By launching an attack during this critical period, they can manipulate the system to create a malicious fork, reorganize the ...