Japanese Cryptocurrency Monacoin Hit by Selfish Mining Attack
Advertisement
Between May 13th and 15th, Monacoin, a cryptocurrency developed in Japan, appears to have suffered from a network attack that caused roughly $90,000 in damages.
The attack appears to have been a selfish mining attack, where one miner successfully mines a block on the blockchain but does not broadcast the new block to other miners. If the secret miner can then find a second block before the rest of the miners find any new blocks, then the secret miner has now effectively created a branch in the chain that is longer than the chain everyone else is working on.
As is standard in most blockchain protocols, the chain with more blocks is considered by the mining network to be the correct chain, as it has the most “proof of work.” So, when the secret miner makes their longer chain public, it invalidates any and all of the blocks discovered by other miners during the time the secret chain was hidden.
Source: Reddit
A selfish mining attack can be pure vandalism, destroying blocks that become “orphaned” when the selfish miner broadcasts their chain on the network. Or, it’s possible that someone in possession of a hidden chain could profit from the attack. If the selfish miner makes transactions on the soon to be destroyed chain and receive their purchase in some form or another before the transaction is invalidated, then they have effectively never paid.
In this case, it seems the attacker tried sending Monacoin to exchanges outside of Japan, such as Livecoin, to swap them for other currencies before the hidden chains were revealed. The miner, still unknown at this point, had enough computing power to take as much as 57% of the hashrate at one point in order to execute on this attack.
It appears the attacker had been trying for half a year to attempt to exploit a weakness in the way Monacoin adjusts its difficulty.
On the developer’s official Twitter, they said on May 18th that they “grasped the attack”, but have not posted since then a clear statement on proposed solutions. However other sources indicate that developers are currently working with exchanges on a plan to roll back the Monacoin blockchain to a point before the attack occurred.
攻撃については把握しました。
— monacoinproject (@tcejorpniocanom) May 17, 2018
As of May 19th, Japan time, the attack is no longer occurring, but most exchanges have halted all deposits while they work on fixes to prevent possible future similar attacks. Monacoin balances held in wallets are considered safe.
Every blockchain, including Bitcoin, is constantly readjusting how difficult it is to mine blocks so that it is neither too easy nor too hard, depending on the amount of miners working on blocks. However, sizable blockchains like Bitcoin may be less vulnerable because of the scale of their blockchain and the networks that work on them.
While Monacoin may be more vulnerable because of either its size or its particular algorithms, in theory many cryptocurrencies could be vulnerable to similar attacks. Many cryptocurrency communities are watching to see how the attack on Monacoin plays out to see what can be learned so as to strengthen their own networks.
Featured Image from Shutterstock
相關文章
- Goal2: buy 85 mining, I now have 74 mining and I believeGo
- Hacking Hit Tests
- Archive log mining steps(logminer to html)HiveHTML
- Coinhoarders Steal $50 Million in Cryptocurrency Using Google AdsGo
- [LeetCode] 362. Design Hit CounterLeetCode
- Samsung S Voice attack
- Reflected File Download Attack
- Intent scheme URL attackIntentScheme
- How to get the description of blast hit using blastdbcmd?AST
- Cursor Cache Hit Ratio超過100%
- What is Data Mining 什麼是資料探勘
- Unsortbin attack原理及分析
- linux symbolic link attack tutorialLinuxSymbol
- 改進飛碟(Hit UFO)遊戲遊戲
- 【SEED Labs】DNS Rebinding Attack LabDNS
- Fishing for Hackers: Analysis of a Linux Server AttackLinuxServer
- 鄉村探險畫素遊戲Japanese Rural Life Adventure遊戲
- As a reader --> Diffusion Models for Imperceptible and Transferable Adversarial Attack
- SAP WebClient UI One Hit Navigation的實現方法WebclientUINavigation
- ORA-55507: Encountered mining error during Flashback Transaction Backout. functiError
- KRYPTON RECOVERS FROM A NEW TYPE OF 51% NETWORK ATTACK
- Bitcoin Node Numbers Fall After Spam Transaction "Attack"
- Wordpress 3.8.2補丁分析 HMAC timing attackMac
- 常回家看看之largebin_attack
- CSAPP-Lab03 Attack Lab 記錄APP
- 比特幣與山寨幣的數字貨幣交易庫 CCXT——CryptoCurrency eXchange比特幣
- Blind Return Oriented Programming (BROP) Attack - 攻擊原理
- Hero Age v5.6.10 MOD APK (Menu/One Hit, God Mode)APKGo
- 【backdoor attack】 POISONED FORGERY FACE: TOWARDS BACKDOOR ATTACKS ON FACE FORGERY DETECTION
- 專業音訊處理軟體:Hit‘n’Mix RipX DAW PRO for Mac音訊Mac
- Verge Victim to Yet Another 51% Attack, XVG Down 15% In Past 24 HoursAST
- Fastbin attack&&Double free和Unsortbin leak的綜合使用AST
- 題解:AT_abc368_c [ABC368C] Triple Attack
- 2021 SDC 議題早班車 | Make Deep Exploit RCE Attack Popular
- largebin_attack利用第一彈:2018-0ctf-heapstorm2ORM
- 【機器學習】李宏毅——Adversarial Attack(對抗攻擊)機器學習
- SAP CRM Advanced search和Simple search裡Max hit表現行為的差異
- 每個 node 應用可能存在的 timing-attack 安全漏洞