Stories
Slash Boxes
Comments

SoylentNews is people

SoylentNews is powered by your submissions, so send in your scoop. Only 17 submissions in the queue.
posted by chromas on Thursday May 24 2018, @03:41PM   Printer-friendly
from the Oops,-the-honest-people-are-in-a-minority-again dept.

CCN reports:

A malicious miner successfully executed a double spend attack on the Bitcoin Gold network last week, making BTG at least the third altcoin to succumb to a network attack during that timespan.

[...] To execute the attack, the miner acquired at least 51 percent of the network's total hashpower, which provided them with temporary control of the blockchain. Obtaining this much hashpower is incredibly expensive — even on a smaller network like bitcoin gold — but it can be monetized by using it in tandem with a double spend attack.

After gaining control of the network, the attacker began depositing BTG at cryptocurrency exchanges while also attempting to send those same coins to a wallet under their control. Ordinarily, the blockchain would resolve this by including only the first transaction in the block, but the attacker was able to reverse transactions since they had majority control of the network.

Consequently, they were able to deposit funds on exchanges and quickly withdraw them again, after which they reversed the initial transaction so that they could send the coins they had originally deposited to another wallet.

A bitcoin gold address implicated in the attack has received more than 388,200 BTG since May 16 (mostly from transactions it sent to itself). Assuming all of those transactions were associated with the double spend exploit, the attacker could have stolen as much as $18.6 million worth of funds from exchanges.

The last transaction was sent on May 18, but the attacker could theoretically attempt to resume it if they still have access to enough hashpower to gain control of the blockchain.

Bitcoin gold's developers advised exchanges to address the attack by increasing the number of confirmations required before they credit deposits to customer accounts. Blockchain data indicates that the attacker successfully reversed transactions as far back as 22 blocks, leading developers to advise raising confirmation requirements to 50 blocks.

Bitcoin Gold appears to use a standard ~10 min block rate so the new recommendation is for exchanges to hold funds for ~8 hours before clearing them.


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 1, Interesting) by Anonymous Coward on Thursday May 24 2018, @10:19PM (6 children)

    by Anonymous Coward on Thursday May 24 2018, @10:19PM (#683779)

    Firstly, having a hashing majority simply allows one, at great cost, to make a limited set of mild manipulations for a limited time (people start noticing), such as toppling a handful of the top blocks, slowing down the processing of particular transactions, etc. Meanwhile, each new block secures ever more the blocks on which it is built, which is still a service, and is one reason why Bitcoin would probably serve best as a settlement layer.

    Secondly, if there's enough aggravation, it could be incentive to whip up support among fair players (or just opponents of the attacker, such as one government against another) to fund competing minors. There's a huge incentive to keep an attacker from ruining the value that has been poured into growing the system.

    Secondly, nobody really has to put up with it; if there's enough aggravation, both miners and non-miners could agree on new rules that disadvantages the bad actor, which might be enough to render such an attack too expensive to keep repeating; this need not be too invasive, either, as a soft fork could allow people to begin transacting with a different PoW algorithm, essentially transitioning to a side chain where the bad actor must once again foot the bill of building up a majority hashing rate.

    Starting Score:    0  points
    Moderation   +1  
       Interesting=1, Total=1
    Extra 'Interesting' Modifier   0  

    Total Score:   1  
  • (Score: 3, Funny) by Justin Case on Thursday May 24 2018, @10:48PM

    by Justin Case (4239) on Thursday May 24 2018, @10:48PM (#683790) Journal

    whip up support ... to fund competing minors

    Hell yeah I'd fund that! And them with whips even!!! I'm assuming because it's all blockchain the feds will never bust me since I'll be invisible.

    Let's keep it tasteful, though. No minors under 12. That's just creepy. Especially if they're wrestling naked in a giant vat of olive oil.

    Oh, you meant "miners"?

    See, sometimes literacy does matter.

  • (Score: 2) by JoeMerchant on Friday May 25 2018, @03:11PM (4 children)

    by JoeMerchant (3937) on Friday May 25 2018, @03:11PM (#684043)

    as a soft fork could allow people to begin transacting with a different PoW algorithm, essentially transitioning to a side chain where the bad actor must once again foot the bill of building up a majority hashing rate.

    So, the bad actor has forced manual intervention (I know, ethereum does this all the time), and changing everybody else's hashing gear to run away from them.

    Except, what's to stop this bad actor from adapting their hashing gear over onto the new fork and doing it all over again?

    I think some of what is going on with Bitcoin Gold and the other exploited coins is that there's so much compatibility between competing miner networks that somebody has built up a powerful hashing pool and is jumping from one relatively little network to the next, thrashing them and then moving on. This does not bode well for the whole theory of a distributed multi-layered Proof Of Work system, since each independent honest miner network will have to be bigger (more expensive) than the largest malicious network out there.

    --
    🌻🌻 [google.com]
    • (Score: 0) by Anonymous Coward on Friday May 25 2018, @05:56PM

      by Anonymous Coward on Friday May 25 2018, @05:56PM (#684110)

      People can still use the old rules.

    • (Score: 1) by khallow on Sunday May 27 2018, @12:57AM (2 children)

      by khallow (3766) Subscriber Badge on Sunday May 27 2018, @12:57AM (#684710) Journal

      Except, what's to stop this bad actor from adapting their hashing gear over onto the new fork and doing it all over again?

      The lack of profitability?

      • (Score: 2) by JoeMerchant on Sunday May 27 2018, @02:22AM (1 child)

        by JoeMerchant (3937) on Sunday May 27 2018, @02:22AM (#684726)

        The lack of profitability?

        I'm just going to throw out a guess here that $18M in the space of less than a day was a profitable day for the attacker.

        --
        🌻🌻 [google.com]
        • (Score: 1) by khallow on Sunday May 27 2018, @04:20AM

          by khallow (3766) Subscriber Badge on Sunday May 27 2018, @04:20AM (#684750) Journal
          Depends on how much the equipment costs them to run. If they're directing around a bunch of hacked computers, it's probably pretty cheap. If they're chewing up more than $18 million in order to earn $18 million it doesn't work for them.