A type of cyberattack where a criminal covertly installs malicious software on someone else's device to mine cryptocurrency. The malware exploits the victim's device resources without their knowledge, allowing the criminal to mine cryptocurrency at other people's expense. As a result, affected devices experience reduced performance, increased energy consumption, and accelerated hardware wear.