Analyzing crypto-mining attacks