World logo

Inscreva-se na newsletter da World

Seja o primeiro a saber sobre os conceitos, ideias e tecnologia por trás de um sistema econômico mais humano

Ao inserir o seu endereço de e-mail e clicar em "Inscrever-se", você consente em receber newsletters, comunicações de marketing e atualizações do ecossistema. Para mais detalhes sobre como processamos os seus dados pessoais, incluindo os seus direitos e como exercê-los, consulte o nosso Aviso de Privacidade.

World ID
World App
World Chain
Sobre a World
Espaços Principais da World
Blogs da World
Visão da World
Tecnologia World
World para Empresas
World para Desenvolvedores
Sobre a Orb
Encontre uma Orb
Operadores Individuais
Operadores da Comunidade
Operadores de Varejo
Whitepaper
Código Aberto
Privacidade
Central de Mídia
World Foundation
Centro de Aprendizado
Suporte
Perguntas Frequentes
Carreiras

X

WhatsApp

LinkedIn

Discord

Telegram

YouTube

Instagram

TikTok

Reddit

*A elegibilidade para tokens Worldcoin (WLD) é restrita com base na geografia, idade e outros fatores. O WLD não está disponível para distribuição via World App para pessoas, empresas ou organizações que sejam residentes, estejam localizadas ou incorporadas no Estado de Nova York ou outros territórios restritos. A World Assets, Ltd. e World Foundation não são responsáveis pela disponibilidade de WLDs em plataformas de terceiros, como exchanges centralizadas ou descentralizadas. Para detalhes, acesse: https://world.org/legal/user-terms-and-conditions. Produtos cripto podem ser altamente arriscados. Informações Importantes ao Usuário podem ser encontradas em https://world.org/risks.


™ 2026 World

Configurações de CookiesPolítica de CookiesAviso de PrivacidadePolítica de Marca ComercialSolicitações de DadosTermos do UsuárioRiscosAlertas da Comunidade
Centro de AprendizadoBlockchainWhat Is a Sybil Attack? A 101 Guide

What Is a Sybil Attack? A 101 Guide

24 de julho de 2023 ▪ 7 Minutos de Leitura
What is a Sybil attack? Types of Sybil attacks What can Sybil attacks accomplish?Defenses against Sybil attacksExamples of Sybil attacksNon-cryptoCryptoWrapping up

What is a Sybil attack? 

In computer science, a Sybil attack is a security breach that tricks an application into believing multiple sham accounts are genuine. Typically, Sybil attackers create countless fake accounts to corrupt a system. If successful, these attackers can manipulate a site to their advantage. 

Microsoft researchers Biran Zill and John R. Douceur are credited for defining the Sybil attack in the early 2000s. Zill chose the name "Sybil" in reference to the psychological case study of Sybil Dorsett in Flora Rheta Schreiber's book Sybil. Dorsett had dissociative identity disorder, which relates to how Sybil attacks involve a single entity that takes on "multiple identities."   

Types of Sybil attacks 

All Sybil attacks work by tricking honest nodes into believing multiple fake accounts are valid, but attackers don't always manipulate accounts directly. Instead, hackers rely on the following two ways (or one of these) to use a Sybil attack:

  • Direct attacks: With a direct Sybil attack, malicious nodes interact with legitimate accounts. Once enough honest nodes on the network verify these fake accounts, it becomes easy for an attacker to override or exercise power in a system.  
  • Indirect attacks: Unlike direct attacks, an indirect Sybil attack relies on intermediary accounts to spread false data. When these communication lines are corrupted, legitimate nodes are more vulnerable to the attacker's exploits. Since this technique doesn't involve direct interaction with other nodes, it's often harder to pinpoint who's responsible for this attack. 

What can Sybil attacks accomplish?

The ultimate goal of any Sybil attack is to take over a network, although not all Sybil attackers are interested in re-writing transactions for money. Here are a few potential reasons hackers use a Sybil attack strategy:

  • Block honest network participants: A successful Sybil attacker can use their influence to restrict access to valid users. Honest nodes may find it challenging to access a network once a Sybil attacker takes over. 
  • Re-write transactions: In many crypto attacks, hackers manipulate the blockchain's transaction data to reward themselves with free crypto. The attackers typically funnel this crypto into a wallet and try to quickly swap it for cash on centralized exchanges (CEXs) or decentralized exchanges (DEXs). 
  • Gain disproportionate voting power: Most proof-of-stake (PoS) blockchains and dApps (decentralized apps) have smart contract-based voting procedures, which makes them more prone to manipulation during a Sybil attack. If one entity controls more than 50% of the nodes on a blockchain, it can dictate the results of blockchain improvement proposals. 
  • Compromise user privacy: Bad actors may use Sybil attacks to track personal data like IP (internet protocol) addresses. This goal is prevalent on privacy-focused networks like Tor or anonymous crypto projects like Monero. 
  • Spam platform: On certain platforms, bad actors create accounts en-mass and continue to spin accounts when they’re banned. These banned accounts can do anything from scamming users to pushing foreign government agendas.

