Ethereum Classic Attack: Will Return Most Funds

On Sunday, rumors spread around the community that there had been a double-spend attack on Ethereum Classic. The team behind the project immediately responded to the rumors, to ease investors.

There have been rumors of a possible chain reorganization or double spend attack.

From what we can tell the ETC network is operating normally.

BlockScout's "Reorg" section shows nothing of the sort.

— Ethereum Classic (@eth_classic) January 6, 2019

Since Sunday, the Ethereum Classic attack has been confirmed, and the culprit has fessed up. During the week, the devs behind the project asked exchanges and pools to significantly increase their ETC confirmation times. Many in the community felt the Ethereum Classic team was trying to downplay the extent of the situation.

To be clear we are making no attempt to hide or downplay recent events.

Facts are facts and as the situation develops we'll soon get a full picture of what actually took place.
Linzhi is testing ASICS. Coinbase reported double spends; both may be true.

In time we will see.

— Ethereum Classic (@eth_classic) January 7, 2019

The devs behind the project have officially responded with all the information they’ve dug up on the matter and expanded it into two posts.

A community organized call was conducted to go over the main points regarding the recent attacks on ETC, analyze the community reaction, and diagnose possible solutions and next steps.

Post Mortem Meeting  Ethereum Classic ETC – Jan. 2019 Reorg Attacks

— Ethereum Classic (@eth_classic) January 10, 2019

The other post released most recently and can be seen below.

Attackers address has been flagged & shared with partners to prevent further attack on other exchanges. The identity of the attacker can finally be located if the relevant exchanges are willing to assist.

The analysis of ETC 51% attack from @SlowMist_Team

— Ethereum Classic (@eth_classic) January 10, 2019

Donald McIntyre wrote a long blog post via Medium regarding the attack and details of the ‘post mortem’ meeting. The blog post by MacIntyre covers the majority of the information on the attack, including the dates, amounts, and who was affected.

The double-spend attack occurred from January 5th to January 7th. The Ethereum Classic attack included at least 15 double spend transactions that had at least 219,500 ETC stolen. Coinbase was the exchange that originally found the attack.

>> TRON (TRX) Up Almost 50% This Week: What’s the Deal?

SlowMist, a team focusing on security of the blockchain identified the culprit addresses that originated from and Bitrue. has already confirmed it will cover 40K ETC losses for all of its users that had ETC stolen.

[ Research] confirms the ETC 51% attack.

4 of the 7 rollback transactions detected were created by the attacker; transferring 54,200 ETC in total.

Gate will be covering the 40k ETC loss for all of the users.

See details:

— Exchange (@gate_io) January 8, 2019

During the meeting, the team behind Ethereum Classic discussed how to prevent this from happening again and steps to take if it does occur. There was no monitoring system in place to alert the team of the double-spend, and the team has deemed this a top priority.

In addition, the devs behind Ethereum Classic have asked exchanges to increase their confirmation times on the digital token.

Featured Image: Depositphotos © akulamatiau

Wall Street Insider Reveals His Secret To Blockchain Investing

How Much Do You Know About Cryptocurrency

New Crypto Millionaires Are Created Everyday!

2018 Is The Year Crypto Currency Millionaires Are Made

Post a Comment
Your email address will not be published. Required fields are marked*