As per the authority ZenCash blog, at approximately 2:43 UTC on June third, ZenCash turned into the objective of a 51% assault.
For the uninitiated, a 51% assault is the point at which a malicious individual or group takes control of a blockchain through getting more than half of the hashrate, taking into account the hacker(s) to take control of the network.
However, ZenCash’s group was prepared for a circumstance like this to happen.
The group immediately started an investigation on the hashrate circulation to affirm that it was, indeed, a 51% assault. While hash rates were being examined, different individuals from the ZenCash group all the while reached trades to build affirmation times to help relieve the danger of a twofold spend.
Once the investigation was done, the ZenCash group still found that there were twofold spent transactions. This implied the programmer, whoever it was, was allowed to spend their 19,000 ZenCash two times, viably multiplying the value of their ZenCash.
At current market esteems, more than 19,600 ZenCash which the programmer double spent is worth around $558,000, not a figure to laugh at.
ZenCash’s cost endured a shot in a coordinate relationship with the 51% assault. Soon after the hack, ZenCash was from $30 to $28 and still has not completely recouped despite the fact that the assault is over.
As indicated by the previously mentioned blog entry, ZenCash guaranteed that all client funds were sheltered and urged troubling financial specialists to contact trades if regarded important.
The blog also specified that the group is also working with the trade influenced by the double spend trying to make sense of who the programmer was;
The Zen group will keep observing the network and directing measurable investigation with the influenced trade. All data assembled will be given to the appropriate specialists.
Because of the expanding number of PoW blockchains, it has turned out to be progressively hard to secure each and every blockchain, as hashing power starts to spread meagerly on a few calculations.
Despite the fact that ZenCash is as yet a generally expansive cryptocurrency contrasted with a few, the hashing influence of ZenCash could even now assume control if enough cash gets tossed at the issue.
At the season of the hack, the ZenCash blockchain was using more than 58 MSols/s. In spite of the fact that this is as yet a respectable number, it is likely that the hackers leased a lot of hash control through an administration like NiceHash.
Seeing as the programmer escaped with over $550,000 worth of ZenCash subsequently, it is reasonable to expect that the assault cost not as much as the estimation of their ZenCash.
These kinds of attacks have turned out to be very normal over the previous month, with Verge, Bitcoin Gold, and Electroneum also falling suspect to this technique for assault. Because of these assaults, many of these coin’s qualities endured a substantial shot and still have not recouped.
Unless a network is secured by a preposterous measure of hashrate like Bitcoin, Ethereum, and ZCash it is troublesome for developers to completely secure a blockchain against a 51% assault.