Sybil Attack
An attack where one entity controls multiple identities to gain disproportionate influence in a decentralized system.
Last Updated
2026-03-29
Related Concepts
What is Sybil Attack?
A Sybil attack is a security exploit where one entity creates many fake identities to gain disproportionate control over a decentralized system. On a blockchain, new addresses cost nothing to create, making systems relying on identity counts vulnerable.
How does Sybil Attack work?
- An attacker creates hundreds or thousands of wallet addresses at near-zero cost.
- These fake identities simulate a large independent participant base.
- The attacker exploits them to claim multiple airdrops, vote many times, or overwhelm a peer-to-peer network.
Why does Sybil Attack matter?
It directly undermines the democratic principles of decentralized governance and fair token distribution. It forces systems to require proof of stake or proof of work making identity creation costly to remain secure.
Key features of Sybil Attack
- Exploits the zero cost of creating blockchain addresses
- Targets airdrops, governance votes, and validator sets
- Scalable attackers can spawn thousands of identities automatically
- Mitigated by requiring capital (PoS) or computation (PoW) per identity
Examples of Sybil Attack
Attackers created thousands of wallets to claim multiple allocations from protocol airdrops. In peer-to-peer networks, a Sybil attacker runs hundreds of nodes to isolate honest participants and feed them false data.
