Close Menu
Technology Mag

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot
    Press a button and this SSD will self-destruct with all your data

    Press a button and this SSD will self-destruct with all your data

    November 21, 2025
    The US Needs an Open Source AI Intervention to Beat China

    The US Needs an Open Source AI Intervention to Beat China

    November 21, 2025
    Apple’s new limited edition iPhone grip is all about accessibility

    Apple’s new limited edition iPhone grip is all about accessibility

    November 21, 2025
    Facebook X (Twitter) Instagram
    Subscribe
    Technology Mag
    Facebook X (Twitter) Instagram YouTube
    • Home
    • News
    • Business
    • Games
    • Gear
    • Reviews
    • Science
    • Security
    • Trending
    • Press Release
    Technology Mag
    Home » The Mirai Confessions: Three Young Hackers Who Built a Web-Killing Monster Finally Tell Their Story
    Security

    The Mirai Confessions: Three Young Hackers Who Built a Web-Killing Monster Finally Tell Their Story

    News RoomBy News RoomNovember 30, 20234 Mins Read
    Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Email
    The Mirai Confessions: Three Young Hackers Who Built a Web-Killing Monster Finally Tell Their Story

    Josiah’s father would take him along to their church’s “car ministry,” where they’d repair congregants’ cars for free and refurbish donated vehicles for missionaries. Josiah would stand in the corner of the shop, waiting for the foreman to give him a task, like reassembling a car’s broken water pump.

    Josiah reveled in impressing the adults with his technical abilities. But he was always drawn to computers, cleaner and more logical than any car component. “You give it an input, you get an output,” he says. “It’s something that gave me more control.” After years of vying for time on his family’s computer, he got his own PC when he was close to his 13th birthday, a tower with a Pentium III processor.

    Around the same time, Josiah’s brother, seven years older than him, figured out how to reprogram cell phones so they could be transferred from one telephone carrier to another. Josiah’s brother started to perform this kind of unlocking as a service, and soon it was so in demand that their father used it to launch a computer repair business.

    By the time he was 15, Josiah would work in the family’s shop after school, setting up Windows for customers and installing antivirus software on their machines. From there, he got curious about how HTML worked, then began teaching himself to program, then started exploring web-hosting and network protocols and learning Visual Basic.

    As wholesome as Josiah’s childhood was, he felt at times that he was being raised “on rails,” as he puts it, shepherded from homeschooling to church to the family computer shop. But the only rules he really chafed against were those set by his mother to limit his computer time or force him to earn internet access through schoolwork and household chores. Eventually, on these points, she gave up. “I sort of wore her out,” he says. She relented in part because a hands-on understanding of the minutiae of computing was quickly becoming essential to the family business. Josiah, now with near-unlimited computer time, dreamed of a day when he’d use his skills to start a business of his own, just as his brother had.

    In fact, like most kids his age, much of Josiah’s time at the keyboard was spent on games. One of them was called Uplink. In it, the protagonist is a freelance hacker who can choose between two warring online movements, each of which has built a powerful piece of self-spreading code. One hacker group is bent on using its creation to destroy the internet. The other on stopping them. Josiah, not the sort of kid to do things in half measures, played through the game on both sides.

    Illustrations: Joonho Ko

    immersing himself in that cyberpunk simulation—and learning about famous hackers like Apple cofounder Steve Wozniak and Kevin Mitnick, who had evaded the FBI in a cat-and-mouse pursuit in the 1990s—cultivated in Josiah’s teenage mind a notion of hacking as a kind of secret, countercultural craft. The challenge of understanding technical systems better than even their designers appealed to him. So did the subversive, exploratory freedom it offered to a teenager with strict Christian parents. When he googled a few hacking terms to learn more, he ended up on a site called Hack Forums, a free-for-all of young digital misfits: innocent explorers, wannabes, and full-blown delinquents, all vying for clout and money.

    On the internet of 2011, the most basic trick in the playbook of every unskilled hacker was the denial-of-service attack, a brute-force technique that exploits a kind of eternal, fundamental limitation of the internet: Write a program that can send enough junk data at an internet-connected computer, and you can knock it offline.

    Share. Facebook Twitter Pinterest LinkedIn WhatsApp Reddit Email
    Previous ArticleNew Orleans Tried to Control Vacation Rentals With a Lottery. It Was a Mess
    Next Article Tesla delivered the Cybertruck: here’s how to preorder one

    Related Posts

    Vaping Is ‘Everywhere’ in Schools—Sparking a Bathroom Surveillance Boom

    Vaping Is ‘Everywhere’ in Schools—Sparking a Bathroom Surveillance Boom

    November 21, 2025
    A Major Leak Spills a Chinese Hacking Contractor’s Tools and Targets

    A Major Leak Spills a Chinese Hacking Contractor’s Tools and Targets

    November 21, 2025
    A Simple WhatsApp Security Flaw Exposed 3.5 Billion Phone Numbers

    A Simple WhatsApp Security Flaw Exposed 3.5 Billion Phone Numbers

    November 20, 2025
    Mexico City Is the Most Video-Surveilled Metropolis in the Americas

    Mexico City Is the Most Video-Surveilled Metropolis in the Americas

    November 20, 2025
    This Is the Platform Google Claims Is Behind a ‘Staggering’ Scam Text Operation

    This Is the Platform Google Claims Is Behind a ‘Staggering’ Scam Text Operation

    November 19, 2025
    DOJ Issued Seizure Warrant to Starlink Over Satellite Internet Systems Used at Scam Compound

    DOJ Issued Seizure Warrant to Starlink Over Satellite Internet Systems Used at Scam Compound

    November 19, 2025
    Our Picks
    The US Needs an Open Source AI Intervention to Beat China

    The US Needs an Open Source AI Intervention to Beat China

    November 21, 2025
    Apple’s new limited edition iPhone grip is all about accessibility

    Apple’s new limited edition iPhone grip is all about accessibility

    November 21, 2025
    Apple’s cheapest iPad is already  off for Black Friday

    Apple’s cheapest iPad is already $70 off for Black Friday

    November 21, 2025
    Trump Takes Aim at State AI Laws in Draft Executive Order

    Trump Takes Aim at State AI Laws in Draft Executive Order

    November 21, 2025
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo
    Don't Miss
    I signed up for Trump Mobile two weeks ago and I still don’t have my SIM News

    I signed up for Trump Mobile two weeks ago and I still don’t have my SIM

    By News RoomNovember 21, 2025

    Where’s the Trump Phone? We’re going to keep talking about it every week. While we…

    AI agents are invading your PC

    AI agents are invading your PC

    November 21, 2025
    The Asus Falcata Hall effect split gaming keyboard is 0 off right now

    The Asus Falcata Hall effect split gaming keyboard is $140 off right now

    November 21, 2025
    AirDropping stuff from a Pixel phone rules so much

    AirDropping stuff from a Pixel phone rules so much

    November 21, 2025
    Facebook X (Twitter) Instagram Pinterest
    • Privacy Policy
    • Terms of use
    • Advertise
    • Contact
    © 2025 Technology Mag. All Rights Reserved.

    Type above and press Enter to search. Press Esc to cancel.