Over 4,000 IoT Devices Bricked by Silex Malware

Over 4,000 IoT Devices Bricked by Silex Malware

IoT devices running on the Linux or Unix operating systems with known or guessable default passwords were targeted.

Written By
Sue Walsh
Sue Walsh
Aug 20, 2019

At least 4,000 IoT devices, and probably more were bricked thanks to a new strain of malware called Silex and the 14-year-old hacker who unleashed it. Akamai senior intelligence response engineer Larry Cashdollar first discovered Silex. It’s similar to 2017’s Brickerbot in that it targets insecure IoT devices, specifically those that run a Linux or Unix OS and have known or easily guessable default passwords. Silex uses the insecure logins to destroy the device’s storage and remove their network configuration, effectively turning them into paperweights.

The hacker used Twitter to contact Cashdollar, indicating a plan to remove vulnerable IoT devices to prevent other hackers from using them to create botnets. At some point however, the command and control center server vanished.

Cashdollar has a theory. The person who wrote this didn’t expect all this attention and didn’t like it. It made him nervous, so he decided to stop the malware from spreading and that he wasn’t going to increase its destructiveness.

The incident highlights two things:

  • IoT security still has many vulnerabilities
  • Too many devices lack security from cyberattack

It’s unclear how many device manufacturers prioritize security, and compliance with standards and certification remains voluntary. Cashdollar says that vendors need to prioritize building secure, updatable devices.

Sue Walsh

Sue Walsh is News Writer for RTInsights, and a freelance writer and social media manager living in New York City. Her specialties include tech, security and e-commerce. You can follow her on Twitter at @girlfridaygeek.

Recommended for you...

Powering Smart Cities: Designing Rugged PoE for Outdoor and Industrial Edge Deployments
Jordan Smith
Apr 2, 2026
Securing Time Synchronization: The Overlooked Control in Modern Cybersecurity
Liz Ticong
Apr 2, 2026
Why Satellite Connectivity Sits at the Heart of Enterprise Network Resilience
Fánan Henriques
Feb 14, 2026
Real-time Analytics News for the Week Ending January 31

Featured Resources from Cloud Data Insights

Real-time Analytics News for the Week Ending April 5
What You Need to Know About Scaling Agentic AI
How Model Context Protocol (MCP) Exploits Actually Work
Casey Bleeker
Apr 3, 2026
Powering Smart Cities: Designing Rugged PoE for Outdoor and Industrial Edge Deployments
Jordan Smith
Apr 2, 2026
RT Insights Logo

Analysis and market insights on real-time analytics including Big Data, the IoT, and cognitive computing. Business use cases and technologies are discussed.

Property of TechnologyAdvice. © 2026 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.