Procedures for detecting and responding to cryptocurrency mining malware on systems.
Guide for identifying cryptomining activity and removing mining malware from affected systems.
Verify cryptomining activity.
Determine how widespread the infection is.
Stop the mining activity.
Remove cryptominer malware.
Determine how miners were deployed.