An attacker targets a specific mining node by gaining control of its router. They ensure all of the node's outgoing peer connections are exclusively established with malicious nodes controlled by the attacker. The victim's node continues to operate but only sees a fraudulent version of the blockchain. What type of network-level attack is this?
-
A
BGP Hijacking
-
B
Eclipse Attack
-
C
Sybil Attack
-
D
DDoS Attack