"Attacks and Vulnerabilities" TAG

Eclipse Attack
  • glossary
An Eclipse Attack is an attack vector on decentralized networks. An Eclipse Attack aims to isolate a target node and prevent the target from having correct information about the network’s activity and current ledger. The attack would do so by targeting a specific node via hijacking all the node’s neighboring connections—for efficiency, a decentralized network...
Pump and Dump
  • glossary
Pump and Dump schemes refer to cryptocurrency launches in which the project’s team hypes the currency to pump up its price, sells all their holdings immediately after and disappear with they money. These were much more common in 2013, when many new cryptocurrencies were launched. As a result, the teams behind new cryptocurrencies face heightened...
Selfish Mining
  • glossary
Selfish Mining, a.k.a a ‘block withholding attack’ is a type of economic attack vector in blockchain systems. In this attack, a mining pool delays their release of a discovered block so to attempt to secretly mine further blocks, while the rest of the network wastes energy mining what will become an orphan block. The attack...
51% Attack
  • glossary
A 51% attack is a method of disrupting the consensus state of a blockchain, potentially tampering with transactions or re-ordering blocks. 51% attacks can occur when one or multiple entities control 51% of the mininghash power (in a Proof of Work network) or 51% of the token supply (in a Proof of Stake network). Such...
DDoS
  • glossary
Distributed Denial of Service Attack is a common attack on a network or server by a malicious party that involves sending large volumes of network traffic or attempted connections, usually all with minimal amounts of data. This flood of network traffic from a variety of sources (distributed) slows down the network to the point where...
Double Spend
  • glossary
A double spend is when the same coins are successfully used in two different transactions. This attack involves creating an initial transaction, then quickly creating a second transaction using the same coins. Only one of these transactions will be successfully included in a block by the network, leaving the other invalid. This kind of attack...