Legal Liability of a 51%, Goldfinger Cryptocurrency Attack (2024)

Introduction

With a market cap of over $1 trillion, cryptocurrencies have quickly gone from an obscure novelty to an alternative currency juggernaut. The recent collapse of FTX, related entities, and others in the crypto ecosystem has drawn heightened attention to this important technology. Cryptocurrencies are decentralized digital currencies; cryptocurrencies also rely on the blockchain, described as “a distributed, shared, [virtual,] encrypted-database that serves as an irreversible and incorruptible public repository of information. It enables, for the first time, unrelated people to reach consensus on the occurrence of a particular transaction or event without the need for a controlling authority.”

The decentralized nature of the blockchain means it relies on a consensus of the network’s mining hash rate to maintain the blockchain accurately. This structure also means that if users who control more than 50% of the mining power collude, they could agree to alter the blockchain, which, if the majority desired, could result in massive cryptocurrency transfers. Pulling off such an attack would be difficult, especially with the larger currencies such as Bitcoin and Ether, but a successful attack could result in thousands of victims losing millions of dollars worth of cryptocurrency.

Legal Recourse

Currently, no criminal or civil statutes explicitly punish a 51% attack. Moreover, the novel, complex, and unregulated nature of blockchain technologies means that existing case law and statutes—largely created to address the theft of physical objects—lead to great uncertainty regarding potential criminal liability.

The two main cryptocurrencies, Bitcoin and Ether, are likely not considered a security for purposes of SEC regulation because they are transacted on decentralized autonomous platforms. Even if they were, it would be difficult for the SEC to prosecute a 51% attack. One could argue for potential liability under 15 USC § 78i Manipulation of Security Prices, but the statute explicitly applies only to the purchase, sell, or securities swap conducted to manipulate the price. A 51% attack does not directly manipulate the cryptocurrency’s price; it redistributes existing cryptocoins. Also, it is not the result of buying, selling, or swapping the asset. Furthermore, the SEC is well aware of 51% attacks and has yet to pass any guidance on prosecuting such an occurrence. While not dispositive, this supports the position that the SEC would not have the power to prosecute a 51% attack.

The CFTC and federal courts have both found that cybercurrencies are commodities that are subject to the Commodity Exchange Act (CEA). Similar to the SEC, although the CFTC is aware of 51 % attacks, it has not passed any guidance regrading enforcement of those attacks. CEA section 6(c)(1) and CFTC Regulation 180.1(a), the broad fraud provisions of the CEA, only apply to transactions in connection with swaps, or contracts of sale or of future sale of commodities. While it may be argued that a 51% attack is an a artifice to defraud, it would not be a transaction connected to a swap or commodity sale, leaving it outside of the jurisdiction of prosecution by the CFTC.

The Computer Fraud and Abuse Act has been proposed as a potential means for imposing liability. The statute punishes anyone who “knowingly causes the transmission of a program, information, code, or command, and as a result of such conduct, intentionally causes damage without authorization, to a protected computer.” The statute defines “damage” as “any impairment to the integrity or availability of data, a program, a system, or information.” A 51% attack alters the blockchain data, but the deleted data would still be “available” because the attack would not delete every blockchain record. The statute also requires that the crime be committed “without authorization.” This may appear to be fatal since the attackers do have authorized access to the blockchain; however, the majority rule is that “without authorization” modifies “intentionally causes damage” and does not modify accessing the computer (or, here, the blockchain). Therefore, a prosecutor, under the majority view, could allege that the malicious manipulation of the blockchain was unauthorized.

This brings us to perhaps the most important and ambiguous issue of cryptocurrency ownership. Is cryptocurrency ownership based on possession of the private key or based on the blockchain consensus? If it is simply the blockchain consensus, then it could be argued that cryptocurrency owners implicitly consent to any blockchain alterations made possible by the structure of the blockchain, which would include 51% attacks. A 51% attack was even warned about in the 2008 paper that introduced the concept of cryptocurrencies. And the well-known connection between cryptocurrencies and illicit transactions may further support the claim that investors are assuming the risk of a 51% attack.

Antitrust legislation such as 15 USC § 1 could potentially be used to prosecute a 51% attack since it would require collusion between the people performing the attack. A wire fraud statute such as 18 USC § 1343 is another potential avenue for criminal liability since the perpetrators could be interpreted to have devised a scheme to obtain the property of others through fraudulent pretenses. Finally, fraud statutes could potentially provide criminal liability. Under 18 USC § 1341 Frauds and Swindles Act, depriving someone of the “intangible right to honest services” is included. Since Bitcoin is sometimes used to purchase goods and services, this definition might be met due to vendors who have accepted Bitcoin for honest services and then had those Bitcoins deleted in the attack.

