and outpace any competing chains. To modify a past block, an attacker would have to redo the proof-of-work of the block and all blocks after it and then catch up with and surpass the work of the honest nodes.” – Satoshi Nakamoto, Bitcoin: A Peer-to-Peer Electronic Cash System

These incidents have provided opportunities for developers of both public and private blockchains, as well as operators of blockchain-based digital asset trading platforms, to learn from the first generation of blockchain deployments.

Recently, two reorganizations of the Bitcoin Gold (BTG) blockchain (the hard fork of Bitcoin) resulted in 7,167 BTG (then approximately $87,500) being double spent. It has been suspected that the computing power necessary to maintain this grift was rented through NiceHash, a hash power marketplace.

While not nearly as large a haul as the over 388,000 BTG (then approximately $18 million) heist in May 2018 or the attack executed on the Ethereum Classic (ETC) blockchain in January 2019 in which 219,500 ETC (then approximately $1.1 million) was double spent, this latest 51% attack on a major public blockchain serves as a reminder of the practical implications of this known vulnerability.

What is a 51% Attack?

The Bitcoin Gold and Ethereum Classic blockchains, among other high-profile blockchains, determine “truth” using a proof-of-work consensus algorithm, whereby network participants compete for the right to add blocks to the blockchain by expending computing power to solve complex computational problems the fastest. Nodes on such a blockchain network always consider the longest version of the blockchain (i.e., the blockchain that took the most computing work to generate) to be the correct one.

A 51% attack is when a malicious actor controls a sufficient percentage of the network’s computing power such that it is able to build and verify blocks quicker than the rest of the network can, resulting in the network accepting the attacker’s version of the blockchain as the “truth.” By doing so, an attacker can decide which submitted transactions are approved and added to the blockchain. It can also erase old transactions if it is able to build a new “longest chain” starting from a block that came before those transactions were added to the blockchain, as that new longest chain would not include those transactions.

An attacker could, for example, use this influence to spend its cryptocurrency (e.g., exchange it for another cryptocurrency or USD on a trading platform) and then go back and erase that transaction, giving the attacker possession of the “spent” cryptocurrency again. This would enable the attacker to spend that same cryptocurrency twice – a “double spend.”

There are limits to what a 51% attacker can do, however. The farther back in the blockchain a transaction is, the more exponentially difficult it is to erase it. This is due to the immense computational work required to build an alternate “longest chain” (which would need to stem from a block before the transaction to be erased) faster than the rest of the blockchain network can continue building the incumbent chain. Also, while a 51% attacker can potentially erase old transactions, it cannot fabricate new transactions using other blockchain network participants’ addresses, as it is not possible to do so without having the private keys associated with those addresses (which are necessary to digitally “sign” transactions). In the words of Satoshi Nakamoto’s whitepaper, attackers cannot “[create] value out of thin air or [take] money that never belonged to the attacker.”

Although the largest blockchain networks, such as Bitcoin (BTC) and Ethereum (ETH), have a sufficiently high hash rate to make it unlikely for a would-be 51% attacker to amass the computing power necessary to take control, a number of developments since the Bitcoin blockchain launched in 2009 have increased the likelihood of blockchains with lower hash rates being compromised. In fact, websites exist that calculate the theoretical cost of a 51% attack on the largest blockchain networks, and those costs are relatively low outside of the top few blockchains. Application-specific integrated circuits (ASICs) purpose-built to mine cryptocurrencies and powerful graphics processing units (GPUs) have flooded the mining community, mining pools have consolidated resources and hash power marketplaces have made significant computing power available to rent. Looking ahead, quantum computing also could pose a threat if concentrated in the hands of malicious actors.

Lessons Learned

As with many technological innovations, running blockchain deployments through the gauntlet of real-world use has provided valuable insights that can inform the next generation of developments. As developers and digital asset trading platform operators continue to iterate, they may want to consider the following points:


© 2025 Proskauer Rose LLP.
National Law Review, Volume X, Number 43