Scenario 1: An attacker compromises a server in the organization's network and installs cryptocurrency mining software. The detection is triggered by a sudden spike in CPU usage and outbound traffic to known mining pools.
Scenario 2: An employee installs mining software on their workstation for personal gain. The detection is triggered by increased CPU and GPU usage, along with connections to external mining servers.