DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Refcards Trend Reports Events Over 2 million developers have joined DZone. Join Today! Thanks for visiting DZone today,
Edit Profile Manage Email Subscriptions Moderation Admin Console How to Post to DZone Article Submission Guidelines
View Profile
Sign Out
Refcards
Trend Reports
Events
Zones
Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Partner Zones AWS Cloud
by AWS Developer Relations
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Partner Zones
AWS Cloud
by AWS Developer Relations
The Latest "Software Integration: The Intersection of APIs, Microservices, and Cloud-Based Systems" Trend Report
Get the report
  1. DZone
  2. Software Design and Architecture
  3. Security
  4. 51% Attack Proves Blockchain Is ‘Unhackable’ The Way The Titanic Was ‘Unsinkable’

51% Attack Proves Blockchain Is ‘Unhackable’ The Way The Titanic Was ‘Unsinkable’

Hackers have figured out how to exploit the technology's vulnerabilities, because of course they have.

Sarah Sinning user avatar by
Sarah Sinning
·
Feb. 22, 19 · News
Like (7)
Save
Tweet
Share
11.07K Views

Join the DZone community and get the full member experience.

Join For Free

Ethereum BlockchainPhoto credit Flickr/Descryptive.com

Turns out, blockchain technology isn’t quite as foolproof as all the hype would have you believe. A new article from MIT Technology Review explains that as blockchain systems become increasingly complicated, the likelihood that they can – and most assuredly will – be hacked goes through the roof.

Just last month, a particularly devastating breach occurred when hackers pulled off a 51 percent attack against Ethereum Classic. Although this cryptocurrency’s website claims that its technology is “immutable” and “unstoppable,” this was rather ironically proven false when hackers gained control of more than 50 percent of its network and began rewriting transaction histories. $1.1 million dollars in “double spends” later, the attacker was finally shut down.

The theft itself is in no way an isolated incident. Since the beginning of 2017, as the article points out, nearly $2 billion in cryptocurrency have been stolen (that we know about). But what makes this particular breach so concerning is the method used to pull it off.

“Susceptibility to 51 percent attacks is inherent to most cryptocurriences,” the piece explains. “That’s because most are based on blockchains that use proof of work as their protocol for verifying transactions. In this process, also known as mining, nodes spend vast amounts of computing power to prove themselves trustworthy enough to add information about new transactions to the database. A miner who somehow gains control of a majority of the network's mining power can defraud other users by sending them payments and then creating an alternative version of the blockchain in which the payments never happened.”

While many acknowledged the theoretical possibility of this sort of attack against one of the larger, more popular blockchains – especially in light of its use against smaller networks over the course of the past year – it was generally acknowledged to be too expensive an endeavor for most hackers. We’re talking like $260,000 per hour expensive, an obviously prohibitive sum. That is, until now.

As if this Achilles heel wasn’t bad enough, there’s “a whole new level of blockchain security weaknesses whose implications researchers are just beginning to explore: smart-contract bugs.”

Smart contracts are computer programs that run on blockchain networks and are used to automate the movement of cryptocurrencies. Hackers have now figured out that much like any software, bugs can and likely will happen in smart contract programs, creating vulnerabilities that can be exploited for personal gain. This happened with Ethereum back in 2016 (poor Ethereum) when a hacker stole somewhere in the neighborhood of $60 million by manipulating such a bug. 

These sorts of hijacks, though, are particularly worrisome when you remember that in the blockchain world, transactions cannot be undone. If a smart contract makes a mistake due to a coding flaw, “the only way to retrieve the money is, effectively, to rewrite history – to go back to the point on the blockchain before the attack happened, create a fork to a new blockchain, and have everyone on the network agree to use that one instead.”

Companies are now beginning to look into ways to protect blockchains from these inherent flaws, but there’s certainly a long way to go.

Blockchain

Opinions expressed by DZone contributors are their own.

Popular on DZone

  • Building a Real-Time App With Spring Boot, Cassandra, Pulsar, React, and Hilla
  • Microservices 101: Transactional Outbox and Inbox
  • 10 Things to Know When Using SHACL With GraphDB
  • The Power of Docker Images: A Comprehensive Guide to Building From Scratch

Comments

Partner Resources

X

ABOUT US

  • About DZone
  • Send feedback
  • Careers
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 600 Park Offices Drive
  • Suite 300
  • Durham, NC 27709
  • support@dzone.com
  • +1 (919) 678-0300

Let's be friends: