Cointime

Download App
iOS & Android

What Is a Sybil Attack?

Validated Project

Named after the protagonist of the 1973 book Sybil, which recounts the story of a young woman diagnosed with Disassociative Identity Disorder (DID), the concept of a Sybil attack was first defined by Microsoft researchers Biran Zill and John R. Douceur in the early 2000s.

In a Sybil attack, a single entity directly or indirectly controls a significant number of network nodes. The goal is to trick honest network participants into believing each node is a distinct and separate participant, when in reality a significant number of nodes are dishonestly controlled by a single attacker. 

Understanding Sybil Attacks

Sybil attacks aim to exploit and manipulate peer-to-peer networks—often open and decentralized blockchain networks—through multiple fake identities. In the context of Sybil attacks, “identities” can refer to a blockchain node, a social media account, a pseudoanonymous wallet address, or any other entity.  

A successfully executed Sybil attack requires creating and controlling a large number of pseudoanonymous entities to influence the network in a malicious manner. For blockchains, this can result in a 51% attack or transaction censorship. In a social media network, Sybil attacks can be used to disseminate misinformation and create a false sense of community consensus. 

There are two main types of Sybil attacks:

  • Direct Sybil Attacks: Malicious nodes influence the network by directly communicating with honest nodes to take control of decision-making processes, voting procedures, or consensus mechanisms.
  • Indirect Sybil Attacks: Malicious nodes or participants do not directly interact with honest nodes, but instead aim to silently leverage malicious nodes to artificially increase the reputation of particular nodes, alter a network’s topology, or isolate certain parts of the network.

The difference between direct and indirect Sybil attacks.

Vulnerabilities to Sybil Attacks

Sybil attacks are most relevant to networks defined by pseudoanonymous participation. Social media networks, blockchain networks, and other peer-to-peer networks are all vulnerable to Sybil attacks because pseudoanonymity is a feature—it is purposefully simple to operate multiple entities in the network.

Blockchain networks are particularly targeted for Sybil attacks because they represent high-value targets for attackers. If a Sybil attack is successfully performed, it often leads to the direct loss of user funds. In contrast, a successful Sybil attack on a social media network often results in the spread of targeted misinformation, false societal consensus, and user privacy breaches.

Examples of Sybil Attacks on Blockchain Networks

The dangers of Sybil attacks on blockchain networks are well documented, but poor security features have, and likely will continue to, lead to successful onchain Sybil attacks. 

Some prominent examples of Sybil attacks on blockchain networks include: 

Ethereum Classic

Ethereum Classic is a fork of the Ethereum blockchain that emerged in 2016 after the infamous Ethereum DAO hack. In August 2020, the Ethereum Classic blockchain was repeatedly struck by a 51% attack—a specific form of Sybil attack unique to blockchain networks—that resulted in multiple block reorganizations and millions in stolen funds.

Verge

Verge is a privacy-preserving blockchain network that uses a proof-of-work consensus mechanism similar to the Bitcoin Network. In 2021, the Verge blockchain experienced its third 51% attack, which resulted in a major block reorganization that rewrote more than 200 days of network transactions. 

Sybil Attack Prevention and Defense Mechanisms

Sybil attacks represent an interesting phenomenon for blockchain networks. While Sybil attacks are uniquely dangerous for blockchains (high-value target, pseudoanonymous participation), blockchains are also purpose-built to be resilient against them. 

Cryptoeconomic Security

One of the main innovations of the Bitcoin network, and the blockchain ecosystem at large, was the creation of cryptoeconomic security. Whether in a proof-of-work or proof-of-stake mechanism, requiring network participants to give proof of computational work or economic stake makes it economically or technically impractical for a single entity to directly control a majority of nodes, hashrate, or stake. 

Reputation Systems

Another countermeasure against Sybil attacks is to build reputation systems directly into the network. For example, delegated proof-of-stake networks rely on a group of known and reputable, but potentially pseudoanonymous, entities to perform the major functions of a blockchain. This limits, and often completely removes, the ability for a Sybil attacker to join and influence the network as multiple entities. Similarly, reputation systems that record a node’s trustworthiness based on its history and contributions make it difficult for a Sybil attacker to masquerade as multiple entities because the attacker must maintain and build up reputation and influence across many nodes over time

Identity Verification

All Sybil attacks depend on semi-permissionless and pseudoanonymous access to a network. The reason that the vast majority of networks don’t need to worry about Sybil attacks is because they are permissioned and participants are known. 

Thus, a very effective, but often unviable, protection mechanism against Sybil attacks for peer-to-peer networks is to validate node identities before they enter the network. While this doesn’t work for public blockchain networks that have been specifically designed to be permissionless while staying tamper-proof against Sybil attacks, it is nonetheless an incredibly effective defense against any form of Sybil attack—and may be used in the future alongside decentralized, privacy-preserving identity protocols

Conclusion

Sybil attacks are an ever-present threat to blockchain networks, but their architecture and impact are well-known and well-documented in the cybersecurity space. In fact, a core, net-new innovation of public blockchain networks is their ability to stay resilient against Sybil attacks while still maintaining an open and permissionless design. 

