Ethereum Proof-of-Stake: How Validators Earn Rewards, Face Penalties, and Defend Against Attacks.

Ethereum’s transition to Proof-of-Stake (PoS) has revolutionized how its blockchain stays secure and efficient. If you want to grasp how validators earn rewards and face penalties in Ethereum’s PoS system, this article breaks it down in a simple way.

What is Proof-of-Stake (PoS) in Ethereum?

Ethereum’s blockchain is maintained by validators who lock up (stake) their own ether (ETH) to help verify transactions and create new blocks. Instead of mining with energy-heavy computers, PoS relies on these validators to keep the network honest and running smoothly.

  • To become a validator, you deposit 32 ETH

  • Validators have two main jobs:

    1. Attesting (voting) on new blocks to confirm they are valid

    2. Proposing new blocks when randomly selected.

Validators earn rewards for doing these tasks correctly and on time, but they also face penalties if they fail or try to cheat.

Note: Validators on Ethereum are systems (computers) run by people, not just people themselves. To become a validator, you need to run special validator software on a computer (called a validator node). This software participates in the network by proposing and attesting (voting) on new blocks. It does this automatically because it's an automated system.

How Are Rewards Calculated?

The rewards a validator earns depend on several factors, including how much ETH they have staked and how many validators are active on the network.

Base Reward Formula

The foundation of all rewards is the base_reward, calculated as:

$$base~reward = effective~balance * (base~reward~factor / (base~rewards~per~epoch * sqrt(sum(active~balance))))$$

Where:

  • effective_balance = the validator’s staked ETH (max 32 ETH)

  • base_reward_factor = 64 (a constant)

  • base_rewards_per_epoch = 4 (number of reward opportunities per epoch)

  • sum(active_balance) = total ETH staked by all active validators

This formula means

  • The more ETH you stake, the higher your base reward.

  • The more validators there are, the smaller each validator’s base reward becomes (due to the square root relationship).

Components of the Total Reward

The total reward is made up of five parts, each weighted differently:

ComponentWeight (out of 64)Description
Timely Source Vote14Voting on the correct source checkpoint
Timely Target Vote26Voting on the correct target checkpoint
Timely Head Vote14Voting on the correct head block
Sync Committee2Participating in sync committees
Proposer Reward8Proposing a block in the correct slot

A validator who does everything perfectly (votes on source, target, and head; participates in the sync committee; and proposes a block) can earn:

$$64/64 * base~reward = base~reward$$

But since most validators don’t propose blocks every epoch, typical maximum rewards are slightly less.

Penalties—When Validators mess up

Validators who miss votes lose rewards equal to what they would have earned. Missing source or target votes results in penalties, but missing head votes only means no reward (no penalty).

  • No penalty for failing to propose a block.

  • No penalty for slow attestations, just reduced rewards.

Slashing is a severe penalty for malicious acts like double voting or proposing conflicting blocks. It burns part of the validator’s stake and removes them from the network after a delay.

If validators act maliciously (like trying to cheat by voting for two different blocks at once), they get slashed. This means a chunk of their staked ETH is destroyed, and they get kicked out of the network after about 36 days.

There’s a special penalty called the correlation penalty that gets bigger if many validators get slashed around the same time, which discourages coordinated attacks.

Inactivity Leak

If too many validators go offline or stop voting correctly, the network can’t finalize new blocks (finality means blocks are permanently accepted). To fix this, Ethereum has an "inactivity leak" that slowly takes away ETH from inactive validators until enough active validators control over 2/3 of the stake to finalize blocks again. This encourages validators to stay online and honest

Ethereum proof-of-stake Attack and Defense

Now, just like in any big system, there are always some bad actors—hackers or attackers who try to mess things up by breaking Ethereum’s PoS system.

What Do Attackers Want?

Attackers can’t just create new ether or steal it from accounts because every transaction is checked by everyone on the network. Instead, they try to:

  • Reorg blocks: This means changing the order of blocks or removing some blocks to cheat, like spending the same ether twice or censoring transactions.

  • Double finality: This is when two different versions of the blockchain get finalized at the same time, which would split the network permanently.

  • Finality delay: Stopping the network from finalizing blocks, making it hard to trust the blockchain.

How Do Attacks Happen?

  • Social Layer Attacks (Layer 0): These are attacks on the Ethereum community itself, like spreading misinformation, intimidating developers, or pushing harsh regulations. These don’t require much technical skill but can weaken Ethereum by reducing trust or participation.

  • Protocol Attacks: These involve validators who have staked ETH trying to cheat or manipulate the blockchain.

  • Under-activity: Not voting or proposing blocks when they should.

  • Overactivity: Trying to vote or propose multiple blocks in the same slot (which is cheating).

Small-Stake Attacks: Sneaky Tricks

Even validators with a small amount of ETH can try some clever attacks:

  • Reorg attacks: A validator might hold back a block and release it later to replace an honest block, causing a temporary reshuffle.

  • Balancing attacks: The attacker splits honest validators into groups that see different versions of the chain, causing confusion and preventing finalization.

  • Bouncing attacks: The attacker flips the finalization target back and forth between two forks, stopping the chain from finalizing.

Ethereum defends against these by:

  • Giving more weight to fast, timely messages (called proposer boosting).

  • Limiting when the chain can switch between forks.

  • Ignoring votes from validators who equivocate (vote on conflicting blocks).

Big Stake Attacks: When Attackers Control Lots of ETH

The more ETH an attacker controls, the more power they have:

% of Total Staked ETHAttack Power and Risks
33%Can stop the network from finalizing blocks by refusing to vote. Ethereum’s inactivity leak slowly penalizes them to recover finality.
34%Can cause double finality, finalizing two conflicting chains simultaneously, risking a permanent split. This would destroy their stake (slashing) and require social coordination to fix.
50%Can split the chain into two equal forks and prevent finality indefinitely. Social recovery would be needed.
\>50%Can control the blockchain’s future, censor transactions, and reorder blocks for profit. The huge cost and social pushback make this unlikely.
≥66%Can finalize any chain they want, even rewriting history (finality reversion). This is the most dangerous but also the most expensive attack.

The Ultimate Defence: The Ethereum Community

If a big attack happens, the Ethereum community itself is the last line of defense. They can:

  • Agree to ignore the attacker’s chain and build on an honest fork.

  • Penalize attackers by removing their stake or revoking rewards.

  • Coordinate quickly to protect users and the network’s integrity.

This social layer is crucial because even if an attacker succeeds technically, the community can reject their chain, making the attack unprofitable.

Why it's hard to attack Ethereum

  • Huge economic cost: Attacking requires owning a massive amount of ETH, risking billions of dollars.

  • Technical defenses: The protocol punishes misbehavior and favors honest, timely participation.

  • Network conditions: Attacks needing precise timing and control over message delivery are very hard to pull off in the real world.

  • Social coordination: The community can come together to fix problems if needed.

Wrapping Up

Ethereum’s proof-of-stake system is more than just a technical upgrade; it’s a carefully balanced ecosystem of incentives and defenses that keeps the network secure, fair, and resilient. By rewarding honest participation and penalizing bad behavior, Ethereum encourages validators to act in the network’s best interest. At the same time, it builds in strong technical and social defenses to guard against even the most determined attackers.

Whether you’re a developer, a validator, or just curious about blockchain, understanding these mechanics helps you appreciate why Ethereum continues to thrive, even in the face of constant threats.

0
Subscribe to my newsletter

Read articles from Elizabeth Afolabi directly inside your inbox. Subscribe to the newsletter, and don't miss out.

Written by

Elizabeth Afolabi
Elizabeth Afolabi