Attack example:
1. Make several large transactions in block X and wait for N blocks.
2. Contact more than 50% of miners (for example large pools) and bribe them in real life to make a fork just before block X and to mine on that fork for N blocks. So the old branch becomes obsolete.
3. For a bribe you offer reward that is several times (let's say 3x) larger than the reward for N blocks.
------------------------------------------------------------
Conclusion:
The parties you paid to in block X will be accept your payment (as you picked N as 15 for example), and after rewind you get your bitcoins back.
Other possible attacks on bitcoin could be:
•
Denial of Service (DoS) attacks Sending lots of data to a node may make it so busy it cannot process normal Bitcoin transactions. Bitcoin has some denial-of-service prevention built-in, but is likely still vulnerable to more sophisticated denial-of-service attacks.
•
Sybil attack An attacker can attempt to fill the network with clients controlled by him, you would then be very likely to connect only to attacker nodes. Although Bitcoin never uses a count of nodes for anything completely isolating a node from the honest network can be helpful in the execution of other attacks.
•
Packet sniffing Someone who can see all of your Internet traffic can easily see when you send a transaction that you didn't receive (which suggests you originated it). Bitcoin-QT has good Tor integration which closes this attack vector if used.
•
Illegal content in the block chainIt is illegal in some countries to possess/distribute certain kinds of data. Since arbitrary data can be included in Bitcoin transactions, and full Bitcoin nodes must normally have a copy of all unspent transactions, this could cause legal problems. However, Local node policy generally doesn't permit arbitrary data (transactions attempting to embed data re non-standard), but steganographic embedding can still be used though this generally limits storage to small amounts.
For more information on Bitcoin currencies attacks, check out these links:
https://en.bitcoin.it/wiki/Weaknesses https://www.reddit.com/r/Bitcoin/comments/7cht20/classification_of_attacks_on_bitcoin_oc/https://btc-hijack.ethz.ch/