Privacy Coin GRIN Is Victim of 51% Attack

A 51% attack occurs when a miner (or miners) acquires more than 50% of the network's mining hash power and takes control of the network.

AccessTimeIconNov 8, 2020 at 6:24 p.m. UTC
Updated Sep 14, 2021 at 10:28 a.m. UTC

Privacy-centric blockchain network Grin (GRIN) is undergoing a 51% attack, an event in which a miner (or miners) acquires more than 50% of the network's mining hash power and takes control, according to a notice at the bottom of the Grin protocol's website.  

  • According to 2miners.com, which is responsible for 19.1% of the current hash power on Grin, the unknown miner(s) grabbed control of 57.4% of the network's hash power.
  • While the attack is underway, the protocol is warning users to wait for extra confirmations on transactions for payment finality.
  • Grin, which was the first cryptocurrency to test privacy protocol MimbleWimble and drew an estimated $100 million in venture capital to mine it, was once called “Bitcoin 2.0.”
  • GRIN coins were down 2.23% to $0.235 at press time.

DISCLOSURE

Please note that our privacy policy, terms of use, cookies, and do not sell my personal information has been updated.

The leader in news and information on cryptocurrency, digital assets and the future of money, CoinDesk is a media outlet that strives for the highest journalistic standards and abides by a strict set of editorial policies. CoinDesk is an independent operating subsidiary of Digital Currency Group, which invests in cryptocurrencies and blockchain startups. As part of their compensation, certain CoinDesk employees, including editorial employees, may receive exposure to DCG equity in the form of stock appreciation rights, which vest over a multi-year period. CoinDesk journalists are not allowed to purchase stock outright in DCG.


Learn more about Consensus 2024, CoinDesk’s longest-running and most influential event that brings together all sides of crypto, blockchain and Web3. Head to consensus.coindesk.com to register and buy your pass now.


Read more about