What is a 51% Attack?
A 51% attack (also called a majority attack) is a theoretical scenario in which a single entity or coordinated group gains control of more than half of a blockchain network's total mining power, or hash rate. With this majority, the attacker could manipulate the network in ways that are normally impossible, including reversing transactions they have already made, double-spending coins, and blocking other users' transactions from being confirmed.
The concept is rooted in how proof-of-work blockchains reach consensus. The network treats the chain with the most accumulated proof of work as the valid one. Under normal conditions, no single miner or mining pool controls enough hash rate to outpace the rest of the network. But if one entity controlled more than 50% of the total mining power, they could consistently produce blocks faster than everyone else combined, giving them the ability to dictate which version of the blockchain the network accepts.
It is important to understand what a 51% attack cannot do. The attacker cannot create new coins beyond what the protocol allows. They cannot steal bitcoin from wallets they do not hold the private keys to. They cannot change the fundamental rules of the Bitcoin protocol, such as the 21 million supply cap or the block reward schedule. The attack is limited to manipulating transaction ordering and confirmation, not rewriting the core rules of the system.
Why It Matters
The 51% attack represents the primary theoretical vulnerability of any proof-of-work blockchain. It is the scenario that critics most often point to when questioning Bitcoin's security. Understanding it is essential for grasping both the strengths and the limitations of decentralized consensus.
The good news is that, for Bitcoin specifically, a successful 51% attack is extraordinarily unlikely. Bitcoin's hash rate has grown exponentially since its launch, and today the network is secured by millions of specialized mining machines (called ASICs) spread across the globe. The estimated cost of acquiring enough hardware to control 51% of Bitcoin's hash rate runs into the billions of dollars, and that does not include the ongoing electricity costs of running all that equipment. Even a nation-state would find it an enormous financial and logistical challenge.
No successful 51% attack has ever been carried out against the Bitcoin network. However, smaller proof-of-work blockchains with much lower hash rates have been attacked successfully. Ethereum Classic, Bitcoin Gold, and Verge have all suffered 51% attacks where attackers double-spent coins on exchanges. These incidents underscore an important principle: the security of a proof-of-work network is directly proportional to its hash rate. Bitcoin's dominant position in mining power is one of its most important security advantages.
How It Works
The mechanics of a 51% attack follow a specific sequence. First, the attacker sends bitcoin to a victim (typically an exchange) in a normal, visible transaction. They wait for the transaction to receive enough confirmations that the recipient considers it final and releases goods, services, or other currency in return.
Meanwhile, the attacker has been secretly mining an alternative version of the blockchain, one that does not include the transaction they just made. Because they control the majority of the hash rate, they can mine blocks on this private chain faster than the rest of the network mines on the public chain. Once their private chain is longer (has more accumulated proof of work) than the public chain, they broadcast it to the network.
Under Bitcoin's consensus rules, nodes will accept the chain with the most proof of work. When the attacker's longer chain appears, nodes drop the shorter public chain and adopt the attacker's version instead. The original transaction disappears from the record as if it never happened. The attacker still has their bitcoin, plus whatever they received in exchange for it. This is double-spending: the same coins were effectively spent twice.
The attacker could also use their majority hash rate to censor transactions, refusing to include specific transactions in the blocks they mine. Since they produce blocks faster than everyone else, the censored transactions would remain unconfirmed indefinitely, or at least for as long as the attacker maintains majority control.
However, there is a powerful economic disincentive built into this scenario. A successful 51% attack on Bitcoin would likely cause the price of bitcoin to collapse, since it would undermine confidence in the network's security. The attacker, who by definition holds billions of dollars worth of mining hardware optimized exclusively for Bitcoin, would see the value of that equipment and any bitcoin they hold plummet. The very act of attacking the network destroys the economic value the attacker hoped to capture. This self-defeating dynamic, sometimes called the "attacker's dilemma," is one of the most elegant aspects of Bitcoin's security model.
Additionally, the community could respond to a detected attack by changing the proof-of-work algorithm, rendering the attacker's specialized hardware worthless overnight. This nuclear option has never been needed for Bitcoin, but its existence serves as an additional deterrent.