Traditional theft statutes are another potential avenue for criminal liability. For example, 10 USC § 921 Art. 121 Larceny and Wrongful Appropriation Act states that:

Any person subject to this chapter who wrongfully takes, obtains, or withholds, by any means, from the possession of the owner or of any other person any . . . personal property . . . with intent permanently to deprive or defraud another person of the use and benefit of the property or to appropriate it to his own use or the use of any person other than the owner, steals that property and is guilty of larceny.

Cryptocurrencies are likely considered personal property, and the victims of a 51% attack have been permanently deprived of the cryptocurrency, but it is still unclear if a 51% attack would violate this statute due to the “wrongfully” requirement. Again, this hinges on whether cryptocurrency investors are considered to have assumed the risk of such attacks when they buy into a system based on blockchain technology which, by its very function, results in the possibility of a 51% attack.

Conclusion

As this essay demonstrates—and is more thoroughly demonstrated in the full article—existing statutes are not designed with a 51% attack in mind. Because of the onerous burden placed on prosecutors (they must prove their case beyond a reasonable doubt and receive unanimous jury verdicts), prosecuting a 51% attack would be very difficult. This illuminates the importance of discussing the matter while it is merely a hypothetical consideration. The novel framework provided in this article will help inform prosecutors about the strengths and weaknesses of their options, legislators about the potential need for new legislation, and investors about the potential dangers of investing in cryptocurrencies.

Michael Conklin is the Powell Endowed Professor of Law in the Department of Accounting, Economics, and Finance at Angelo State University.

Brian Elzweig is an Associate Professor in the Department of Accounting and Finance of the University of West Florida.

Lawrence J. Trautman is an Associate Professor of Business Law and Ethics at Prairie View A&M University.

This post is adapted from their paper, “Legal Recourse for Victims of Blockchain and Cyber Breach Attacks,” available on SSRN.

Legal Liability of a 51%, Goldfinger Cryptocurrency Attack (2024)

FAQs

Legal Liability of a 51%, Goldfinger Cryptocurrency Attack? ›

While it may be argued that a 51% attack is an a artifice to defraud, it would not be a transaction connected to a swap or commodity sale, leaving it outside of the jurisdiction of prosecution by the CFTC

CFTC
The Commodity Futures Trading Commission (CFTC) is an independent agency of the US government created in 1974 that regulates the U.S. derivatives markets, which includes futures, swaps, and certain kinds of options.
https://en.wikipedia.org › wiki › Commodity_Futures_Trading...
. The Computer Fraud and Abuse Act has been proposed as a potential means for imposing liability.

What makes a 51% attack a security risk to a Cryptocurrency? ›

A 51% attack is an attack on a blockchain by an entity or group that controls more than 50% of the network. Attackers with majority network control can interrupt the recording of new blocks by preventing other miners from completing blocks.

Is a 51% attack legal? ›

There do not appear to be any laws that specifically prevent miners from seeking to control more than 50% of a network's computing power. However, acts that miners or mining groups take after gaining network control (the actual attacks) can create criminal liability.

What is the 51 rule in crypto? ›

A 51% attack is a potential threat to blockchain networks, where a group of miners may control more than 50% of the network's mining hash rate. This control may allow the attackers to prevent new transactions from gaining confirmations, halt payments, and even reverse transactions.

What is a 51 percent attack proof of stake? ›

Proof-of-Stake Security

Under PoW, a 51% attack occurs when an entity controls more than 50% of the miners in a network and uses that majority to alter the blockchain. In PoS, a group or individual would have to own 51% of the staked cryptocurrency.

What is the 51% rule in a blockchain system? ›

Put simply, a 51% attack occurs when a single entity or group of entities gains control over more than half of a blockchain network's mining power. This significant majority allows them to manipulate transaction history and potentially disrupt the entire network.

How likely is a 51% attack on Bitcoin? ›

So large blockchain networks such as Bitcoin (BTC -1.08%) and Ethereum (ETH -2.51%) have a low likelihood of a 51% attack being carried out against them. And, even if a single miner accumulated enough hash rate, the expense of trying to reverse past transactions would likely be too cost-prohibitive to carry out.

How can 51% attack be prevented? ›

Prevention of the 51% attack

Following are certain measures that mining networks follow to eradicate the 51% attacks: Cryptocurrencies using ASIC miners are enormously expensive to initiate and maintain. The growing energy requirement and maintenance costs may prevent it from such attacks.

What is an example of a 51 percent attack? ›

For example, to launch a 51% attack on the Bitcoin blockchain, an attacker would need control of the most powerful ASIC miners. The cost of this equipment alone would exceed $7.9 billion. This estimate does not include the ongoing costs of electricity and maintenance.

What is the research of the 51% attack based on blockchain? ›

As a potential security hazard in the payment field, 51% attack brings huge risks to the normal operation of the blockchain system. Miners with great computing power have the ability to monopolize the generation of blocks and modify the generated blocks.

