Most cyber-attacks require a target computer which can be reached. A randomly appearing and moving computer becomes close to impossible to attack. A virtual machine can be easily generated in random locations, and then erased. Anything that ‘could’ be done to the virtual machine while it did exist, is pointless because it vanishes. An attacker would need to locate the next random one and start all over again.