Close Menu
Technology Mag

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot
    Disney deleted a Thread because people kept quoting its movies at it

    Disney deleted a Thread because people kept quoting its movies at it

    January 17, 2026
    The Setapp Mobile iOS store is shutting down on February 16th

    The Setapp Mobile iOS store is shutting down on February 16th

    January 17, 2026
    The LG C5 and Apple’s M4 Mac Mini are both steeply discounted this weekend

    The LG C5 and Apple’s M4 Mac Mini are both steeply discounted this weekend

    January 17, 2026
    Facebook X (Twitter) Instagram
    Subscribe
    Technology Mag
    Facebook X (Twitter) Instagram YouTube
    • Home
    • News
    • Business
    • Games
    • Gear
    • Reviews
    • Science
    • Security
    • Trending
    • Press Release
    Technology Mag
    Home » The Mirai Confessions: Three Young Hackers Who Built a Web-Killing Monster Finally Tell Their Story
    Security

    The Mirai Confessions: Three Young Hackers Who Built a Web-Killing Monster Finally Tell Their Story

    News RoomBy News RoomNovember 30, 20234 Mins Read
    Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Email
    The Mirai Confessions: Three Young Hackers Who Built a Web-Killing Monster Finally Tell Their Story

    Josiah’s father would take him along to their church’s “car ministry,” where they’d repair congregants’ cars for free and refurbish donated vehicles for missionaries. Josiah would stand in the corner of the shop, waiting for the foreman to give him a task, like reassembling a car’s broken water pump.

    Josiah reveled in impressing the adults with his technical abilities. But he was always drawn to computers, cleaner and more logical than any car component. “You give it an input, you get an output,” he says. “It’s something that gave me more control.” After years of vying for time on his family’s computer, he got his own PC when he was close to his 13th birthday, a tower with a Pentium III processor.

    Around the same time, Josiah’s brother, seven years older than him, figured out how to reprogram cell phones so they could be transferred from one telephone carrier to another. Josiah’s brother started to perform this kind of unlocking as a service, and soon it was so in demand that their father used it to launch a computer repair business.

    By the time he was 15, Josiah would work in the family’s shop after school, setting up Windows for customers and installing antivirus software on their machines. From there, he got curious about how HTML worked, then began teaching himself to program, then started exploring web-hosting and network protocols and learning Visual Basic.

    As wholesome as Josiah’s childhood was, he felt at times that he was being raised “on rails,” as he puts it, shepherded from homeschooling to church to the family computer shop. But the only rules he really chafed against were those set by his mother to limit his computer time or force him to earn internet access through schoolwork and household chores. Eventually, on these points, she gave up. “I sort of wore her out,” he says. She relented in part because a hands-on understanding of the minutiae of computing was quickly becoming essential to the family business. Josiah, now with near-unlimited computer time, dreamed of a day when he’d use his skills to start a business of his own, just as his brother had.

    In fact, like most kids his age, much of Josiah’s time at the keyboard was spent on games. One of them was called Uplink. In it, the protagonist is a freelance hacker who can choose between two warring online movements, each of which has built a powerful piece of self-spreading code. One hacker group is bent on using its creation to destroy the internet. The other on stopping them. Josiah, not the sort of kid to do things in half measures, played through the game on both sides.

    Illustrations: Joonho Ko

    immersing himself in that cyberpunk simulation—and learning about famous hackers like Apple cofounder Steve Wozniak and Kevin Mitnick, who had evaded the FBI in a cat-and-mouse pursuit in the 1990s—cultivated in Josiah’s teenage mind a notion of hacking as a kind of secret, countercultural craft. The challenge of understanding technical systems better than even their designers appealed to him. So did the subversive, exploratory freedom it offered to a teenager with strict Christian parents. When he googled a few hacking terms to learn more, he ended up on a site called Hack Forums, a free-for-all of young digital misfits: innocent explorers, wannabes, and full-blown delinquents, all vying for clout and money.

    On the internet of 2011, the most basic trick in the playbook of every unskilled hacker was the denial-of-service attack, a brute-force technique that exploits a kind of eternal, fundamental limitation of the internet: Write a program that can send enough junk data at an internet-connected computer, and you can knock it offline.

    Share. Facebook Twitter Pinterest LinkedIn WhatsApp Reddit Email
    Previous ArticleNew Orleans Tried to Control Vacation Rentals With a Lottery. It Was a Mess
    Next Article Tesla delivered the Cybertruck: here’s how to preorder one

    Related Posts

    Cloudflare Has Blocked 416 Billion AI Bot Requests Since July 1

    Cloudflare Has Blocked 416 Billion AI Bot Requests Since July 1

    December 6, 2025
    The Louisiana Department of Wildlife and Fisheries Is Detaining People for ICE

    The Louisiana Department of Wildlife and Fisheries Is Detaining People for ICE

    December 5, 2025
    Your Data Might Determine How Much You Pay for Eggs

    Your Data Might Determine How Much You Pay for Eggs

    December 4, 2025
    Russia Wants This Mega Missile to Intimidate the West, but It Keeps Crashing

    Russia Wants This Mega Missile to Intimidate the West, but It Keeps Crashing

    December 4, 2025
    This Hacker Conference Installed a Literal Antivirus Monitoring System

    This Hacker Conference Installed a Literal Antivirus Monitoring System

    December 4, 2025
    Flock Uses Overseas Gig Workers to Build Its Surveillance AI

    Flock Uses Overseas Gig Workers to Build Its Surveillance AI

    December 4, 2025
    Our Picks
    The Setapp Mobile iOS store is shutting down on February 16th

    The Setapp Mobile iOS store is shutting down on February 16th

    January 17, 2026
    The LG C5 and Apple’s M4 Mac Mini are both steeply discounted this weekend

    The LG C5 and Apple’s M4 Mac Mini are both steeply discounted this weekend

    January 17, 2026
    Fear and blogging (and prerelease laptop testing) in Las Vegas

    Fear and blogging (and prerelease laptop testing) in Las Vegas

    January 17, 2026
    Our favorite cozy game is back

    Our favorite cozy game is back

    January 17, 2026
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo
    Don't Miss
    TCL’s PlayCube projector is more fun than a Rubik’s Cube News

    TCL’s PlayCube projector is more fun than a Rubik’s Cube

    By News RoomJanuary 17, 2026

    The best all-in-one portable projector is the one that makes all the right compromises. It…

    I saw the future of retail, and it’s all AI

    I saw the future of retail, and it’s all AI

    January 16, 2026
    X is still having issues following an hour-long outage on Friday

    X is still having issues following an hour-long outage on Friday

    January 16, 2026
    Google is appealing a judge’s search monopoly ruling

    Google is appealing a judge’s search monopoly ruling

    January 16, 2026
    Facebook X (Twitter) Instagram Pinterest
    • Privacy Policy
    • Terms of use
    • Advertise
    • Contact
    © 2026 Technology Mag. All Rights Reserved.

    Type above and press Enter to search. Press Esc to cancel.