Understanding Illicit Cryptocurrency Mining: Threats and Best Practices for Prevention