As blockchain technology and decentralized, peer-to-peer systems continue to evolve, so too will the strategies needed to defend against Sybil attacks, from new forms of digital identities to tailored consensus mechanisms. And that’s just one facet of protection in a sprawling ecosystem of not only blockchain networks but applications and other forms of mission-critical onchain infrastructure

Comments

All Comments

Recommended for you

  • Web3 social infrastructure UXLINK completes $5 million in financing

    Web3 social infrastructure UXLINK announced the completion of a new round of $5 million financing, led by SevenX Ventures, INCE Capital, and HashKey Capital. It is reported that UXLINK's total financing has now exceeded $15 million.

  • Chinese police bust underground bank using cryptocurrency for illegal currency conversion

    Chinese police have arrested six people for running an illegal currency conversion operation that used cryptocurrency to handle around $296 million. The operation was discovered by the Public Security Bureau of Panshi City, Jilin, and involved an "underground bank" that exploited the anonymity and ease of cross-border transfers offered by crypto. The operation used domestic accounts to receive and transfer funds, and exchanged between the yuan and South Korean won. The service was used by Korean purchasing agents, e-commerce firms, and import/export companies, among others.

  • Hong Kong Securities Regulatory Commission warns the public to beware of a suspicious asset investment product called "LENA Network"

    Hong Kong Securities and Futures Commission warned the public to be wary of a suspicious virtual asset investment product called "LENA Network". The product involves pledging and lending arrangements related to virtual assets, and claims to provide high returns to investors. This investment product has not been approved by the Securities and Futures Commission for sale to the Hong Kong public. The Securities and Futures Commission notes that the Hong Kong public can access information about the product and contact the product through the Internet. The Securities and Futures Commission advises against trusting those "too good to be true" investment opportunities and remaining vigilant when making investment decisions.

  • Hong Kong Securities and Futures Commission: The Anti-Money Laundering Ordinance applies to the virtual asset industry

    The "virtual currency to ETF" mechanism in Hong Kong has raised concerns about money laundering. The industry believes that the review difficulty, such as KYT (Know Your Token), is high. Some individuals with mainland backgrounds are trying to conduct small-scale "virtual currency to ETF" transactions, taking the opportunity to "whiten" their own holdings of ether and bitcoin through forms such as personal accounts. They have also deployed some virtual currencies to Hong Kong's virtual currency exchanges and will decide whether to increase capital in the future depending on the situation. When responding to relevant questions, the Hong Kong Securities and Futures Commission emphasized that in the operation of ETF products, every link in the entire virtual asset ecosystem, including fund companies, custodians, asset trading platforms, participating brokers, etc., must be licensed or recognized institutions and strictly comply with requirements such as asset custody, liquidity, valuation, information disclosure, and investor education. The "Anti-Money Laundering Ordinance" of the Securities and Futures Commission also stipulates that financial institutions and designated non-financial enterprises and industry personnel must comply with customer due diligence and record-keeping requirements, and relevant regulations apply to the virtual asset industry.

  • TON community member: Some TON wallets received virtual account NFTs starting with "888", which is a phishing project

    On May 13th, according to a member of the TON official community, a new NFT with a virtual number starting with "888" has been added to the TON wallet. However, the transaction fee for each transfer is as high as 1 TON, which is caused by the fishing project changing the Gas.

  • Swiss Crypto Bank Amina: Listing Ethereum as a Security Could Cause Many Crypto Teams to Exit the Space

    Swiss encrypted bank Amina stated in the latest "Cryptocurrency Market Monitoring" report that classifying Ethereum as a security could not only bring risks to the entire cryptocurrency market, but also lead to many cryptocurrency teams exiting the field. This determination could hinder the development of the cryptocurrency market and potentially reverse progress made over the years. In addition, the US SEC is likely to delay its decision on the status of Ethereum, putting the cryptocurrency asset in a "gray area".

  • Ethereum has about $48.05 million in on-chain loan liquidation quota around $2,778

    According to Defi Llama data, there is approximately $48.05 million in on-chain liquidation volume for Ethereum around $2,778.

  • SoftBank Group to invest 10 trillion yen in "AI revolution"

    SoftBank Group (SBG) Chairman and CEO Masayoshi Son's "AI revolution" has begun. SoftBank Group plans to expand its business into industries such as data centers, robots, and power generation using AI semiconductors as a breakthrough. The expected investment amount could reach up to 10 trillion yen (approximately RMB 464.09 billion). American companies such as Microsoft are also making huge investments in the AI field, indicating a trend of global tech giants entering this growing field. (Nikkei News)

  • Ethereum has about $48.05 million in on-chain loan liquidation quota around $2,778

    On May 13th, according to DefiLlama data, there is approximately $48.05 million in on-chain loan liquidation volume for Ethereum around $2778.

  • The Philippine central bank has approved the PHPC, a stablecoin pegged to the peso

    The Central Bank of the Philippines has approved a stablecoin called PHPC, which is pegged to the Philippine peso and aims to promote cost-effective remittances. It is backed by cash and equivalents held by Philippine banks and will initially be launched on the Coins.ph platform, with plans to expand to other platforms. PHPC will be the first retail stablecoin backed by the peso and will offer real-time trading 24/7.