Can Blockchain Be Hacked?

The blockchain protocol itself has never been successfully attacked on major chains. But smart contracts, bridges, and exchanges have lost billions. The question isn't whether blockchain can be hacked — it's which layer you're asking about.
Lewis Jackson
CEO and Founder

The honest answer splits on what you mean by "blockchain." The protocol layer of Bitcoin has never been successfully attacked in 16+ years of continuous operation. The ecosystem built on top of it has lost billions. These facts coexist because they're describing different things — and conflating them is what makes this question so hard to answer cleanly.

The crypto industry doesn't help. Evangelists say "blockchain is immutable and unbreakable." Skeptics point at a constant stream of exchange hacks and bridge exploits. Both are describing real events. They're just talking about different layers of the system.

The Protocol Layer vs. Everything Else

A blockchain's core security lives in its consensus mechanism — the rules by which nodes agree on which blocks are valid.

For Bitcoin, that's proof of work. To rewrite history, an attacker needs to redo all the computational work from the target block forward, faster than the honest network keeps extending the chain. At current hashrate, this requires roughly $10B+ in hardware plus sustained energy costs for even a temporary reorg. Not theoretically impossible. Economically irrational.

For Ethereum, proof of stake shifts the threat model. Disrupting finality requires controlling roughly 33% of staked ETH — around $20B at current prices. Actually finalizing invalid blocks requires 67%+. The ETH used in such an attack would be slashable, meaning the protocol destroys the attacker's capital as a direct consequence. That's a strong deterrent.

This is why the protocol layer of major chains has an impressive security track record: the cost of attacking it scales with how much value it secures.

But "blockchain" as a phrase has ballooned to mean an entire ecosystem. And that ecosystem has very different security properties.

Smart contracts are code deployed to the chain — permanently visible, sometimes with exploitable logic. The contract code is immutable once deployed, but bugs in that code aren't the blockchain's problem; they're the developer's. The 2022 Wormhole exploit ($320M), the 2022 Nomad bridge exploit ($190M), the 2016 DAO hack — smart contract vulnerabilities, not blockchain vulnerabilities. The underlying chains were functioning exactly as designed.

Bridges are the trust anchors connecting different chains. Their security is only as strong as their verification mechanism. Often, that's a small multisig — a group of validators who must sign off on cross-chain transactions. Ronin's $625M exploit in 2022 happened because 5 of 9 validator keys were compromised through social engineering, not because any blockchain's consensus was broken.

Exchanges are custodians holding user funds. When Mt. Gox lost 850,000 BTC, Bitcoin's chain was not hacked. The company's internal systems were compromised — a distinction that matters enormously for understanding what's actually at risk.

Frontends — the websites and apps through which you access protocols — are traditional web attack surfaces. DNS hijacking, compromised CDNs, phishing sites that mimic legitimate interfaces: these have routed users to malicious smart contract approvals that drain wallets. The blockchain processed exactly what the user (unknowingly) authorized.

Private keys sit at the root of self-custody. If an attacker gets your private key, the blockchain does what any authorized user would: processes the transaction. There's no protocol hack here — the security model was bypassed at the human layer.

Where the Hard Limits Actually Are

Two constraints bound protocol security in ways worth understanding explicitly.

First: the 51% threshold. If a mining or staking entity controls a majority of consensus power, they can rewrite recent history and execute double-spends. This has happened on smaller chains — Ethereum Classic suffered three separate 51% attacks in 2019; Bitcoin Gold and Bitcoin SV have both been targeted. These are real chains with real users and real losses.

The economic logic matters here: 51% attacks are only rational when the cost of acquiring the necessary hashrate or stake is lower than the profit from double-spending. For large chains with enormous security budgets, this threshold is prohibitively expensive. For small chains, it isn't. Chain size isn't cosmetic — it's security.

Second: security doesn't inherit upward. Layer-1 consensus working correctly does nothing to guarantee the security of smart contracts, bridges, or applications built on top of it. Ethereum's validators reaching consensus correctly doesn't prevent a poorly-written lending protocol from being drained. These are separate security domains with separate guarantees.

What's Changing

The line between protocol security and application security is becoming sharper as tooling matures.

Formal verification — mathematically proving that smart contract code behaves correctly across all possible inputs — is moving from research to production. Tools like Certora and Halmos allow developers to prove invariants hold before deployment, not just test for them. This doesn't eliminate bugs, but it narrows the gap between "audited" and "proven safe."

ZK-proof bridges represent a structural improvement in the weakest link. Instead of trusting a multisig validator set, ZK bridges verify cross-chain transactions cryptographically — the math does the attesting, not the validators. If the proof system is sound (a non-trivial assumption that requires ongoing research), validator key compromise becomes irrelevant to the security claim.