Defenses against Sybil attacks

Although completely eliminating the risk of Sybil attacks is difficult, there are a few ways networks can increase their Sybil resistance: 

  • WorldID and Zero Knowledge: Worldcoin has developed a new eye-scanning technology called the Orb to reduce the incidence of Sybil attacks. Using this WorldID system, we can verify there’s a unique individual behind crypto wallets and other web addresses without collecting personal information. Since this verification doesn’t require KYC verification, it’s sometimes called “zero knowledge proof.” 
  • Algorithmic detection: Computer scientists and blockchain developers have been working on algorithms that constantly monitor Sybil nodes in P2P networks. Often, these algorithms look for behaviors that deviate from the standard operations. If these algorithms sense issues, they may issue a warning or automatically implement safeguards.
  • KYC requirements: Short for know-your-customer, KYC is a set of ID requirements that link an account with a specific person or business. Requiring users undergo KYC can be a strong defense against Sybil attacks.
  • Proof-of-personhood (PoP) authentication: Like KYC, PoP tests help verify a unique individual is behind each node on a P2P network. Instead of requiring sensitive ID information, a PoP test uses AI technologies to screen out robots. Users may have to solve a Captcha puzzle or scan a QR code before interacting with other nodes. 
  • Create node ranking systems: Some P2P networks may give nodes with a strong reputation in the community greater authority over a protocol. While this concentrates a network’s power into a few hands, it also makes it easier for these nodes to kick out potential Sybil nodes. Also, since it takes more time and investment to become a high-ranking node, it's less cost-effective for Sybil attackers to bother with these P2P sites. VeChain is one example of a cryptocurrency that uses a proof-of-authority algorithm. 

Examples of Sybil attacks

Fortunately, at the time of writing, major blockchains like Bitcoin and Ethereum have never experienced Sybil blockchain attacks, but here are a few of the many examples of this phenomenon in the crypto ecosystem: 

Non-crypto

  • Russian bot attacks: According to intelligence experts in the U.S. government, Russia might have used Sybil attacks during the 2016 election. Allegedly, the Russian government employed “bot farms” to spread political info on American social media sites. The increase in these polarizing posts on social media may have been used to influence voter opinions.
  • Twitter bots: Even before Elon Musk bought Twitter, there has been speculation over how many user accounts are genuine. According to Twitter’s official press release, about 5% of user activity could be associated with bots. However, Elon Musk believes as much as 20% of Twitter accounts could be related to Sybil attacks. 
  • Potential video game scams: Researchers have discovered certain video game products like augmented reality headsets can be vulnerable to Sybil attackers. New games that use metaverse networks may be especially prone to Sybil scams due to their open-source codes. Video game sites like Discord are also susceptible to bot scams like Twitter. 
  • Distributed denial-of-service (DDoS) attack: DDoS attacks could be considered a Sybil attack since both involve flooding a server with artificial traffic. In a DDoS attack, hackers try to compromise a website or internet protocol by suddenly increasing regular traffic. DDoS attackers often use bots and compromised nodes to take over a server. 

Crypto

  • Monero Sybil attack of 2020: As the largest privacy-focused cryptocurrency, Monero (XMR) is a prime target for hackers interested in interfering with user anonymity. In 2020, the Monero team revealed a Sybil attacker attempted to override the network and link IP addresses with transaction data. However, it appears Monero's privacy algorithms mitigated most of the damage from this attack. 
  • Sybil attack on Verge in 2021: Like Monero, Verge (XVG) is a privacy cryptocurrency. In 2021, a Sybil attacker successfully spoofed Verge's blockchain and deleted 200 days of XVG transaction data. 
  • Ethereum Classic 51% attacks in 2020: Ethereum Classic (ETC) was the original PoW Ethereum chain before the DAO hack of 2016. In this attack, hackers exploited smart contract bugs on Ethereum’s first DAO to drain roughly $60 million. In response, developers decided to create a “new” Ethereum (today’s ETH) to reimburse DAO investors. Those who didn’t agree with creating another Ethereum chain kept running the original ETC network. Throughout its history, ETC has suffered many 51% attacks. In 2020, ETC hackers successfully stole millions of dollars worth of ETC coins. Alternatively, a Sybil attacker reorganized ETC blockchain transactions and stole roughly $5.6 million worth of ETC.  
  • Sybil attack on Tor in 2014: Although the privacy-focused Tor network isn't a blockchain, many prominent crypto projects use this open-source protocol, for example Web3-focused Brave Browser has Tor integrations. In 2014, the Tor Network fell victim to a Sybil attack that introduced more than 100 malicious nodes at the critical entry level. Tor developers contained this issue in July 2014, but the hack compromised the personal information of thousands of users. 

Wrapping up

As networks like Bitcoin grow more decentralized, it's less likely a Sybil attack will impact large cryptocurrencies with a strong community. But that doesn't mean the crypto ecosystem is not at risk. All crypto projects must have their guard up when it comes to Sybil attacks to avoid severe data breaches. 

At Worldcoin, we aim to resolve the issue of Sybil attacks in crypto with our revolutionary Orb technology. This eye-scanning device can verify there's a person behind a crypto address while maintaining their privacy and anonymity. This way, honest nodes can operate in Web3 without giving away their personal information. Subscribe to our YouTube channel to learn more.

Junte-se à rede de humanos reais.

Baixe o World App

Related resources

Crypto Bridge Hacks 101: Types and Causes

Bridges help Web3 users transfer crypto between blockchains, but they're a major target for hackers. Here’s what you need to know about crypto bridge hacks.

What Is Crypto Mining?

Crypto mining is a complex subject and sometimes controversial. Learn what it’s all about and how it works.

Ethereum 2.0: What Was the Merge?

Many Web3 developers claim Ethereum's Merge is the most significant upgrade in crypto history. So what was the Merge?

What Is a Smart Contract?

Wondering what is a smart contract? Read all about smart contracts and learn how they keep the crypto world transparent and reliable in this definitive guide.