Free Software Review

Blog & News

Something that some may not initially think as being a good investment; but a laptop that has been deliberately infected with six notorious strains of malware including WannaCry and ILoveYou is being auctioned off – with bids at the time of writing reaching over $1.1m (£800,000). But why?


The laptop itself has been disabled from being able to access the internet so ensure that the virus can’t be spread or used in any way and the device will be shipped to the winner. The point of this is almost solely an art exhibition and publicity stunt by artist Guo O Dong and a New York cyber-security company called Deep Instinct.

But what are the infamous viruses and what did they do? We are going to have a look into four of them here.



Probably the virus that you are most likely to have heard of, the WannaCry virus was responsible for shutting down hundreds of thousands of computers around the world, demanding that users pay a ransom in order to access their computer again. The reason for the huge level of infamy of this particular virus was that it hit over a third of hospital trusts in the UK as well as 8% of GP Practices. Around 1% of all NHS care was disrupted in the week of the attack and over 19,000 appointments had to be cancelled. This cost the NHS £20 million and then a further £72 million in cleanup.

The cyber attack locked over 200,000 users out of their computer and displayed a large red-lettered warning demanding Bitcoin. This attack was eventually pinned on North Korean hackers which took a year to investigate.



Misleadingly this sweet-sounding virus was based around “love letters” in which a computer worm, originating from the Philippines; began to take control of computers on 5th May 2000. The email included an attachment which had the; innocently seeming at the time, filename of “LOVE-LETTER-FOR-YOU.txt.vbs. If this was opened, a Visual Basic script (which now we can see from the .vbs part of the filename) executed and infected the computer.

This played on the early day naivety of computer and email users by fooling people into opening it because Microsoft actually concealed the extension name of the file which caused many to believe it was a text file. When the file was ran, the script sent itself to everyone in that person’s contact list and edited the computer’s registry files so that the worm began automatically on every startup. It then continued to copy itself across all files in the computer basically ruining the inner workings.



The MyDoom or Novarg virus was another worm that created backdoors in the victim’s operating system on their computer. The original version of the virus has several variants but mainly; two triggers. The first of them made the virus begin a distributed denial of service attack (DDOS) which started on 1st February 2004. The second trigger then made the virus stop distributing itself on 12th February 2004 but even after the virus had stopped spreading, the backdoor created remained open and active; allowing access to victim’s computer.


The Sobig Worm

Finally, one of the other viruses that has been deliberately put onto the laptop is the Sobig Worm; a computer worm that infected millions of computers connected to the internet through Windows in August 2003.

Sobig.A was first found in January 2003 and Sobig.B was released on 18th May of the same year. Originally known as Palyh and later renamed; Sobig is the second fastest spreading computer worm to have ever entered the computing environment, infecting computers through the internet. Worms, featured a lot in this blog are malicious computer programmes that replicate themselves and can create backdoors in the victim’s computers. This opens them up to having their data stolen; before passing on this information and replicating itself on other people’s systems.


Protecting yourself

We aren’t expecting you to be going out and purchasing the tainted laptop with the four of these viruses included (and more!) but it is extremely important to remain vigilant with your computers. One of the issues is that because our computers are sat on our desk; laptops in our bags – the first thing that you think about in terms of safety are not having the device itself stolen or damaged. This then causes a somewhat lackadaisical approach to ensuring the internal file system safety of your computer and the files upon it are safe themselves.

Regular backups, changing passwords securely and regularly as well as having robust antivirus software is very important because not only can your computer become infected and damaged, but important files about your and your business can be compromised or stolen.

News & Blog

3 Cloud Tech Trends To Look Out For In 2021

3 Cloud Tech Trends To Look Out For In 2021 31st December 2020
3 Cloud Tech Trends To Look Out For In 2021 Hover Icon Read More

If there is one thing that we are all hoping for with what 2021 may hold for us is a somewhat “business-as-usual” year following the unprecedented situation that 2020 presented us with. One thing that has been evident, though, is …

Twitter Adopt Amazon Web Services In New Partnership

Twitter Adopt Amazon Web Services In New Partnership 16th December 2020
Twitter Adopt Amazon Web Services In New Partnership Hover Icon Read More

Twitter have recently moved their infrastructure into the cloud under the vast online giant Amazon Web Services (AWS). They have been brought on to scope including the delivery of timelines in a multi-year agreement in which Twitter will leverage the …

New Survey Reports Heavy Business Modernisation Through Digital

New Survey Reports Heavy Business Modernisation Through Digital 30th November 2020
New Survey Reports Heavy Business Modernisation Through Digital Hover Icon Read More

Key insights from a survey have been released that have found among various other results; that businesses are heavily modernising, scaling toward digital and enhancing existing processes as a result of the coronavirus pandemic. The survey of IT leaders has …

Read more news & blog articles

How could we help your business?

A more efficient and profitable use of data. Safer, more secure systems. Operational efficiencies. Special projects. Manage and support your systems to make sure your success is sustainable, is ongoing.

Kaleida Logo
Kaleida Map
Kaleida Keate House, 1 Scholar Green Road, Cobra Court, Trafford Park, Manchester, M32 0TR
Map Pin
Call us on 0161 870 8160 Email us at

By continuing to use the site, you agree to the use of cookies. more information

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.