Cybercriminals are increasingly hijacking enterprise systems and websites for cryptocurrency mining. Cryptominers are often legitimate software tools that are not always detected by anti-malware products. Since the only thing they do is use a system’s CPU resources to crunch algorithms, cryptomining tools can sometime run invisibly without anyone detecting them. Like many other unwanted software tools, cryptocurrency-mining software presents a threat mainly to organizations that fail to follow basic and long-prescribed security hygiene. The tools are distributed like any other malware product, and protecting against them requires the same measures.”]
Source: https://www.darkreading.com/cloud/7-ways-to-protect-against-cryptomining-attacks

