A Sybil attack is a security exploit targeting peer-to-peer (P2P) and decentralized networks, where a single malicious actor creates and operates multiple fake identities or nodes to gain disproportionate influence. The term applies broadly to any online system without central identity verification but is especially relevant to public blockchain networks, where consensus integrity depends on the assumption that most participants are honest.
The name comes from a 1973 book titled Sybil, which documented the treatment of Shirley Ardell Mason, diagnosed with dissociative identity disorder (then called multiple personality disorder). The parallel is deliberate: just as the book's subject showed multiple distinct personalities, an attacker using this method presents multiple distinct identities to deceive a network.
Computer programmer Brian Zill coined the term while working at Microsoft Research in the early 2000s. Fellow researcher John R. Douceur formalized the concept in a widely cited paper published around the same time. Douceur's paper argued that Sybil attacks pose a fundamental challenge to any practical P2P system without a central authority, a conclusion still applicable to decentralized blockchains today.
In a blockchain network, a node is a computer that stores a full or partial copy of the ledger and validates transactions. The security model of most public blockchains relies on the idea that no single actor controls a majority of nodes. A Sybil attacker undermines this by running many fraudulent nodes simultaneously, each appearing as an independent participant.
Once enough malicious nodes are introduced, the attacker can use their combined influence to outvote honest nodes on protocol decisions, interfere with transaction validation, or intercept and analyze network traffic to extract sensitive data like user IP addresses. The most damaging goal is typically a 51% attack, where the attacker gains more than half of the network's computing or staking power. At that point, the attacker can reorder or block transactions and execute double spends, spending the same cryptocurrency twice by reversing a recorded transaction.
Sybil attacks are not limited to blockchains. The same mechanism can be used to manipulate online voting systems, flood social media platforms with coordinated fake accounts to spread misinformation, or distribute malicious links through seemingly independent identities.
One foundational property of a blockchain is finality, the principle that a confirmed transaction cannot be altered or reversed. Finality makes blockchain records trustworthy and prevents double spending in cryptocurrency payments while ensuring smart contract outcomes are irreversible.
A successful Sybil attack directly threatens finality. By controlling a majority of nodes, an attacker can rewrite parts of the chain, block transactions from being confirmed, or roll back settled ones. Beyond finality, such an attack can compromise user privacy by linking network activity to real-world identities, undermining the anonymity some blockchain protocols aim to provide.
In November 2020, the Monero network, a privacy-focused blockchain for untraceable transactions, sustained a Sybil attack lasting about ten days. The attacker aimed to deanonymize transactions by exploiting a protocol bug that increased the chance of malicious nodes joining the network. The attacker caused transactions to fail and tried to link IP addresses to users. Monero's privacy protocol, Dandelion++, prevented these links, limiting the attack's impact.
Ethereum Classic is the original Ethereum chain that continued under its own name after the main Ethereum network hard forked in 2016 following a major exploit of the first DAO. In summer 2020, Ethereum Classic suffered one of the most costly Sybil-enabled 51% attacks on record. The attacker gained majority control of the network's hash rate and executed a complex double spend, routing funds through exchanges while reversing those transactions. Losses exceeded $5 million in ETC.
In 2021, the Verge blockchain suffered a 51% attack that erased about 200 days of transaction history. Despite the breach's severity, the network recovered operationally within a short time after the incident.
Consensus mechanisms are the main technical barrier against Sybil attacks. By attaching real-world costs to participation, they make it too expensive for an attacker to create many valid identities.
Proof of Work (PoW), used by Bitcoin, requires nodes to perform computationally intensive calculations to produce new blocks. An attacker cannot create fake identities without providing the computing hardware to back them, which requires significant capital and energy costs. The large number of miners on big PoW networks further dilutes any single actor's share.
Proof of Stake (PoS), used by Ethereum, ties participation to locked collateral. Ethereum requires node operators to stake 32 ETH as a security deposit. Fraud triggers slashing, where the offending node's staked funds are partially or fully destroyed. The financial barrier and penalty together make large-scale node manipulation costly.
Delegated Proof of Stake (DPoS), used by networks like EOS and Tron, adds a layer of community governance. A small group of trusted delegates, elected by token holders, produce blocks. Delegates have strong incentives to act honestly since misbehavior can cost them their status and rewards.
Proof of Personhood (PoP) verifies that each node is operated by a unique real-world individual. Methods include CAPTCHA verification, QR code scanning, and biometric checks. For example, Worldcoin uses iris scanning for personhood verification. Know Your Customer (KYC) procedures, requiring government-issued ID, serve a similar role in regulated contexts.
Beyond consensus defenses, networks can deploy reputation-based systems (sometimes called Proof of Authority), where nodes gain credibility over time and new identities carry less weight. Social trust graphs and anomaly detection algorithms help identify clusters of nodes showing coordinated, outlier behavior typical of a Sybil attack.