Verge Victim to Yet Another 51% Attack, XVG Down 15% In Past 24 Hours
The privacy and security-focused coin Verge has been subject to yet another 51% attack, seeing a price of XVG drop 15% over the past 24 hours.
Last month, a Bitcointalk forum user ‘ocminer’ announced Verge was experiencing a similar 51% attack due to a bug in its code which enabled attackers to spoof timestamps enabling the hacker to repeatedly use the same mining algorithm to mint blocks.
Under regular circumstances, Verge forces miners to use different algorithms for each block in an attempt to prevent any single mining pool from controlling the majority of the hashing power.
By leveraging a series of exploits within the XVG code, the attacker was able to mine multiple blocks at one-second intervals using only the Scrypt hashing algorithm for three hours.
The Verge team responded by patching the code with an emergency commit to the repo and later initiating a hard fork, which according to ‘ocminer’ invalidated the most recent snapshot causing new wallets to fail to synchronize when building from the chain from scratch.
Recent Attack Vector Seems Eerily Familiar
The most recent attack was announced yet again by ‘ocminer,’ by leveraging a similar attack vector as the previous the malicious party was able to repeat the timewarp attack across two of the coins mining algorithms. In a post on Bitcointalk he revealed:
While it is unclear whether or not the perpetrators of the attack are the same as the last, what is clear is that currently 35 million XVG coins have been minted on the Scrypt and lyra2re algorithms ahead of schedule, causing mining difficulty to plummet and the currencies price to decline steeply.
Verge’s Official Statement Remains Tight-Lipped
The Verge official Twitter account has attributed the most recent hack to a “DDOS” attack on official mining pools. However, in light of teams track record and lack any supporting documentation, such a story is incomplete at best.
With this most recent attack being the second in as many months, many in the wider crypto cryptocurrency community have voiced their concerns about the security of the network, drawing criticism from Litecoin’s own Charlie Lee:
While the first attack was quickly overshadowed by Verge’s announcement of their partnership with Pornhub, the worlds largest adult streaming platform, the most recent debacle has left many questioning the credentials of teams lead developers.
Cryptocurrency continues to present itself as a target for hackers and malicious parties. As the market continues to develop, experimental platforms will need to ensure developers continue to err on the side of caution to ensure the safety of the users and the integrity of the blockchain.
For more information on Verge, including technical information and price, see our Verge coin profile.
Cover Photo by Luther Bottrill on Unsplash
Disclaimer: Our writers' opinions are solely their own and do not reflect the opinion of CryptoSlate. None of the information you read on CryptoSlate should be taken as investment advice, nor does CryptoSlate endorse any project that may be mentioned or linked to in this article. Buying and trading cryptocurrencies should be considered a high-risk activity. Please do your own due diligence before taking any action related to content within this article. Finally, CryptoSlate takes no responsibility should you lose money trading cryptocurrencies.
相關文章
- Yet Another Problem
- Yet Another Permutation ConstructiveStruct
- Yet Another Intro for SymbolSymbol
- Yet Another Intro to Event LoopOOP
- Yet another intro for localStorage and sessionStorageSession
- D. Yet Another Monster Fight
- A - Yet Another Two Integers Problem ACMACM
- QOJ #8232. Yet Another Shortest Path Query
- CF1234F Yet Another Substring Reverse
- Codeforces 954I Yet Another String Matching Problem
- CF102354B Yet Another Convolution 題解
- CF1934B Yet Another Coin Problem 題解
- 【PR #12】劃分序列 / Yet Another Mex Problem 題解
- KRYPTON RECOVERS FROM A NEW TYPE OF 51% NETWORK ATTACK
- Yet-another swoole 非同步佇列,支援彈性擴容,工作程式協程支援非同步佇列
- The Past 12 Months of Appium - JonahASTAPP
- 2019-4-24The+Next+Frontier+in+Publishing-15
- Chapter 1: Plug-in programing from past to the futureAPTAST
- Kibana server is not ready yetServer
- Another Intro for CookiesCookie
- 7-24 猜數字遊戲 (15分)遊戲
- Samsung S Voice attack
- Reflected File Download Attack
- Intent scheme URL attackIntentScheme
- 3.3 Shutting Down a DatabaseDatabase
- Another article published by apiAPI
- pipe stderr into another process
- Another Intro for HTTP CacheHTTP
- Unsortbin attack原理及分析
- linux symbolic link attack tutorialLinuxSymbol
- 3.3.4 Shutting Down with the Transactional Mode
- check memcached process and restart if downREST
- 572-Subtree of Another Tree
- 【SEED Labs】DNS Rebinding Attack LabDNS
- Fishing for Hackers: Analysis of a Linux Server AttackLinuxServer
- macOS Sequoia 15 beta 6 (24A5320a) ISO、IPSW、PKG 下載Mac
- 51微控制器學習筆記——STC15W201S系列筆記
- CF917E Upside DownIDE