Just a week after the last massive 51% attack, Ethereum Classic (ETC) is yet again under siege today, as an unknown party has reorganized at least 4,000 blocks in the blockchain, according to Bitfly, the company behind mining pool Ethermine.
Today another large 51% attack occurred on the #ETC which caused a reorganization of over 4000 blocks. Until further notice ETC pool payouts are disabled and we encourage all our miners to switch to our #ETH pool at https://t.co/f8Px6gGJiM in the meantime.
Ethereum Classic developers urged all ETC services to “significantly raise confirmation times on all deposits and incoming transactions.”
In light of recent network attacks, it's recommended that all exchanges, mining pools, and other ETC service providers significantly raise confirmation times on all deposits and incoming transactions. @okex@binance@HuobiGlobal@hitbtc@coinbase@digifinex@etherchain_org
The network saw a sharp and sudden influx of new computing power today, spiking the mining difficulty from around 56 to over 98 terahashes, data from mining-focused platform 2miners showed. Since blockchains usually strive to constantly retain the same time intervals between blocks (10 minutes in case of Bitcoin, for example), they automatically increase—or lower—the difficulty of discovering new blocks to match the current hashrate.
Ethereum co-founder Vitalik Buterin suggested that ETC developers should just switch to proof-of-stake—an alternative consensus mechanism that relies on users staking their coins to maintain the network—and not on raw computing power used in ETC’s current proof-of-work algorithms.
ETC should just switch to proof of stake. Even given its risk-averse culture, at this point making the jump seems lower-risk than not making it.
A 51% attack is one of the most dangerous challenges a blockchain can face. During such assaults, a single party aims to seize 51%—or more—of a network’s hash power, which would grant the attackers control over the blockchain.
Among other things, this allows hackers to override and cancel their transactions, making it seem like they never happened, and spend their coins several times.
As Decrypt reported, Ethereum Classic suffered a massive 51% attack just days ago as the hacker reorganized the blockchain with his own malicious blocks by August 1, replacing the legit ones.
At that time, the attacker snatched over 800,000 ETC—worth around $5.6 million. To do this, he reportedly paid just about 17.5 BTC (roughly $204,000 today) for the computing power used in the attack.
Daily Debrief Newsletter
Start every day with the top news stories right now, plus original features, a podcast, videos and more.
The solo miner of Bitcoin block 888,737—won last week with a $266,000 BTC reward—shared their story with Bitcoin mining hardware creator FutureBit, whose Apollo miners helped lead to the sizable score.
The anonymous miner, who took home more than 3.15 BTC or around $266,000 last week between the fixed reward and transaction fees, did so with a home setup composed of three FutureBit Apollo miners and one Bitmain SK19pro, according to the shared email posted to X.
“I usually have the Apollo miner...
DFZ Labs, the creators of the Ethereum NFT project Deadfellaz, will launch a new asset verification tool that allows users to connect online and offline assets without signing blind transactions or smart contract approvals.
Coldlink, now in beta, enables blockchain users to connect their blockchain address to any asset in Web2, Web3, or real life without incurring the security risk of blind signing or smart contract approvals, DFZ Labs said.
“To ‘Coldlink’ something is to connect any digital ass...
Scammers are using cracked versions of TradingView Premium to drain crypto wallets.
The app is disguised as a “cracked” version of the real TradingView Premium app. Downloads of the malware infused versions are being distributed via Reddit and have often been found in cryptocurrency sub Reddits.
Victims have reported having their entire crypto wallets emptied. They were then impersonated by the scammers, who used their details to send out phishing attempts encouraging the victims’ contacts to d...