These miners do not have to compromise the machine to mine.
Any unprotected systems are vulnerable
Unauthorized Resource Consumption: Remote actors can use the victim's system resources to perform certain tasks
Prevent the scripts from being downloaded to client browsers.
Monitor the traffic from that network for any suspicious activity.