Ex-L3Harris exec guilty of selling cyber exploits to Russian broker
嗯,用户让我总结这篇文章的内容,控制在100字以内,而且不需要用“文章内容总结”之类的开头。首先,我需要通读全文,抓住主要信息。 文章讲的是Peter Williams,一个澳大利亚人,曾经是美国国防承包商L3Harris Trenchant的总经理。他承认在2022到2025年间窃取并出售了八项网络安全信息给俄罗斯的漏洞经纪人。这些信息本来是美国政府和盟友专用的,结果被卖到了俄罗斯。美国司法部指出他窃取了价值3500万美元的网络机密,赚了130万美元的加密货币。FBI助理主任评论说这给了俄罗斯网络攻击者优势。Williams还和俄罗斯经纪人签了合同,提供后续支持。 总结的时候要包括:谁、做了什么、时间、结果、影响。控制在100字以内的话,可能需要简化一些细节,比如金额和后果。 最后检查一下是否符合要求:没有使用特定开头,控制在100字内,并且准确传达主要内容。 </think> 澳大利亚籍男子Peter Williams承认窃取并出售美国国防承包商L3Harris Trenchant的八项网络安全信息给俄罗斯经纪人。这些信息本用于美国政府及盟友,却被转售给俄罗斯。他非法获利130万美元加密货币,并面临最高十年监禁。 2025-10-30 16:45:17 Author: www.bleepingcomputer.com(查看原文) 阅读量:1 收藏

Cyber world

Peter Williams, an Australian national and a former general manager at U.S. defense contractor L3Harris Trenchant, has pleaded guilty in U.S. District Court to stealing and selling confidential cybersecurity information to a Russian vulnerability exploit broker.

The illegal activity took place between 2022 and 2025, when Williams stole at least eight protected exploit components from Trenchant intended for the exclusive use of the U.S. government and select allies, and sold them to a broker that, among other clients, works with the Russian government.

"The material, stolen over a three-year period from the U.S. defense contractor where he worked, was comprised of national-security focused software that included at least eight sensitive and protected cyber-exploit components," reads the U.S. Department of Justice announcement.

"Those components were meant to be sold exclusively to the U.S. government and select allies. Williams sold the trade secrets to a Russian cyber-tools broker that publicly advertises itself as a reseller of cyber exploits to various customers, including the Russian government."

Trenchant is a cyber-capabilities business unit within L3Harris Technologies that conducts vulnerability and exploit research and develops offensive/defensive tools used by governments, intelligence, and defense agencies within the "Five Eyes" alliance.

The DOJ says Williams abused his position and high-level access at Trenchant Systems to steal $35 million in cyber trade secrets. He sold them to the unnamed broker for $1,300,000 in cryptocurrency.

"By doing so, he gave Russian cyber actors an advantage in their massive campaign to victimize U.S. citizens and businesses," commented the FBI's Assistant Director at Counterintelligence Division, Roman Rozhavsky.

Williams even signed contracts with the Russian broker for both the initial sale of the tools and the fees for ongoing support of their use.

Although the U.S. DoJ stops short of naming the broker, previous media reporting suggests it's Operation Zero, a Russian-based zero-day purchase platform that offers massive payouts for zero-click RCEs on widely used mobile tools and OSes.

BleepingComputer contacted Operation Zero for a statement on these unconfirmed reports, but we are still waiting for their response.

Following his guilty plea, Williams now faces charges carrying a maximum of 10 years' imprisonment and fines of $250,000 or twice the gain or loss pertinent to the offense.

Last week, TechCrunch reported that Trenchant was conducting its own investigation into the potential leak of Google Chrome zero-day vulnerabilities to outsiders, with another employee, Jay Gibson, who specialized in iOS zero-days, at the epicenter of the accusations.

There have been numerous zero-day exploits targeting Chrome in recent years, with six distinct cases in 2025 so far, ten zero-days throughout 2024, another eight in 2023, and nine in 2022.

Whether or not these cases leveraged exploits Williams sold to the Russian broker remains unknown.


文章来源: https://www.bleepingcomputer.com/news/security/ex-l3harris-exec-guilty-of-selling-cyber-exploits-to-russian-broker/
如有侵权请联系:admin#unsafe.sh