Evolution of Cyber Threats: From P2Pinfect to Cryptocurrency Mining