Skip to main content

Search...

Popular searches

Sybil Attack

A Sybil attack occurs when an attacker creates multiple fake identities or nodes to gain disproportionate control over a blockchain network, such as influencing consensus or voting.

Blockchain
Updated: Mar 19, 2026
Also known as: identity attack node flooding

What Is a Sybil Attack?

A Sybil Attack is a security threat in peer-to-peer networks, including blockchains, where an attacker creates multiple fake identities or nodes to gain outsized influence. Named after the book Sybil about a woman with multiple personalities, it exploits systems that assume one unique identity per participant.

The attack works by flooding the network with pseudonymous entities that the attacker controls. In blockchain contexts, the attacker might spin up thousands of low-cost nodes or accounts. These fake identities then sway consensus mechanisms, such as voting on transaction validity or governance proposals. For example, in a proof-of-stake network without strong identity checks, an attacker could amass stake under fake identities to control over 51% of voting power.

Sybil attacks matter because they erode decentralization and trust. They enable censorship, double-spending, or network forks by overpowering honest participants. Blockchains counter this with resource-based proofs: proof-of-work demands computational power per identity, while proof-of-stake ties influence to economic stake. Without defenses, networks risk centralization under attacker control.

Key characteristics include low cost for attackers in permissionless systems and types like direct attacks (altering consensus votes) or indirect attacks (disrupting data propagation). Real-world defenses often combine cryptographic identities, reputation systems, or economic penalties.

  • Vulnerable systems: Pure one-node-one-vote protocols.
  • Resistant examples: Bitcoin's proof-of-work.

DefiDAO

A DAO (Decentralized Autonomous Organization) is a blockchain-based entity governed by smart contracts and token holder votes, enabling decentralized decision-making without central authority.

Read full definition
BlockchainDecentralization

Decentralization spreads control and data across many independent nodes in a blockchain network, eliminating reliance on a single authority.

Read full definition
BlockchainNode

A node is a computer running blockchain software that connects to the network, validates transactions, and maintains a copy of the ledger.

Read full definition

Real-World Examples

Example 1: Governance in a DAO

An attacker creates 1,000 fake token holder accounts in a decentralized autonomous organization (DAO). These accounts vote to pass a malicious proposal, gaining majority control despite minimal real investment. The DAO counters this with quadratic voting or identity verification.

Example 2: Proof-of-Stake Network

In a proof-of-stake blockchain like Ethereum pre-upgrades, an attacker distributes stake across thousands of low-value validator identities. This aims to exceed 51% voting power for double-spending. Slashing penalties and minimum stake requirements resist the attack.

Example 3: Bitcoin's Resistance via Proof-of-Work

Bitcoin miners cannot cheaply launch a Sybil attack. Each fake identity requires significant computational power to mine blocks. An attacker flooding nodes with low-hashpower identities fails to influence consensus, as honest miners dominate with real hardware.

Example 4: Torrent Network Analogy in Blockchain P2P

Similar to BitTorrent, a blockchain attacker floods the peer-to-peer network with fake nodes. These disrupt transaction propagation or eclipse honest peers. Blockchains mitigate this with random peer selection and resource proofs.

DefiDAO

A DAO (Decentralized Autonomous Organization) is a blockchain-based entity governed by smart contracts and token holder votes, enabling decentralized decision-making without central authority.

Read full definition
BlockchainToken

A token is a digital asset on a blockchain that represents value, ownership, utility, or access rights. Examples include ERC-20 tokens on Ethereum.

Read full definition
GeneralKYC

KYC (Know Your Customer) is the regulatory process where cryptocurrency exchanges verify users' identities using documents like ID or proof of address to prevent fraud and money laundering.

Read full definition
BlockchainEthereum

Ethereum is a decentralized blockchain platform that enables smart contracts and decentralized applications (dApps). Its native cryptocurrency is Ether (ETH).

Read full definition
BlockchainValidator

A validator is a node in a proof-of-stake blockchain that stakes cryptocurrency to verify transactions, propose blocks, and secure the network.

Read full definition
BlockchainBitcoin

Bitcoin (BTC) is the first decentralized cryptocurrency, launched in 2009. It uses blockchain technology for secure, peer-to-peer digital transactions without intermediaries.

Read full definition

Ready to Choose a Secure Wallet?

Use our tools to find the right hardware wallet for your needs.