What is the golden rule of crypto? ›

Investing in crypto, still a new and volatile asset class, follows many of the same rules as investing in other markets. The most important rule is never to invest more than you can afford to lose.

What is the 80 20 rule in crypto trading? ›

In trading, this means that approximately 80% of returns are expected to come from 20% of trades or trading strategies. Conversely, the remaining 80% of trades may only generate 20% of total returns.

What does it mean to have 51 stake? ›

Owning 51% of a company's shares means having a majority stake in the company, which gives you control over decision-making processes such as electing the board of directors and influencing major company decisions.

What is the solution to 51% attack? ›

On preventing 51% attacks

By always ensuring that no single miner, group of miners or a mining pool is controlling more than 50% of the Bitcoin network's computing power, a single miner or group wanting to attack the network will most likely not be able to outbuild the longest existing and validated blockchain.

How many cryptos are proof of stake? ›

There are currently about 80 different cryptocurrencies that use PoS as the consensus mechanism. Some of the most popular coins using proof of stake include: Cardano (ADA) Tron (TRX)

What is the monopoly problem in blockchain? ›

Now, if huge number of blocks in the blockchain goes to a single minor, then his minor has the ability to control the entire flow of transactions in the blockchain. So, this particular problem we call as the monopoly problem in bitcoin network. Page 13 (Refer Slide Time: 22:50) .

What are the security risks of cryptocurrency? ›

Threat: Malicious actors leverage sophisticated hacking techniques to infiltrate crypto wallets and steal private keys. Phishing scams prey on unsuspecting users, luring them into disclosing sensitive information through deceptive emails or messages.

Top Articles
Paypal
Best Type of Commercial Property to Invest In | Private Capital Investors
Forozdz
Vaya Timeclock
Shorthand: The Write Way to Speed Up Communication
Localfedex.com
Cvs Devoted Catalog
Ohiohealth Esource Employee Login
Pwc Transparency Report
Pwc Transparency Report
Po Box 35691 Canton Oh
DBZ Dokkan Battle Full-Power Tier List [All Cards Ranked]
Whitefish Bay Calendar
Craigslist West Valley
Lista trofeów | Jedi Upadły Zakon / Fallen Order - Star Wars Jedi Fallen Order - poradnik do gry | GRYOnline.pl
12 Top-Rated Things to Do in Muskegon, MI
[PDF] PDF - Education Update - Free Download PDF
Bòlèt Florida Midi 30
Obituaries Milwaukee Journal Sentinel
Disputes over ESPN, Disney and DirecTV go to the heart of TV's existential problems
Hdmovie2 Sbs
UCLA Study Abroad | International Education Office
Bolly2Tolly Maari 2
Penn State Service Management
Colin Donnell Lpsg
Stolen Touches Neva Altaj Read Online Free
Forager How-to Get Archaeology Items - Dino Egg, Anchor, Fossil, Frozen Relic, Frozen Squid, Kapala, Lava Eel, and More!
Beaver Saddle Ark
Arcane Odyssey Stat Reset Potion
Orangetheory Northville Michigan
How to Destroy Rule 34
Pinellas Fire Active Calls
Wisconsin Women's Volleyball Team Leaked Pictures
Rage Of Harrogath Bugged
Section 212 at MetLife Stadium
Metro Pcs Forest City Iowa
Jack In The Box Menu 2022
How Does The Common App Work? A Guide To The Common App
Lake Andes Buy Sell Trade
Sand Castle Parents Guide
Leland Nc Craigslist
Citizens Bank Park - Clio
My Eschedule Greatpeople Me
Deezy Jamaican Food
Hillsborough County Florida Recorder Of Deeds
The Pretty Kitty Tanglewood
Race Deepwoken
Sitka Alaska Craigslist
Mmastreams.com
Lira Galore Age, Wikipedia, Height, Husband, Boyfriend, Family, Biography, Net Worth
Taterz Salad
Used Curio Cabinets For Sale Near Me
Latest Posts
Article information

Author: Dean Jakubowski Ret

Last Updated:

Views: 6627

Rating: 5 / 5 (70 voted)

Reviews: 85% of readers found this page helpful

Author information

Name: Dean Jakubowski Ret

Birthday: 1996-05-10

Address: Apt. 425 4346 Santiago Islands, Shariside, AK 38830-1874

Phone: +96313309894162

Job: Legacy Sales Designer

Hobby: Baseball, Wood carving, Candle making, Jigsaw puzzles, Lacemaking, Parkour, Drawing

Introduction: My name is Dean Jakubowski Ret, I am a enthusiastic, friendly, homely, handsome, zealous, brainy, elegant person who loves writing and wants to share my knowledge and understanding with you.