Latest Mac Coinminer Utilizes Open-Source Binaries and the I2P Network
The malicious actor can have a coinminer masquerade itself as a legitimate app, trick susceptible users into running it on their systems, and just wait for the profits to roll in.