On Sunday, rumors spread around the community that there had been a double-spend attack on Ethereum (available on Coinbase) Classic. The team behind the project immediately responded to the rumors, to ease investors.
There have been rumors of a possible chain reorganization or double spend attack.
From what we can tell the ETC network is operating normally.
BlockScout’s “Reorg” section shows nothing of the sort.https://t.co/Yi2cXusCz9 pic.twitter.com/HdUtS0DJZK
— Ethereum (available on Coinbase) Classic (@ETH_classic) January 6, 2019
Since Sunday, the Ethereum (available on Coinbase) Classic attack has been confirmed, and the culprit has fessed up. During the week, the devs behind the project asked exchanges and pools to significantly increase their ETC confirmation times. Many in the community felt the Ethereum (available on Coinbase) Classic team was trying to downplay the extent of the situation.
To be clear we are making no attempt to hide or downplay recent events.
Facts are facts and as the situation develops we’ll soon get a full picture of what actually took place.Linzhi is testing ASICS. Coinbase reported double spends; both may be true.
In time we will see. https://t.co/bbq6eqIoiS
— Ethereum (available on Coinbase) Classic (@ETH_classic) January 7, 2019
Ethereum (available on Coinbase) Classic Attack Uncovered
The devs behind the project have officially responded with all the information they’ve dug up on the matter and expanded it into two posts.
A community organized call was conducted to go over the main points regarding the recent attacks on ETC, analyze the community reaction, and diagnose possible solutions and next steps.
Post Mortem Meeting Ethereum (available on Coinbase) Classic ETC – Jan. 2019 Reorg Attacks https://t.co/EFvysXST9g
— Ethereum (available on Coinbase) Classic (@ETH_classic) January 10, 2019
The other post released most recently and can be seen below.
Attackers address has been flagged & shared with partners to prevent further attack on other exchanges. The identity of the attacker can finally be located if the relevant exchanges are willing to assist.
The analysis of ETC 51% attack from @SlowMist_Team https://t.co/HVFFxmoeTY
— Ethereum (available on Coinbase) Classic (@ETH_classic) January 10, 2019
Donald McIntyre wrote a long blog post via Medium regarding the attack and details of the ‘post mortem’ meeting. The blog post by MacIntyre covers the majority of the information on the attack, including the dates, amounts, and who was affected.
The double-spend attack occurred from January 5th to January 7th. The Ethereum (available on Coinbase) Classic attack included at least 15 double spend transactions that had at least 219,500 ETC stolen. Coinbase was the exchange that originally found the attack.