Four Pieces for Mirai (Overture) | ||||
---|---|---|---|---|
EP by | ||||
Released | May 18, 2018 | |||
Genre | ||||
Length | 36:34 | |||
Producer | James Ferraro | |||
James Ferraro chronology | ||||
|
Four Pieces for Mirai (Overture) is an extended play by American musician James Ferraro. It was self-released on May 18, 2018 on his Bandcamp page [1] and later to other music platforms. [2] Ferraro also released the album on cassette. [3] The EP is the overture to Ferraro's Four Pieces For Mirai series.
Four Pieces for Mirai (Overture) is an overture to Ferraro's own post-apocalyptic narrative, Four Pieces For Mirai, 'a large body of work that spans across multiple releases', [4] involving Mirai, a malware that turns networked devices running Linux into remotely controlled "bots" that can be used as part of a botnet in large-scale network attacks. Mirai's presence in the narrative is that of a savior, rather than a destructive force. [4] In the Bandcamp description for the release, Ferraro describes Four Pieces For Mirai as 'integrating medieval chorals to baroque to ambient noise to MIDI generated music, and other musical anthropology'. [4]
In this introductory prologue Ferraro reveals a dystopian present, a society in servitude to its digital network and its savior Mirai a computer virus with a "denial of service" malware system that attacks "Internet of Things" devices. in essence disrupting the hold of the internet on humanity. It is from this aspect that Ferraro builds his philosophical allegory of technological plague, hyper connectivity, social famine and virtual exodus. [4]
All tracks are written by James Ferraro.
No. | Title | Length |
---|---|---|
1. | "Fossils" | 1:24 |
2. | "Green Hill Cross" | 6:36 |
3. | "Butterfly" | 7:53 |
4. | "Mirai" | 8:39 |
5. | "Remnant" | 8:07 |
6. | "Gulf Gutters" | 3:54 |
Malware is any software intentionally designed to cause damage to a computer, server, client, or computer network. A wide variety of malware types exist, including computer viruses, worms, Trojan horses, ransomware, spyware, adware, rogue software, wiper and scareware.
This timeline of computer viruses and worms presents a chronological timeline of noteworthy computer viruses, computer worms, Trojan horses, similar malware, related research and events.
Linux malware includes viruses, Trojans, worms and other types of malware that affect the Linux operating system. Linux, Unix and other Unix-like computer operating systems are generally regarded as very well-protected against, but not immune to, computer viruses.
A botnet is a number of Internet-connected devices, each of which is running one or more bots. Botnets can be used to perform Distributed Denial-of-Service (DDoS) attacks, steal data, send spam, and allow the attacker to access the device and its connection. The owner can control the botnet using command and control (C&C) software. The word "botnet" is a portmanteau of the words "robot" and "network". The term is usually used with a negative or malicious connotation.
Internet security is a branch of computer security specifically related to not only Internet, often involving browser security and the World Wide Web, but also network security as it applies to other applications or operating systems as a whole. Its objective is to establish rules and measures to use against attacks over the Internet. The Internet represents an insecure channel for exchanging information, which leads to a high risk of intrusion or fraud, such as phishing, online viruses, trojans, worms and more.
Ransomware is a type of malware from cryptovirology that threatens to publish the victim's data or perpetually block access to it unless a ransom is paid. While some simple ransomware may lock the system so that it is not difficult for a knowledgeable person to reverse, more advanced malware uses a technique called cryptoviral extortion. It encrypts the victim's files, making them inaccessible, and demands a ransom payment to decrypt them. In a properly implemented cryptoviral extortion attack, recovering the files without the decryption key is an intractable problem – and difficult to trace digital currencies such as paysafecard or Bitcoin and other cryptocurrencies are used for the ransoms, making tracing and prosecuting the perpetrators difficult.
An Internet outage or Internet blackout is the complete or partial failure of the internet services. It can occur due to censorship, cyberattacks, disasters, police or security services actions or errors.
James Ferraro is an American musician, producer, vocalist and contemporary artist who has been credited as a pioneer of the hypnagogic pop and vaporwave genres. His works, primarily studio albums, but also including poems and art installations, are known for exploring subjects such as hyperreality and consumer culture.
BASHLITE is malware which infects Linux systems in order to launch distributed denial-of-service attacks (DDoS). Originally it was also known under the name Bashdoor, but this term now refers to the exploit method used by the malware. It has been used to launch attacks of up to 400 Gbps.
Mirai is a malware that turns networked devices running Linux into remotely controlled bots that can be used as part of a botnet in large-scale network attacks. It primarily targets online consumer devices such as IP cameras and home routers. The Mirai botnet was first found in August 2016 by MalwareMustDie, a white hat malware research group, and has been used in some of the largest and most disruptive distributed denial of service (DDoS) attacks, including an attack on 20 September 2016 on computer security journalist Brian Krebs' web site, an attack on French web host OVH, and the October 2016 Dyn cyberattack. According to a chat log between Anna-senpai and Robert Coelho, Mirai was named after the 2011 TV anime series Mirai Nikki.
The 2016 Dyn cyberattack was a series of distributed denial-of-service attacks on October 21, 2016, targeting systems operated by Domain Name System (DNS) provider Dyn. The attack caused major Internet platforms and services to be unavailable to large swathes of users in Europe and North America. The groups Anonymous and New World Hackers claimed responsibility for the attack, but scant evidence was provided.
Linux.Darlloz is a worm which infects Linux embedded systems.
Linux.Wifatch is an open-source piece of malware which has been noted for not having been used for malicious actions, instead attempting to secure devices from other malware.
MalwareMustDie, NPO as a whitehat security research workgroup that was launched in August 2012. MalwareMustDie is a registered Nonprofit organization as a medium for IT professionals and security researchers gathered to form a work flow to reduce malware infection in the internet. The group is known for their malware analysis blog. They have a list of Linux malware research and botnet analysis that they have completed. The team communicates information about malware in general and advocates for better detection for Linux malware.
A Default Credential vulnerability is a type of vulnerability that is most commonly found to affect the devices like modems, routers, digital cameras, and other devices having some pre-set (default) administrative credentials to access all configuration settings. The vendor or manufacturer of such devices uses a single pre-defined set of admin credentials to access the device configurations, and any potential hacker can misuse this fact to hack such devices, if those credentials are not changed by the consumers.
Hajime is a malware which appears to be similar to the Wifatch malware in that it appears to attempt to secure devices. Hajime is also far more advanced than Mirai, according to various researchers.
BrickerBot was malware that attempted to permanently destroy ("brick") insecure Internet of Things devices. BrickerBot logged into poorly-secured devices and ran harmful commands to disable them. It was first discovered by Radware after it attacked their honeypot in April 2017. On December 10, 2017, BrickerBot was retired.
Hack Forums is an internet forum. The website ranks as the number one website in the "Hacking" category in terms of web-traffic by the analysis company Alexa Internet. The site has been widely reported as facilitating criminal activity, such as the case of Zachary Shames, who in 2013 sold a keylogger which was used to steal personal information.
Troll is an extended play by American musician James Ferraro. The EP was self-released to his Bandcamp page on November 26, 2017 with no prior announcement. The EP gained minor attention by online news sites who reported its release. The EP received positive reviews.
Requiem for Recycled Earth is a studio album by American musician James Ferraro, released independently on May 3, 2019. The album is the first part of Ferraro's Four Pieces For Mirai series.