Thursday, April 17, 2025
HomeMalwareWorld's Most Dangerous Laptop With 6 Popular Malware Sold at $1.3 million

World’s Most Dangerous Laptop With 6 Popular Malware Sold at $1.3 million

Published on

SIEM as a Service

Follow Us on Google News

The Laptop loaded with six most dangerous pieces of malware was sold at an auction. The malware present in the Laptop is responsible for causing financial damages totaling $95 billion.

It is the most dangerous machine right now in the World which runs over Windows XP operating system. Here to be noted that Microsoft has ended support for Windows XP on Apr. 8 2014.

Guo O Dong created the Persistence of Chaos with the deadliest malware in the World. The Laptop dubbed “Persistence of Chaos” is a regular 10.2-inch Samsung NC10-14GB laptop running on Windows XP (SP3).

- Advertisement - Google News

Guo O Dong said to verge that the “intention behind the laptop was to make physical the abstract threats posed by the digital world.” Cybersecurity firm DeepInstinct commissioned the project.

You can watch the live streaming of this laptop were the machine is isolated and airgapped to prevent against malware spread.

6 Popular Malware Present

ILOVEYOU
MyDoom
SoBig
WannaCry
DarkTequila
BlackEnergy

ILOVEYOU ($15 Billion)

In 2000, ILOVEYOU, also known as the “Love Bug,” exploited human nature by disguising itself as a love letter and tricking recipients into opening it. It was only a matter of hours before computer systems across the World were tied up by this virus.

SoBig ($37.1 Billion)

In August of 2003, SoBig appeared, infections millions of computers across the World. SoBig evolved several times, making it hard to catch.

MyDoom

The MyDoom (or Novarg) virus is another worm that can create a backdoor in the victim computer’s operating system. The original MyDoom virus — there have been several variants — had two triggers. One trigger caused the virus to begin a denial of service (DoS) attack starting Feb. 1, 2004.

WannaCry

WannaCry Ransomware outbreak performs all over the World in many countries. Including Russia, Ukraine, India, and Taiwan are the countries which Faced Major Hit by Wanncry Ransomware.

BlackEnergy

BlackEnergy uses injection techniques, robust encryption, and a modular architecture known as a “dropper.” It was used in cyber attacks targeting Ukraine.

DarkTequila

Piece of malware that is well-known for stealing banking credentials and corporate data even when they are offline, it causes damages to millions of users.

The bid for the World’s most Dangerous Laptop closed at $1.345 million, the Laptop was isolated and airgapped to avoid the spread of malware.

“The Persistence of Chaos was created as a collaboration between the artist and cybersecurity company Deep Instinct, which provided the malware and technical expertise to execute the work in a safe environment.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Model Context Protocol Flaw Allows Attackers to Compromise Victim Systems

A critical vulnerability in the widely adopted Model Context Protocol (MCP), an open standard...

China Plans Expanded Cybersecurity Cooperation with Russia

China has announced a significant step forward in its partnership with Russia, with plans...

Ghost Ransomware Targets Organizations Across 70+ Countries

A new ransomware variant known as "Ghost" (also referred to as Cring) has emerged...

Weaponized Amazon Gift Cards Used to Steal Microsoft Credentials

Cybercriminals are exploiting the trust in e-gift cards and the prestige of Amazon to...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Gamaredon’s PteroLNK VBScript Malware Infrastructure and TTPs Uncovered by Researchers

Researchers have unearthed details of the Pterodo malware family, notably the PteroLNK variant used...

Agent Tesla Malware Uses Multi-Stage Attacks with PowerShell Scripts

Researchers from Palo Alto Networks have uncovered a series of malicious spam campaigns leveraging...

Beware! Online PDF Converters Tricking Users into Installing Password-Stealing Malware

CloudSEK's Security Research team, a sophisticated cyberattack leveraging malicious online PDF converters has been...