Cointegrity

Sybil Attack

Web3 / wallets security

A Sybil attack occurs when a single malicious entity creates and controls multiple fake identities or accounts to gain disproportionate influence, voting power, or rewards within a network or protocol. Named after a psychiatric case study, the term reflects how one person can successfully operate many simultaneous personas. In blockchain systems, Sybil attacks are particularly dangerous because pseudonymity makes it difficult to distinguish legitimate users from coordinated bad actors. Attackers might register numerous wallets to capture multiple airdrop allocations, vote multiple times in governance decisions, or manipulate reputation systems designed to be one-vote-per-user. Effective defenses require identity verification, sybil resistance mechanisms, or economic costs that make creating fake identities prohibitively expensive. Example: During the Optimism governance airdrop in 2022, some users created numerous wallet addresses to claim multiple allocations of the OP token, artificially inflating their voting power in the protocol's governance system until stricter verification procedures were implemented. Why it matters for crypto security: Sybil attacks threaten the legitimacy of governance systems, airdrop fairness, and reputation mechanisms that many Web3 projects rely on. Developing practical sybil-resistance solutions is critical for creating democratic and equitable blockchain systems where one person truly equals one vote.

Category: wallets security, compliance

Explore the full Web3 Glossary — 2,000+ expert-curated definitions. Need guidance? Talk to our consultants.