At the protocol level, Ethereum's transition to proof of stake shifted the attack vector from energy to capital. Slashing makes attacks economically self-destructive — the attacker loses their own stake in the process. This changes the incentive structure, though it also introduces concerns around validator concentration.

What Would Confirm This Direction

Formal verification adoption rising in major protocol deployments — measurable via audit reports and deployment data — would indicate narrowing application-layer risk. ZK bridges sustaining significant TVL across 12+ months without exploit would validate cryptographic security claims in production rather than theory. A continued absence of successful 51% attacks on medium-sized chains would suggest economic deterrence is working as designed.

What Would Invalidate It

A successful attack on Bitcoin's or Ethereum's consensus mechanism — something that defeats proof of work or proof of stake at the protocol level — would force a fundamental revision of what's understood about blockchain security. This hasn't happened. If it did, it would reset most assumptions about which layer is actually trustworthy.

Separately: quantum computing is frequently raised as an existential threat to blockchain cryptography. NIST standardized post-quantum algorithms in 2024, and migration planning is ongoing. The timeline for quantum computers threatening current elliptic curve cryptography is uncertain but measured in decades, not years. A legitimate long-horizon concern, not an immediate one.

Timing Perspective

Now: Major chain consensus mechanisms (Bitcoin, Ethereum) have demonstrated security at scale. Application-layer exploits — smart contracts, bridges, custodians, frontends — are the real and ongoing threat vector.

Next (12-24 months): ZK proof systems and formal verification tools mature toward production-standard reliability. Bridge security models improve incrementally.

Later: Quantum-resistant migration is a multi-decade question, not a near-term decision point. Smaller chain 51% risk persists as long as security budgets remain low relative to potential profit from attacks.

What This Post Doesn't Cover

This is a mechanistic explanation of where blockchain security lives and where it doesn't — not an assessment of any specific chain's current attack probability, a guide to evaluating protocol risk, or investment analysis of any kind. Whether any of this changes decisions about how you hold or use crypto is a separate question that depends on individual circumstances outside the scope of research explanation.

Related Posts

See All
Crypto Research
New XRP-Focused Research Defining the “Velocity Threshold” for Global Settlement and Liquidity
A lot of people looking at my recent research have asked the same question: “Surely Ripple already understands all of this. So what does that mean for XRP?” That question is completely valid — and it turns out it’s the right question to ask. This research breaks down why XRP is unlikely to be the internal settlement asset of CBDC shared ledgers or unified bank platforms, and why that doesn’t mean XRP is irrelevant. Instead, it explains where XRP realistically fits in the system banks are actually building: at the seams, where different rulebooks, platforms, and networks still need to connect. Using liquidity math, system design, and real-world settlement mechanics, this piece explains: why most value settles inside venues, not through bridges why XRP’s role is narrower but more precise than most narratives suggest how velocity (refresh interval) determines whether XRP creates scarcity or just throughput and why Ripple’s strategy makes more sense once you stop assuming XRP must be “the core of everything” This isn’t a bullish or bearish take — it’s a structural one. If you want to understand XRP beyond hype and price targets, this is the question you need to grapple with.
Read Now
Crypto Research
The Jackson Liquidity Framework - Announcement
Lewis Jackson Ventures announces the release of the Jackson Liquidity Framework — the first quantitative, regulator-aligned model for liquidity sizing in AMM-based settlement systems, CBDC corridors, and tokenised financial infrastructures. Developed using advanced stochastic simulations and grounded in Basel III and PFMI principles, the framework provides a missing methodology for determining how much liquidity prefunded AMM pools actually require under real-world flow conditions.
Read Now
Crypto Research
Banks, Stablecoins, and Tokenized Assets
In Episode 011 of The Macro, crypto analyst Lewis Jackson unpacks a pivotal week in global finance — one marked by record growth in tokenized assets, expanding stablecoin adoption across emerging markets, and major institutions deepening their blockchain commitments. This research brief summarises Jackson’s key findings, from tokenized deposits to institutional RWA chains and AI-driven compliance, and explains how these developments signal a maturing, multi-rail settlement architecture spanning Ethereum, XRPL, stablecoin networks, and new interoperability layers.Taken together, this episode marks a structural shift toward programmable finance, instant settlement, and tokenized real-world assets at global scale.
Read Now

Related Posts

See All
No items found.
Lewsletter

Weekly notes on what I’m seeing

A personal letter I send straight to your inbox —reflections on crypto, wealth, time and life.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.