For quite some time, criminal actors have been using mobile devices for mining, without the knowledge or consent of the user.
Article Link: http://feeds.feedblitz.com/~/539515942/0/gdatasecurityblog-en~Panning-for-virtual-gold-using-other-peoples-equipment