Home
/
Cryptocurrency news
/
Latest updates
/

Qubic's ongoing 51% attack: examining the incentive problem

Qubic's 51% Attack on Monero | Community Split Over Solutions

By

Marco Giordano

Aug 12, 2025, 10:39 AM

Edited By

Marco Rossi

Updated

Aug 13, 2025, 06:38 PM

2 minutes estimated to read

Illustration of a computer network showing a 51% attack on Monero, with symbols of CPU mining and security concerns.

A rising storm in the crypto community as Qubic's ongoing 51% attack on Monero raises serious concerns about mining incentives. The community appears divided on how best to address this urgent threat.

Unpacking the Attack

The 51% attack targets Monero’s RandomX proof-of-work function, allowing almost anyone with a standard CPU to easily mine. Voices in the community argue, "If there are two blocks at the same height, the biggest one should be the valid one." This creates confusion and potential challenges in validating transactions during the attack.

Many worry that attackers could fill blocks with their own transactions, obscuring the differentiation between genuine and fake activity, particularly due to Monero's privacy features. A user emphasized, "They can stuff them with fake transactions, and we won’t even know."

High Stakes and Low Risks

Economics play a crucial role in the attack. Unlike Bitcoin miners who invest heavily in specialized hardware, Monero miners face minimal financial repercussions. "It's more profitable to attack a network than to secure it," a commenter noted. This statement captures the stark reality of the situation: miners can profit by attacking, with little to lose.

Solutions in the Spotlight

The community is split, with some advocating for an ASIC-friendly algorithm while others firmly oppose compromising decentralization. One user stated, "It's just a values issue. If someone values another project over Monero, they can easily destroy it with their hardware."

Meanwhile, others suggest innovative strategies. Merged mining continues to come up as a potential solution, though it requires intricate cooperation with other cryptocurrencies. A user expressed concern about miners considering alternative methods. "Encouraging more people to install GUPAX and mine on p2pool could help mitigate the attack's impact, especially as empty blocks are slowing the network," they argued.

Key Takeaways

  • βš”οΈ Economic Incentives: The attack demonstrates how vulnerable Monero is due to low barriers for entry in CPU mining.

  • πŸ“‰ Community Division: Opinions are polarized on retaining RandomX or shifting to ASIC-friendly methods.

  • 🌐 Collaborative Solutions: Merged mining is on the table, yet it requires substantial coordination with other coins.

"If Qubic continues its attack, we may have to change the proof of work function," cautioned one concerned user.

As pressure mounts, Monero may need to reevaluate its mining structure to address these pressing issues.

Will Monero Endure?

There’s no clear path ahead; community members predict a 60% chance that merged mining could bolster security. Conversely, a 40% chance looms over the possibility of adopting a more ASIC-friendly model. This choice might be essential for Monero’s future but could also conflict with its founding principles.