A type of cyberattack in which the attacker creates and controls multiple pseudonymous identities, such as accounts, wallets, or nodes, in order to gain disproportionate influence over a network. This influence can take different forms, such as gaining an unfair advantage in voting, undermining the reputation system of validators, or manipulating reward distribution.