Legal Liability of a 51%, Goldfinger Cryptocurrency Attack (2024)

Introduction

With a market cap of over $1 trillion, cryptocurrencies have quickly gone from an obscure novelty to an alternative currency juggernaut. The recent collapse of FTX, related entities, and others in the crypto ecosystem has drawn heightened attention to this important technology. Cryptocurrencies are decentralized digital currencies; cryptocurrencies also rely on the blockchain, described as “a distributed, shared, [virtual,] encrypted-database that serves as an irreversible and incorruptible public repository of information. It enables, for the first time, unrelated people to reach consensus on the occurrence of a particular transaction or event without the need for a controlling authority.”

The decentralized nature of the blockchain means it relies on a consensus of the network’s mining hash rate to maintain the blockchain accurately. This structure also means that if users who control more than 50% of the mining power collude, they could agree to alter the blockchain, which, if the majority desired, could result in massive cryptocurrency transfers. Pulling off such an attack would be difficult, especially with the larger currencies such as Bitcoin and Ether, but a successful attack could result in thousands of victims losing millions of dollars worth of cryptocurrency.

Legal Recourse

Currently, no criminal or civil statutes explicitly punish a 51% attack. Moreover, the novel, complex, and unregulated nature of blockchain technologies means that existing case law and statutes—largely created to address the theft of physical objects—lead to great uncertainty regarding potential criminal liability.

The two main cryptocurrencies, Bitcoin and Ether, are likely not considered a security for purposes of SEC regulation because they are transacted on decentralized autonomous platforms. Even if they were, it would be difficult for the SEC to prosecute a 51% attack. One could argue for potential liability under 15 USC § 78i Manipulation of Security Prices, but the statute explicitly applies only to the purchase, sell, or securities swap conducted to manipulate the price. A 51% attack does not directly manipulate the cryptocurrency’s price; it redistributes existing cryptocoins. Also, it is not the result of buying, selling, or swapping the asset. Furthermore, the SEC is well aware of 51% attacks and has yet to pass any guidance on prosecuting such an occurrence. While not dispositive, this supports the position that the SEC would not have the power to prosecute a 51% attack.

The CFTC and federal courts have both found that cybercurrencies are commodities that are subject to the Commodity Exchange Act (CEA). Similar to the SEC, although the CFTC is aware of 51 % attacks, it has not passed any guidance regrading enforcement of those attacks. CEA section 6(c)(1) and CFTC Regulation 180.1(a), the broad fraud provisions of the CEA, only apply to transactions in connection with swaps, or contracts of sale or of future sale of commodities. While it may be argued that a 51% attack is an a artifice to defraud, it would not be a transaction connected to a swap or commodity sale, leaving it outside of the jurisdiction of prosecution by the CFTC.

The Computer Fraud and Abuse Act has been proposed as a potential means for imposing liability. The statute punishes anyone who “knowingly causes the transmission of a program, information, code, or command, and as a result of such conduct, intentionally causes damage without authorization, to a protected computer.” The statute defines “damage” as “any impairment to the integrity or availability of data, a program, a system, or information.” A 51% attack alters the blockchain data, but the deleted data would still be “available” because the attack would not delete every blockchain record. The statute also requires that the crime be committed “without authorization.” This may appear to be fatal since the attackers do have authorized access to the blockchain; however, the majority rule is that “without authorization” modifies “intentionally causes damage” and does not modify accessing the computer (or, here, the blockchain). Therefore, a prosecutor, under the majority view, could allege that the malicious manipulation of the blockchain was unauthorized.

This brings us to perhaps the most important and ambiguous issue of cryptocurrency ownership. Is cryptocurrency ownership based on possession of the private key or based on the blockchain consensus? If it is simply the blockchain consensus, then it could be argued that cryptocurrency owners implicitly consent to any blockchain alterations made possible by the structure of the blockchain, which would include 51% attacks. A 51% attack was even warned about in the 2008 paper that introduced the concept of cryptocurrencies. And the well-known connection between cryptocurrencies and illicit transactions may further support the claim that investors are assuming the risk of a 51% attack.

Antitrust legislation such as 15 USC § 1 could potentially be used to prosecute a 51% attack since it would require collusion between the people performing the attack. A wire fraud statute such as 18 USC § 1343 is another potential avenue for criminal liability since the perpetrators could be interpreted to have devised a scheme to obtain the property of others through fraudulent pretenses. Finally, fraud statutes could potentially provide criminal liability. Under 18 USC § 1341 Frauds and Swindles Act, depriving someone of the “intangible right to honest services” is included. Since Bitcoin is sometimes used to purchase goods and services, this definition might be met due to vendors who have accepted Bitcoin for honest services and then had those Bitcoins deleted in the attack.

