How can you recognize crypto miners?
A common way to detect a crypto miner running in your infrastructure is the load they generate. Cryptocurrency relies on computationally intensive calculations which may be detected, if you have proper monitoring in place. In the HPC and grid context this can be harder to detect, because the nodes are usually under a high load.
Another possible way of detection is analysis of network traffic. Yet, it may be difficult to distinguish this traffic from other types of communications.
Also files, processes and other irregularities linked to crypto miners present in the infected system might give clues of their existence.
How to protect yourself against crypto miners?
Keep your services updated and properly configured. Ensure, that services are only accessible for known and authenticated users. In case prevention fails, have proper monitoring and logging in place to detect and analyze what is happening and how the initial foothold was gained. If there is a crypto miner running, it is always possible that some other malware is planted there as well.