Thursday, January 30, 2025
HomeBitcoinTwo Miners Purportedly Execute 51% Attack on Bitcoin Cash(BCH) Blockchain

Two Miners Purportedly Execute 51% Attack on Bitcoin Cash(BCH) Blockchain

Published on

SIEM as a Service

Follow Us on Google News

A recent 51% attack which took place in the Bitcoin Cash network, the price of Bitcoin Cash has appreciated against both USD and BTC and the attack was coordinated by both the BTC.com and BTC.top mining pools.

A 51% attack happens when somebody controls most of the mining power on a Proof-of-Work having a network of blockchain. This implies the larger part square verifier can keep different clients from mining and switch exchanges.

While many have accepted that a 51% attack would be done with a noxious goal, the above case occurred as the two mining pools endeavored to keep an unidentified gathering from taking a few coins that  because of a code update were basically “available for anyone.”

Cryptocurrency trading is creating a hype as days are passing and millions of traders invest millions of dollars in bitcoin.

Types of an attack

The internal attackers of the mining pools’ attack are caught. Be that as it may, when one code change was expelled amid bitcoin money’s May 15 hard fork, these coins were abruptly spendable “essentially giving the coins to diggers,” he included. The obscure attacker done his best to take the coins. That is when BTC.top and BTC.com swooped in to turn around those exchanges.

According to Cryptoconomy Podcast host Swann, two attackers with greater part control of the system BTC.top and BTC.com played out the attack with an end goal to prevent an obscure digger from taking coins that were sent to an “anybody can spend” address following the first hard fork in May 2017.

51% attacks have commonly been viewed as an unfortunate and unfruitful alternative to take assets, as it would require a monstrous measure of figuring power, and once a system is considered traded off, clients would apparently escape.

Exposing of Blockchain attack

As indicated by measurements on Coin.Dance, BTC.top, and BTC.com control 43% of the bitcoin money mining pool. Digital currency exchanging is making a promotion as days are passing and a great many brokers put a huge number of dollars in bitcoin.

51% assaults have generally been seen as a lamentable and unfruitful choice to take resources, as it would require an immense proportion of figuring power, and once a framework is considered exchanged off, customers would obviously get away.

As Cointelegraph revealed, the Ethereum Classic (ETC) blockchain encountered a 51% attack in January. Analysts at the crypto trade Gate.io supposedly discovered that an attacker had turned around four exchanges, bringing about lost 54,200 ETC. The trade guaranteed to repay the influenced clients and exhorted other exchanging stages to square exchanges started by the attacker’s location.

Conclusion

Yet, some bitcoin money clients contend this was the best activity. “This is extremely grievous, yet it is likewise what evidence of work really is. The attackers for this situation chose to drop prohashes square and from what I heard, it is on the grounds that they considered an exchange inside it to have been invalid,” reacted dynamic bitcoin money supporter Jonathan Silverblood. In any case, others imagine this is an awful sign for Bitcoin money, contending that the occasion shows that the cryptographic money is excessively concentrated.

However, the string of a 51 percent attack is a worry shared crosswise over evidence of-work cryptosystems. For instance, half of bitcoin’s current hashing force is partitioned among only three mining pools as indicated by details site Blockchain. Cryptocurrency trading goes to downfall again after this shocking miners’ scene.

Latest articles

New RDP Exploit Allows Attackers to Take Over Windows and Browser Sessions

Cybersecurity experts have uncovered a new exploit leveraging the widely used Remote Desktop Protocol...

New SMS-Based Phishing Tool ‘DevilTraff’ Enables Mass Cyber Attacks

Cybersecurity experts are sounding the alarm about a new SMS-based phishing tool, Devil-Traff, that...

DeepSeek Database Publicly Exposed Sensitive Information, Secret Keys & Logs

Experts at Wiz Research have identified a publicly exposed ClickHouse database belonging to DeepSeek,...

OPNsense 25.1 Released, What’s New!

The highly anticipated release of OPNsense 25.1 has officially arrived! Nicknamed "Ultimate Unicorn," this...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

Malicious Solana Packages Attacking Devs Abusing Slack And ImgBB For Data Theft

Malicious packages "solanacore," "solana login," and "walletcore-gen" on npmjs target Solana developers with Windows...

PHP Servers Vulnerability Exploited To Inject PacketCrypt Cryptocurrency Miner

Researchers observed a URL attempts to exploit a server-side vulnerability by executing multiple commands...

The Defender vs. The Attacker Game

The researcher proposes a game-theoretic approach to analyze the interaction between the model defender...