Traditional theft statutes are another potential avenue for criminal liability. For example, 10 USC § 921 Art. 121 Larceny and Wrongful Appropriation Act states that:

Any person subject to this chapter who wrongfully takes, obtains, or withholds, by any means, from the possession of the owner or of any other person any . . . personal property . . . with intent permanently to deprive or defraud another person of the use and benefit of the property or to appropriate it to his own use or the use of any person other than the owner, steals that property and is guilty of larceny.

Cryptocurrencies are likely considered personal property, and the victims of a 51% attack have been permanently deprived of the cryptocurrency, but it is still unclear if a 51% attack would violate this statute due to the “wrongfully” requirement. Again, this hinges on whether cryptocurrency investors are considered to have assumed the risk of such attacks when they buy into a system based on blockchain technology which, by its very function, results in the possibility of a 51% attack.

Conclusion

As this essay demonstrates—and is more thoroughly demonstrated in the full article—existing statutes are not designed with a 51% attack in mind. Because of the onerous burden placed on prosecutors (they must prove their case beyond a reasonable doubt and receive unanimous jury verdicts), prosecuting a 51% attack would be very difficult. This illuminates the importance of discussing the matter while it is merely a hypothetical consideration. The novel framework provided in this article will help inform prosecutors about the strengths and weaknesses of their options, legislators about the potential need for new legislation, and investors about the potential dangers of investing in cryptocurrencies.

Michael Conklin is the Powell Endowed Professor of Law in the Department of Accounting, Economics, and Finance at Angelo State University.

Brian Elzweig is an Associate Professor in the Department of Accounting and Finance of the University of West Florida.

Lawrence J. Trautman is an Associate Professor of Business Law and Ethics at Prairie View A&M University.

This post is adapted from their paper, “Legal Recourse for Victims of Blockchain and Cyber Breach Attacks,” available on SSRN.

Legal Liability of a 51%, Goldfinger Cryptocurrency Attack (2024)

FAQs

Legal Liability of a 51%, Goldfinger Cryptocurrency Attack? ›

While it may be argued that a 51% attack is an a artifice to defraud, it would not be a transaction connected to a swap or commodity sale, leaving it outside of the jurisdiction of prosecution by the CFTC

CFTC
The Commodity Futures Trading Commission (CFTC) is an independent agency of the US government created in 1974 that regulates the U.S. derivatives markets, which includes futures, swaps, and certain kinds of options.
https://en.wikipedia.org › wiki › Commodity_Futures_Trading...
. The Computer Fraud and Abuse Act has been proposed as a potential means for imposing liability.

What makes a 51% attack a security risk to a Cryptocurrency? ›

A 51% attack is an attack on a blockchain by an entity or group that controls more than 50% of the network. Attackers with majority network control can interrupt the recording of new blocks by preventing other miners from completing blocks.

Is a 51% attack legal? ›

There do not appear to be any laws that specifically prevent miners from seeking to control more than 50% of a network's computing power. However, acts that miners or mining groups take after gaining network control (the actual attacks) can create criminal liability.

What is the 51 rule in crypto? ›

A 51% attack is a potential threat to blockchain networks, where a group of miners may control more than 50% of the network's mining hash rate. This control may allow the attackers to prevent new transactions from gaining confirmations, halt payments, and even reverse transactions.

What is a 51 percent attack proof of stake? ›

Proof-of-Stake Security

Under PoW, a 51% attack occurs when an entity controls more than 50% of the miners in a network and uses that majority to alter the blockchain. In PoS, a group or individual would have to own 51% of the staked cryptocurrency.

What is the 51% rule in a blockchain system? ›

Put simply, a 51% attack occurs when a single entity or group of entities gains control over more than half of a blockchain network's mining power. This significant majority allows them to manipulate transaction history and potentially disrupt the entire network.

How likely is a 51% attack on Bitcoin? ›

So large blockchain networks such as Bitcoin (BTC -1.08%) and Ethereum (ETH -2.51%) have a low likelihood of a 51% attack being carried out against them. And, even if a single miner accumulated enough hash rate, the expense of trying to reverse past transactions would likely be too cost-prohibitive to carry out.

How can 51% attack be prevented? ›

Prevention of the 51% attack

Following are certain measures that mining networks follow to eradicate the 51% attacks: Cryptocurrencies using ASIC miners are enormously expensive to initiate and maintain. The growing energy requirement and maintenance costs may prevent it from such attacks.

What is an example of a 51 percent attack? ›

For example, to launch a 51% attack on the Bitcoin blockchain, an attacker would need control of the most powerful ASIC miners. The cost of this equipment alone would exceed $7.9 billion. This estimate does not include the ongoing costs of electricity and maintenance.

