A common feature of a rootkit is to hide or obscure an infected system or process’ CPU usage. This is frequently seen in conjunction with cryptocurrency mining and password cracking malware.
This is done to avoid detection from system monitoring software and to deceive systems administrators and incident responders.