- Feb 4, 2016
- 2,520
While cryptomining malware may not be calibrated specifically to steal data, it should remain on the radar of enterprise defenders. Campaigns carried out by these malicious tools do real damage to computing equipment and siphon off vast amounts of electricity, never mind the fact that their infections are the perfect foothold to carry out other kinds of devastating lateral attacks. Here are some of the most prevalent and powerful cryptomining malware families active today.