They could infiltrate the ASIC manufacturers and plant hardware-level backdoors/malware. 5-10 years later, the hardware is used by most miners.
Certainly the CIA had a brainstorming session to come up with ideas like these and they most certainly have a few which are ready to deploy.