Study Finds Certain Proof of Stake Networks Vulnerable to Low Cost Attacks

- Advertisement -

On Jan. 22, a team of students from the University of Illinois at Urbana Champaign (UIUC) released a unique study concerning the longevity of certain proof of stake (PoS) networks. According to the research, more than 26 PoS blockchains could suffer from vulnerabilities called “Fake Stake” attacks.

Also read: Satoshi’s Bitcoin Whitepaper Is Now Available in Arabic and Hindi

Study Shows Proof of Stake Attacks That Are ‘Simple in Principle’

A team of researchers called Decentralized Systems Lab from UIUC has just released a study that identifies significant weaknesses in certain PoS networks. Sanket Kanjalkar, Yunqi Li, Yuguang Chen, Joseph Kuo, and Andrew Miller shared research which explains the issues threatening PoS cryptocurrencies. According to the students, an attacker with very little or no stake at all can wreak havoc on these types of networks. The researchers say one method of attack essentially causes a “victim node to crash by filling up its disk or RAM with bogus data.” The students are convinced all PoS currencies based on the UTXO of Bitcoin and the longest chain model are vulnerable to these “Fake Stake” attacks.

Study Finds Certain Proof of Stake Networks Vulnerable to Low Cost Attacks
“Given the amount of cross-pollination of ideas and code reuse across cryptocurrencies, we anticipate more vulnerabilities like this in the future — We found there was little uniformity in the security process among these codebases,” explains the latest study on PoS networks. “For example, there was no dedicated security contact for most of them.”

The students highlight five cryptocurrencies: Emercoin, Particl, Qtum, Htmlcoin, and Navcoin which could all theoretically suffer from a vulnerability called “I Can’t Believe it’s not Stake.” Because these coins have adopted Bitcoin’s block propagation method, a bogus message attack can overload a victim node’s RAM. The attacker doesn’t even need any stake to accomplish this method of attack. However, the student’s paper notes that RAM version attacks are still “particularly trivial.” The vulnerability was introduced to these networks when they merged Bitcoin’s “header-first” feature into the PoSv3 codebase. Another issue with PoS is a weakness called the “Spent Stake” attack, which can allow malicious actors to abuse the validation of apparent stake with a method called “stake amplification.”

- Advertisement -

“To carry out the attack starting from a small amount of stake, the attacker must amplify their amount of apparent stake,” the researchers explain. “For example, even with 0.01% stake in the system, the attacker only needs 5,000 transactions to mine blocks with 50% apparent stake power.”

The authors continue:

After the attacker has collected a large amount of apparent stake, he then proceeds to mine PoS blocks at a past time using the freshly collected apparent stake outputs. Finally, the attacker fills the disk of the victim peer with invalid blocks.

Proof of Stake Design Not Fully Understood by Developers Creating PoSv3 Networks

The UIUC researchers also note that they decided to responsibly disclose these issues to 15 teams that were most likely to be attacked out of all the PoS coins in the top 200 market capitalizations. The team explained that five teams had acknowledged the attacks, three teams started investigating the vulnerabilities, and three teams rebutted the issues. Four development teams did not respond at all to the responsible disclosure and the researchers also remarked that some programmers were very difficult to contact.

Study Finds Certain Proof of Stake Networks Vulnerable to Low Cost AttacksThe report concludes that because “Fake Stake” attacks are so easy, they fundamentally undermine the development team’s design. “Some ideas that make sense in proof-of-work (PoW) do not translate over securely to proof-of-stake — Given the high degree of code sharing from Bitcoin Core as ‘upstream’ among PoSv3 cryptocurrencies, we think this deserves even more scrutiny,” the paper concedes. When they investigated the feebleness tethered to PoS networks they found several projects that were “works-in-progress” and were in the midst of attempting to create mitigations for these known weaknesses.

“This suggests an awareness among PoS developers that the trade-offs and requirements in this design space are not yet fully understood,” the paper concludes.

What do you think about PoS coins that are vulnerable to “Fake Stake” attacks? Let us know what you think about this subject in the comments section below.


Image credits: Shutterstock, Pixabay, and the study “‘Fake Stake’ attacks on chain-based Proof-of-Stake cryptocurrencies.”


Bitcoin is cool, and you know everyone wants in – even the ones who say they don’t. Show the world how cutting-edge you are with a bitcoin T-shirt, hoodie, bag, key-ring, even a Trezor hardware wallet. Shipping all over the world, quality merchandise and, of course, a payment system that makes people say “wow!” 

Source

Previous Articles:

- Advertisement -

Latest News

Florida Stablecoin Regulatory Bill Passes Legislature

The Florida Senate has unanimously passed Senate Bill 314, a framework for regulating payment...

Bitcoin Falls to $68K After Failing to Break $74,000

Bitcoin fell to near $68,000 on March 7, 2026, after failing multiple times to...

Crypto exec: “Big banks tricked us” on stablecoin bill

A crypto executive argues that collaboration between community banks and crypto is essential for...

Investors Sue Kalshi Over Iran Leader Bet Resolution

Prediction market platform Kalshi is facing a class action lawsuit in California for its...

Meta Eyes Texas Data Center Site After OpenAI, Oracle Split

The collapse of a major AI data center expansion deal between Oracle and OpenAI...

Must Read

The Best Bitcoin Casinos of 2025: An Expert’s Data-Driven Guide

Key TakeawaysA Deep Dive into the Top Bitcoin Casinos of 2025Bitcoin Casino Comparison Table1. Stake.com: Best for Variety & Integrated Sports Betting2. BC.Game: Best...