This can occur to virtually any device, and is usually performed through web browser downloads or rogue mobile apps.<ref>https://www.malwarebytes.com/cryptojacking</ref> | This can occur to virtually any device, and is usually performed through web browser downloads or rogue mobile apps.<ref>https://www.malwarebytes.com/cryptojacking</ref> |