link2940 link2941 link2942 link2943 link2944 link2945 link2946 link2947 link2948 link2949 link2950 link2951 link2952 link2953 link2954 link2955 link2956 link2957 link2958 link2959 link2960 link2961 link2962 link2963 link2964 link2965 link2966 link2967 link2968 link2969 link2970 link2971 link2972 link2973 link2974 link2975 link2976 link2977 link2978 link2979 link2980 link2981 link2982 link2983 link2984 link2985 link2986 link2987 link2988 link2989 link2990 link2991 link2992 link2993 link2994 link2995 link2996 link2997 link2998 link2999 link3000 link3001 link3002 link3003 link3004 link3005 link3006 link3007 link3008 link3009 link3010 link3011 link3012 link3013 link3014 link3015 link3016 link3017 link3018 link3019 link3020 link3021 link3022 link3023 link3024 link3025 link3026 link3027 link3028 link3029 link3030 link3031 link3032 link3033 link3034 link3035 link3036 link3037 link3038 link3039 link3040 link3041 link3042 link3043 link3044 link3045 link3046 link3047 link3048 link3049 link3050 link3051 link3052 link3053 link3054 link3055 link3056 link3057 link3058 link3059 link3060 link3061 link3062 link3063 link3064 link3065 link3066 link3067 link3068 link3069 link3070 link3071 link3072 link3073 link3074 link3075 link3076 link3077 link3078 link3079 link3080 link3081 link3082 link3083 link3084 link3085 link3086

56 Million Double Spent: ETC Team Finally Acknowledges the 51 Attack on Network

$5.6 Million Double Spent: ETC Team Finally Acknowledges the 51% Attack on Network

$5.6 Million Double Spent: ETC Team Finally Acknowledges the 51% Attack on Network

The Ethereum Classic (ETC) blockchain network lost $5.6 million to one miner following a 51% attack initially thought to be a chain split.

During the attack, the offending miner managed to double-spend 807,260 ETC ($5.6 million) after spending 17.5 BTC or $200,000 (at time of writing) to acquire the hash power for the attack.

The ETC team initially issued a statement advising its clients to halt interactions with the network while corrective steps were taken.

At the time, one of the developers at ETC, James Wo insisted the event “was not a 51% attack” while stressing that the “offending miner went offline and was using old client software.”

The investigation by Bitquery now debunks ETC team’s initial theory.

According to Bitquery, the attacker “mined 4280 blocks for four days.” It adds that “he did only a little mining before and stopped mining after the attack.”

In result, the miner “sent all the mining reward money (13K ETC ) to address 0x401810b54720faad2394fbe817dcdeae014066a1, where it resides at the time of writing.”

Bitquery’s report provides a timeline of how the sophisticated attack unfolded as well as the identity of the crypto exchange used by the miner to facilitate the attack.

Meanwhile, the ETC team now acknowledges the event is in fact an attack. In a statement issued late on 5 August the team said:

Today another large 51% attack occurred on ETC which caused a reorganization of over 4000 blocks. Until further notice ETC pool payouts are disabled and we encourage all our miners to switch to our ETH pool in the meantime.

Members of the ETC team also said, “in light of recent network attacks, it is recommended that all exchanges, mining pools, and other ETC service providers significantly raise confirmation times on all deposits and incoming transactions.”

$5.6 Million Double Spent: ETC Team Finally Acknowledges the 51% Attack on Network

Meanwhile, ETC Cooperatives says its director of developer relations, Yaz Khoury will be working Bitquery to learn out “more about the recent attack, including the attacker’s addresses, origin of hashpower, the flow of funds, and more important details.”

In 2019, ETC suffered a similar attack prompting some exchanges like Coinbase to immediately cease interactions with the blockchain.

What do you think about the latest attack on ETC? Share your thoughts in the comments section below