This use-case is usually done Using the downloading of a cryptominer disguised to be a authentic useful resource, which may occur as part of a phishing attack. If the device boots for the first time, it connects into the balenaCloud dashboard, and then you’ll be able to see it mentioned https://tysonstxge.bleepblogs.com/37934452/what-does-cryptominer-machines-mean