Verge Victim to Yet Another 51% Attack, XVG Down 15% In Past 24 Hours
The privacy and security-focused coin Verge has been subject to yet another 51% attack, seeing a price of XVG drop 15% over the past 24 hours.
Last month, a Bitcointalk forum user ‘ocminer’ announced Verge was experiencing a similar 51% attack due to a bug in its code which enabled attackers to spoof timestamps enabling the hacker to repeatedly use the same mining algorithm to mint blocks.
Under regular circumstances, Verge forces miners to use different algorithms for each block in an attempt to prevent any single mining pool from controlling the majority of the hashing power.
By leveraging a series of exploits within the XVG code, the attacker was able to mine multiple blocks at one-second intervals using only the Scrypt hashing algorithm for three hours.
The Verge team responded by patching the code with an emergency commit to the repo and later initiating a hard fork, which according to ‘ocminer’ invalidated the most recent snapshot causing new wallets to fail to synchronize when building from the chain from scratch.
Recent Attack Vector Seems Eerily Familiar
The most recent attack was announced yet again by ‘ocminer,’ by leveraging a similar attack vector as the previous the malicious party was able to repeat the timewarp attack across two of the coins mining algorithms. In a post on Bitcointalk he revealed:
While it is unclear whether or not the perpetrators of the attack are the same as the last, what is clear is that currently 35 million XVG coins have been minted on the Scrypt and lyra2re algorithms ahead of schedule, causing mining difficulty to plummet and the currencies price to decline steeply.
Verge’s Official Statement Remains Tight-Lipped
The Verge official Twitter account has attributed the most recent hack to a “DDOS” attack on official mining pools. However, in light of teams track record and lack any supporting documentation, such a story is incomplete at best.
With this most recent attack being the second in as many months, many in the wider crypto cryptocurrency community have voiced their concerns about the security of the network, drawing criticism from Litecoin’s own Charlie Lee:
While the first attack was quickly overshadowed by Verge’s announcement of their partnership with Pornhub, the worlds largest adult streaming platform, the most recent debacle has left many questioning the credentials of teams lead developers.
Cryptocurrency continues to present itself as a target for hackers and malicious parties. As the market continues to develop, experimental platforms will need to ensure developers continue to err on the side of caution to ensure the safety of the users and the integrity of the blockchain.
For more information on Verge, including technical information and price, see our Verge coin profile.
Cover Photo by Luther Bottrill on Unsplash
Disclaimer: Our writers' opinions are solely their own and do not reflect the opinion of CryptoSlate. None of the information you read on CryptoSlate should be taken as investment advice, nor does CryptoSlate endorse any project that may be mentioned or linked to in this article. Buying and trading cryptocurrencies should be considered a high-risk activity. Please do your own due diligence before taking any action related to content within this article. Finally, CryptoSlate takes no responsibility should you lose money trading cryptocurrencies.
相關文章
- Yet Another Intro for SymbolSymbol
- A - Yet Another Two Integers Problem ACMACM
- Yet Another Intro to Event LoopOOP
- Yet another intro for localStorage and sessionStorageSession
- 【PR #12】劃分序列 / Yet Another Mex Problem 題解
- CF1934B Yet Another Coin Problem 題解
- hdu Yet another end of the world(擴充套件歐幾里得定理推論)套件
- Codeforces 954I Yet Another String Matching Problem
- KRYPTON RECOVERS FROM A NEW TYPE OF 51% NETWORK ATTACK
- Yet-another swoole 非同步佇列,支援彈性擴容,工作程式協程支援非同步佇列
- The Verge:2015年全球十佳電子遊戲遊戲
- Hangcheck: hangcheck value past margin!GCAST
- 2015讀書進度[漆楚衡]-《Write Yourself a Scheme in 48 Hours》Scheme
- The Past 12 Months of Appium - JonahASTAPP
- http://blog.51cto.com/forsk/1531568HTTP
- Oracle RAC Past Image(PI) 說明OracleAST
- Days on my past 童年英文版AST
- put it down?
- padding oracle attack相關之padding oracle attackpaddingOracle
- Kibana server is not ready yetServer
- Chapter 1: Plug-in programing from past to the futureAPTAST
- 7-24 猜數字遊戲 (15分)遊戲
- Intent scheme URL attackIntentScheme
- Another Intro for CookiesCookie
- stylus , another css processorCSS
- 當遇到“you may be a victim of software counterfeiting”這樣的提示
- Unsortbin attack原理及分析
- Upside DownIDE
- Another Intro for HTTP CacheHTTP
- Javascript倒數計時元件new TimeSpan(hours, minutes, minutes)JavaScript元件
- 利用10015診斷事件解決oracle crush down 一例事件Oracle
- HowTo Restore RMAN Disk backups of RAC Database to Single Instance On Another Node [ID 415579.1]RESTDatabase
- linux symbolic link attack tutorialLinuxSymbol
- HTTP Slow Attack測試工具SlowHTTPTestHTTP
- 3.3 Shutting Down a DatabaseDatabase
- check memcached process and restart if downREST
- BIEE Instance OracleBIPresentat DownOracle
- 微軟Loop是新的Office辦公協作軟體 - The Verge微軟OOP