Even though the deployment of cryptominers is especially achieved via phishing, downloading pirated written content, making use of malware disguised as genuine means, or exploiting vulnerabilities, some attackers are more resourceful. It really is for these good reasons specifically the XMRig miner is considered the most rerouted cryptominer by attackers https://batchminer.com/about-us/