Sunday, April 27, 2025
HomeBitcoinTwo Miners Purportedly Execute 51% Attack on Bitcoin Cash(BCH) Blockchain

Two Miners Purportedly Execute 51% Attack on Bitcoin Cash(BCH) Blockchain

Published on

SIEM as a Service

Follow Us on Google News

A recent 51% attack which took place in the Bitcoin Cash network, the price of Bitcoin Cash has appreciated against both USD and BTC and the attack was coordinated by both the BTC.com and BTC.top mining pools.

A 51% attack happens when somebody controls most of the mining power on a Proof-of-Work having a network of blockchain. This implies the larger part square verifier can keep different clients from mining and switch exchanges.

While many have accepted that a 51% attack would be done with a noxious goal, the above case occurred as the two mining pools endeavored to keep an unidentified gathering from taking a few coins that  because of a code update were basically “available for anyone.”

- Advertisement - Google News

Cryptocurrency trading is creating a hype as days are passing and millions of traders invest millions of dollars in bitcoin.

Types of an attack

The internal attackers of the mining pools’ attack are caught. Be that as it may, when one code change was expelled amid bitcoin money’s May 15 hard fork, these coins were abruptly spendable “essentially giving the coins to diggers,” he included. The obscure attacker done his best to take the coins. That is when BTC.top and BTC.com swooped in to turn around those exchanges.

According to Cryptoconomy Podcast host Swann, two attackers with greater part control of the system BTC.top and BTC.com played out the attack with an end goal to prevent an obscure digger from taking coins that were sent to an “anybody can spend” address following the first hard fork in May 2017.

51% attacks have commonly been viewed as an unfortunate and unfruitful alternative to take assets, as it would require a monstrous measure of figuring power, and once a system is considered traded off, clients would apparently escape.

Exposing of Blockchain attack

As indicated by measurements on Coin.Dance, BTC.top, and BTC.com control 43% of the bitcoin money mining pool. Digital currency exchanging is making a promotion as days are passing and a great many brokers put a huge number of dollars in bitcoin.

51% assaults have generally been seen as a lamentable and unfruitful choice to take resources, as it would require an immense proportion of figuring power, and once a framework is considered exchanged off, customers would obviously get away.

As Cointelegraph revealed, the Ethereum Classic (ETC) blockchain encountered a 51% attack in January. Analysts at the crypto trade Gate.io supposedly discovered that an attacker had turned around four exchanges, bringing about lost 54,200 ETC. The trade guaranteed to repay the influenced clients and exhorted other exchanging stages to square exchanges started by the attacker’s location.

Conclusion

Yet, some bitcoin money clients contend this was the best activity. “This is extremely grievous, yet it is likewise what evidence of work really is. The attackers for this situation chose to drop prohashes square and from what I heard, it is on the grounds that they considered an exchange inside it to have been invalid,” reacted dynamic bitcoin money supporter Jonathan Silverblood. In any case, others imagine this is an awful sign for Bitcoin money, contending that the occasion shows that the cryptographic money is excessively concentrated.

However, the string of a 51 percent attack is a worry shared crosswise over evidence of-work cryptosystems. For instance, half of bitcoin’s current hashing force is partitioned among only three mining pools as indicated by details site Blockchain. Cryptocurrency trading goes to downfall again after this shocking miners’ scene.

Latest articles

How To Use Digital Forensics To Strengthen Your Organization’s Cybersecurity Posture

Digital forensics has become a cornerstone of modern cybersecurity strategies, moving beyond its traditional...

Building A Strong Compliance Framework: A CISO’s Guide To Meeting Regulatory Requirements

In the current digital landscape, Chief Information Security Officers (CISOs) are under mounting pressure...

Two Systemic Jailbreaks Uncovered, Exposing Widespread Vulnerabilities in Generative AI Models

Two significant security vulnerabilities in generative AI systems have been discovered, allowing attackers to...

New AI-Generated ‘TikDocs’ Exploits Trust in the Medical Profession to Drive Sales

AI-generated medical scams across TikTok and Instagram, where deepfake avatars pose as healthcare professionals...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Threat Actors Exploiting Unsecured Kubernetes Clusters for Crypto Mining

In a startling revelation from Microsoft Threat Intelligence, threat actors are increasingly targeting unsecured...

Hackers Target Investors Through Fraud Networks to Steal Financial Data

Hackers have launched sophisticated schemes designed to defraud investors and steal their financial data....

Threat Actors Exploit Legitimate Crypto Packages to Deliver Malicious Code

Threat actors are using open-source software (OSS) repositories to install malicious code into trusted...