The hackers behind August's 51% attacks on Ethereum Classic exploited a “huge vulnerability” in blockchain protocols powered by proof of work (PoW)—rented mining hash power—and it is a growing industry, according to experts.
“It's actually a huge vulnerability in the system,” said Terry Culver, CEO of ETC Labs, an incubator of projects on Ethereum Classic, in an interview with Decrypt media partner Forkast.News.
Millions of dollars were lost last month following three 51% hacks on the Ethereum Classic network.
Despite the introduction of numerous know your customer (KYC) and anti-money laundering (AML) procedures, as well asregulations to rein in criminal activity in the cryptocurrency industry, hackers have shifted their targets to exploiting a core feature of PoW: decentralization.
“The [cryptocurrency] system is maturing, but the hash rental market is actually growing,” Culver said. “Think of it like, you turn the light on, and where do the mice go? [Malicious actors have] left the exchanges for the most part, and they've moved into the hash rental market.”
Ethereum Classic’s $3,800 attack vector
While it may take over$513,000 to rent the hashing power needed to perform a 51% attack (at the time of publication) for one hour on Bitcoin, only about $3,800 is needed for a similar attack on Ethereum Classic.
”The hash rental market is like under a rock somewhere, it's totally anonymous.”
—Terry Culver
“The hash rental market is like under a rock somewhere, it's totally anonymous,” Culver said. “They're basically money laundering operations. So you could take your BTC from ill-gotten gains, rent hash power, and get out freshly-minted tokens with no provenance—it's actually an incredible vulnerability in the system, if it wants to mature.”
The cost of launching a 51% attack on various top cryptocurrencies. (Image: Crypto51)
How rented hash power can be used for 51% attacks
Two of the three 51% attacks on Ethereum Classic last month were made possible by attackers leveraging Slovenia-based NiceHash, according to ananalysis by data intelligence firm Bitquery. NiceHash is an online platform where users can rent and sell CPU power to mine cryptocurrencies for profit.
By using rented hash power, attackers behind the first and second attacks “double spent” over $7 million by manipulating transaction entries on the blockchain ledger.
NiceHash itself was the target of ahack in 2017, leading to $78 million in Bitcoin being swiped.
Strategies to protect the Ethereum Classic blockchain from 51% attacks might be too little, too late. For the third time in August, hackers gained control of the Ethereum Classic blockchain in a 51% attack that reorganized over 7,000 blocks.
Though Ethereum Classic developers are rushing to protect the blockchain from future attacks, these three attacks raise concerns over the network’s security. OKEx, for instance, has considered delisting the coin to protect itself from future losses.
What is...
“Computers are getting better, it's going to keep getting easier and easier to get control of the computer power necessary to do these things,” said Benjamin J. A. Sauter, partner at New York-based international law firm Kobre & Kim. ETC Labs is pursuing litigation against the attackers through the law firm.
Ethereum Classic Labs to Pursue Enforcement and Regulation of Hash Rental Platforms. View the full statement: https://t.co/X2qqRaLmhZ
In astatement, NiceHash says that it “does not support or enable 51% attacks” but also notes that its services “might be abused by the attacker's pool.”
While NiceHash states that, "Technically, it is impossible for NiceHash or any other miner behind a pool to detect if its hash power is/will be abused for a 51% attack," the company notes that it takes steps to prevent the manipulation of the platform, which is against their terms of service, and also cooperates with authorities investigating criminal activity.
The fightback against 51% attacks
Following the series of hacks in August, ETC Labs announced a strategic plan to protect Ethereum Classic from further attacks, including monitoring hashrates for suspicious activity, deploying a finality arbitration system, and potentially changing the protocol’s PoW mining algorithm.
“If there's a market for renting, I don't think that itself is a problem,” Sauter said. “But if you're doing it without keeping track of who your customers are and doing the same kind of due diligence that the exchanges are doing now, so that you're able to trace back these kinds of frauds and hold people accountable when they abuse it, then you're part of the problem, not the solution.”
This story was produced in collaboration with our friends at Forkast, a content platform focused on emerging technology at the intersection of business, economy, and politics, from Asia to the world.
Daily Debrief Newsletter
Start every day with the top news stories right now, plus original features, a podcast, videos and more.
Crypto's best minds are heading east, and it's gaining at a pace that other regions are finding hard to catch up to.
Asia was responsible for 32% of global crypto developer activity in 2024, according to a report from venture firm Electric Capital. The firm recently published its comprehensive annual report, analyzing over 900 million code commits across the crypto industry.
The transformation represents a nearly threefold increase from Asia's 12% share in 2015, while North America's position de...
Google's announcement of its breakthrough Willow quantum processor has reignited debates about crypto security, with some observers suggesting quantum computers could break Bitcoin's encryption.
The tech giant claims its new quantum computing chip can complete certain calculations in five minutes, which would take traditional supercomputers an impractical amount of time to process.
Quantum computing is a new type of computing that uses the strange properties of quantum physics, where small part...
Dimo, a platform for developers to build apps and enable car drivers to monetize their data, is migrating between Ethereum scaling networks, the developers exclusively told Decrypt—from Polygon to Coinbase’s Base. Co-founder Rob Solomon believes the move opens doors for valuable partnerships ahead.
The project is a “global API layer for cars” that is aiming to make every car on earth smart and programmable. This could manifest, the company says, in a future full of AI car mechanics and smart par...