[FULL DISCLOSURE]: Replacement Cycling Attacks on Attacks on Bitcoin Miners Block Templates

Posted by David A. Harding

Jan 27, 2025/22:17 UTC

Dave's inquiry sheds light on a specific security concern within Bitcoin transactions, particularly focusing on an attack scenario involving fee bumping. The described attack unfolds as follows: initially, a user named Alice broadcasts a transaction to the network. Subsequently, an adversary referred to as Mallet engages in an action known as "pinning," effectively targeting Alice's transaction. Unaware of being pinned, Alice attempts to increase her transaction's fee, a process commonly known as fee bumping, aiming to accelerate its confirmation by the network. However, due to the pinning, this fee bump does not disseminate across the network as intended. Despite this, Mallet is able to receive the updated transaction with the increased fee. Leveraging this, Mallet then mines the transaction with the bumped fee, securing the higher fee for themselves. This outcome not only benefits Mallet at the expense of other miners who remain oblivious to the fee bump but also highlights a nuanced vulnerability in how transactions and their modifications are propagated and mined within the Bitcoin ecosystem. This interaction underscores the need for continued vigilance and potential protocol adjustments to safeguard against such exploitative tactics.

Link to Raw Post
Bitcoin Logo

TLDR

Join Our Newsletter

We’ll email you summaries of the latest discussions from authoritative bitcoin sources, like bitcoin-dev, lightning-dev, and Delving Bitcoin.

Explore all Products

ChatBTC imageBitcoin searchBitcoin TranscriptsSaving SatoshiBitcoin Transcripts Review
Built with 🧡 by the Bitcoin Dev Project
View our public visitor count

We'd love to hear your feedback on this project?

Give Feedback