Ethereum Classic suffers three consecutive 51% attacks
Summary
Ethereum Classic, a well-known cryptocurrency, experienced a series of three 51% attacks in August 2020. The attackers reorganized over 14,000 blocks and managed to double-spend ETC coins.
Attackers
The identity of the attackers behind the Ethereum Classic 51% attack remains unknown.
Losses
During the Ethereum Classic 51% attack, it was reported that the attackers took home more than $9 million in double spend transactions. This loss was borne by crypto exchange OKEx; platform users did not endure any loss due to OKEx’s user-protection policy.
Timeline
- August 1, 2020: The first of three 51% attacks on the Ethereum Classic network begins. Over 3,000 blocks are reorganized. Developers deny that any reorganization has occurred.
- August 5, 2020: Bitquery announces that the attacker double-spent over 800,000 ETC, an equivalent of about $5.6 million. The attacker paid 17.5 BTC, or $204,000, obtain enough hash power for the attack.
- August 6, 2020: The second 51% attack on the Ethereum Classic network begins. Over 4,000 blocks are reorganized. Despite the attacks, the price of ETC only fell by less than 1%. OKEx considers delisting ETC, pending security improvements.
- August 29, 2020: The third 51% attack on the Ethereum Classic network begins. Over 7,000 blocks are reorganized. OKEx sees a loss of over $9 million. The price of ETC falls 4%. The confirmation time for ETC transactions is delayed to two weeks.
Security Failure Causes
- Network Support Discontinuance: Ethereum Classic digital currency miners withdrew their support for the network after each 51% attack. With less hash pointed at the ETC network, it is easier for hackers to 51% attack the network.
- Proliferation of hashing power marketplaces: NiceHash and other hashing power marketplaces allowed attackers to easily rent hash power for short periods of time to gain control of the network’s transaction validation process.
 Distributed Networks Institute
Distributed Networks Institute