Threat actors appear to be employing more low-key attack methods to achieve their objectives, says SiteLock.
Cyber criminals are using malware to hack into devices and use them to trawl the Web, consuming their resources to mine crypto-currencies.
Crypto-jacking was the primary threat to the security and performance of electronic devices throughout the first half of the year, says Panda Security.
As crypto-currency popularity rises, so too will the challenges of identifying malicious and non-malicious crypto-currency mining applications, says SiteLock.
Crypto-jacking is the unauthorised use of someone else's computing resources to mine crypto-currency, says Netskope.