What is the research of the 51% attack based on blockchain? ›

As a potential security hazard in the payment field, 51% attack brings huge risks to the normal operation of the blockchain system. Miners with great computing power have the ability to monopolize the generation of blocks and modify the generated blocks.

What is the golden rule of crypto? ›

Investing in crypto, still a new and volatile asset class, follows many of the same rules as investing in other markets. The most important rule is never to invest more than you can afford to lose.

What is the 80 20 rule in crypto trading? ›

In trading, this means that approximately 80% of returns are expected to come from 20% of trades or trading strategies. Conversely, the remaining 80% of trades may only generate 20% of total returns.

What does it mean to have 51 stake? ›

Owning 51% of a company's shares means having a majority stake in the company, which gives you control over decision-making processes such as electing the board of directors and influencing major company decisions.

What is the solution to 51% attack? ›

On preventing 51% attacks

By always ensuring that no single miner, group of miners or a mining pool is controlling more than 50% of the Bitcoin network's computing power, a single miner or group wanting to attack the network will most likely not be able to outbuild the longest existing and validated blockchain.

How many cryptos are proof of stake? ›

There are currently about 80 different cryptocurrencies that use PoS as the consensus mechanism. Some of the most popular coins using proof of stake include: Cardano (ADA) Tron (TRX)

What is the monopoly problem in blockchain? ›

Now, if huge number of blocks in the blockchain goes to a single minor, then his minor has the ability to control the entire flow of transactions in the blockchain. So, this particular problem we call as the monopoly problem in bitcoin network. Page 13 (Refer Slide Time: 22:50) .

What are the security risks of cryptocurrency? ›

Threat: Malicious actors leverage sophisticated hacking techniques to infiltrate crypto wallets and steal private keys. Phishing scams prey on unsuspecting users, luring them into disclosing sensitive information through deceptive emails or messages.

Top Articles
Microsoft Office LTSC 2024 preview available for Windows, Mac
Tools of Financial Analysis: Common Size Statements, Trend Analysis etc.
Woodward Avenue (M-1) - Automotive Heritage Trail - National Scenic Byway Foundation
Gamevault Agent
Retro Ride Teardrop
Poplar | Genus, Description, Major Species, & Facts
Www Movieswood Com
What Was D-Day Weegy
Little Rock Arkansas Craigslist
Cincinnati Bearcats roll to 66-13 win over Eastern Kentucky in season-opener
Winterset Rants And Raves
Keniakoop
Dumb Money
Colts seventh rotation of thin secondary raises concerns on roster evaluation
Fairy Liquid Near Me
7543460065
R Cwbt
U Break It Near Me
/Www.usps.com/International/Passports.htm
How many days until 12 December - Calendarr
Evil Dead Rise Showtimes Near Pelican Cinemas
THE FINALS Best Settings and Options Guide
Craigslist Dubuque Iowa Pets
Blackboard Login Pjc
Unable to receive sms verification codes
Cable Cove Whale Watching
Giantbodybuilder.com
Section 408 Allegiant Stadium
Sandals Travel Agent Login
Best Town Hall 11
Tu Housing Portal
Blush Bootcamp Olathe
Mark Ronchetti Daughters
RUB MASSAGE AUSTIN
Aliciabibs
The Best Restaurants in Dublin - The MICHELIN Guide
Sukihana Backshots
Armageddon Time Showtimes Near Cmx Daytona 12
Sand Castle Parents Guide
Anderson Tribute Center Hood River
Florida Lottery Claim Appointment
Shell Gas Stations Prices
Breaking down the Stafford trade
Interminable Rooms
Euro area international trade in goods surplus €21.2 bn
300+ Unique Hair Salon Names 2024
Blog Pch
Wrentham Outlets Hours Sunday
Renfield Showtimes Near Regal The Loop & Rpx
Jesus Calling Oct 6
Latest Posts
Article information

Author: Dean Jakubowski Ret

Last Updated:

Views: 6627

Rating: 5 / 5 (70 voted)

Reviews: 85% of readers found this page helpful

Author information

Name: Dean Jakubowski Ret

Birthday: 1996-05-10

Address: Apt. 425 4346 Santiago Islands, Shariside, AK 38830-1874

Phone: +96313309894162

Job: Legacy Sales Designer

Hobby: Baseball, Wood carving, Candle making, Jigsaw puzzles, Lacemaking, Parkour, Drawing

Introduction: My name is Dean Jakubowski Ret, I am a enthusiastic, friendly, homely, handsome, zealous, brainy, elegant person who loves writing and wants to share my knowledge and understanding with you.