Compartilhe este artigo

Bad Actors Rent Hashing Power to Hit Bitcoin Gold With New 51% Attacks

The two attacks last Thursday saw over $87,000 in the cryptocurrency double spent.

Atualizado 13 de set. de 2021, 12:11 p.m. Publicado 27 de jan. de 2020, 10:45 a.m. Traduzido por IA
Credit: Shutterstock
Credit: Shutterstock

Bitcoin gold, a cryptocurrency that forked from bitcoin in 2017, has again been hit by 51 percent attacks.

STORY CONTINUES BELOW
Não perca outra história.Inscreva-se na Newsletter The Protocol hoje. Ver Todas as Newsletters

Occurring Thursday, according to tweets from the bitcoin gold team, two deep blockchain reorganizations (or reorgs) resulted in double spends of 1,900 BTG and 5,267 BTG, respectively. The losses amount to around $87,500 at current prices.

"We do not know if they successfully extracted any value from an exchange. Advanced risk control systems in exchanges make it likely one or both attacks failed," they wrote.

"Evidence" suggests the attacks used mining power obtained through mining power marketplace NiceHash, according to the team.

A 51 percent attack is conducted by actors who are able mine a blockchain network with more than half its hashing power, hence the name. This enables transactions to be rewritten, potentially diverting previously spent funds to a different address, as was the case here.

Writing on GitHub over the weekend, James Lovejoy, lead maintainer of the vertcoin cryptocurrency and a researcher at MIT's Digital Currency Initiative, said the attacker mined blocks with an address that can be seen here.

In another tweet, the bitcoin gold team said: "We are in contact with exchanges to offer security help and got positive feedback from them. The targeted exchange(s) have already taken effective measures."

While the exchanges were not named, Lovejoy said Binance has increased its withdrawal requirement for BTG to 20 confirmations from 12 since the attack.

Based on NiceHash data, the estimate cost to the attacker of each reorg was roughly 0.2 bitcoin (around $1,700), he added – around the amount that would have been given out in block rewards. As such, even if exchanges manage to block the double-spent coins, the attack would have broken even.

The is not the first time bitcoin gold has seen such an attack. In May 2018 around $18 million in the cryptocurrency was reportedly double spent.

Interestingly, bitcoin gold's value has risen since news of the attack broke. At the time of writing, the price of BTG is around $12.20 – up 18.70 percent over 24 hours.

More For You

Protocol Research: GoPlus Security

GP Basic Image

What to know:

  • As of October 2025, GoPlus has generated $4.7M in total revenue across its product lines. The GoPlus App is the primary revenue driver, contributing $2.5M (approx. 53%), followed by the SafeToken Protocol at $1.7M.
  • GoPlus Intelligence's Token Security API averaged 717 million monthly calls year-to-date in 2025 , with a peak of nearly 1 billion calls in February 2025. Total blockchain-level requests, including transaction simulations, averaged an additional 350 million per month.
  • Since its January 2025 launch , the $GPS token has registered over $5B in total spot volume and $10B in derivatives volume in 2025. Monthly spot volume peaked in March 2025 at over $1.1B , while derivatives volume peaked the same month at over $4B.

More For You

New React bug that can drain all your tokens is impacting 'thousands of' websites

Hacker sitting in a room

Attackers are using the vulnerability to deploy malware and crypto-mining software, compromising server resources and potentially intercepting wallet interactions on crypto platforms.

What to know:

  • A critical vulnerability in React Server Components, known as React2Shell, is being actively exploited, putting thousands of websites at risk, including crypto platforms.
  • The flaw, CVE-2025-55182, allows remote code execution without authentication and affects React versions 19.0 through 19.2.0.
  • Attackers are using the vulnerability to deploy malware and crypto-mining software, compromising server resources and potentially intercepting wallet interactions on crypto platforms.