DOJ says Trenchant boss sold exploits to Russian broker capable of accessing ‘millions of computers and devices’
嗯,用户让我用中文帮他总结一下这篇文章的内容,控制在100字以内,而且不需要以“文章内容总结”或者“这篇文章”这样的开头,直接写描述即可。好的,我先仔细看看文章内容。 这篇文章主要讲的是一个叫Peter Williams的澳大利亚人,他以前是美国一家制造黑客和监视工具公司的老板。他偷了公司的技术然后卖了,这些技术可以用来入侵全球数百万台电脑和设备。美国检察官确认了这一点,这是第一次公开承认。 Williams在2022到2025年间通过卖这些工具赚了超过130万美元的加密货币。这些工具被卖给了一个俄罗斯公司,而这个公司客户包括俄罗斯政府。检察官说这些工具可能被用来进行全球范围内的政府监视、网络犯罪和勒索软件攻击。 Williams面临9年的监禁,还有3年的监督释放,以及3500万美元的赔偿和25万美元的罚款。他预计在服刑后会被遣返回澳大利亚。 另外,Williams在法庭上承认了自己的错误,并表示后悔。他的律师则表示这些工具没有被分类为机密,并且Williams并不知道这些工具会被卖给俄罗斯政府或其他国家。 总结一下,文章主要讲述了Williams窃取并出售公司黑客工具的行为及其后果。我需要把这些关键点浓缩到100字以内。 首先确定主要人物:Peter Williams,前Trenchant公司高管。事件:窃取并出售黑客工具。后果:影响全球数百万设备,涉及俄罗斯政府。法律后果:面临9年监禁等。 所以可以这样写:“前美国网络安全公司高管Peter Williams窃取并出售公司黑客工具,致全球数百万设备受威胁。该技术被售予俄罗斯公司,或用于监视与网络攻击。Williams面临9年监禁及3500万美元赔偿。” 这样刚好在100字左右,并且涵盖了主要事件和后果。 </think> 前美国网络安全公司高管Peter Williams窃取并出售公司黑客工具,致全球数百万设备受威胁。该技术被售予俄罗斯公司,或用于监视与网络攻击。Williams面临9年监禁及3500万美元赔偿。 2026-2-11 19:3:38 Author: techcrunch.com(查看原文) 阅读量:3 收藏

The former boss of a U.S. maker of hacking and surveillance tools stole and sold technology that can hack millions of computers and people worldwide, U.S. prosecutors have confirmed for the first time.

In October, Australian national Peter Williams, 39, pleaded guilty to selling eight hacking tools that he stole from his employer Trenchant, a division of the U.S. defense contractor L3Harris, which sells its surveillance-enabling tools to the U.S. government and its closest allies. Williams admitted to making more than $1.3 million in crypto from the sales between 2022 and 2025, per the Justice Department.

In a court document published on Tuesday, federal prosecutors said Williams’ actions “directly harmed” the U.S. intelligence community by selling the hacking tools to a Russian company, which counts the Russian government among its customers. 

While it was known that Williams sold Trenchant’s exploits — software that takes advantage of flaws in other software usually to gain access to someone’s computer or device — prosecutors now say that these eight tools could have been used to indiscriminately enable government surveillance, cybercrime, and ransomware attacks across the globe. 

This latest disclosure comes ahead of Williams’ anticipated sentencing on February 24 in a Washington, D.C., federal court. In its sentencing memorandum, which prosecutors use to persuade a court into handing down the maximum punishment, the Justice Department said that the exploits sold by Williams would have allowed the Russian broker and its customers to “potentially access millions of computers and devices around the world, including in the United States.”

Prosecutors asked the judge to sentence Williams to nine years in prison, with three years of supervised release, a mandatory restitution of $35 million, and a maximum fine of $250,000. Williams is expected to be deported to Australia after serving his sentence, the memorandum said. 

Contact Us

Do you have more information about this case, or about other zero-day and surveillance tech makers? From a non-work device, you can contact Lorenzo Franceschi-Bicchierai securely on Signal at +1 917 257 1382, or via Telegram, Keybase and Wire @lorenzofb, or by email.

In response to the prosecutors’ memorandum, Williams submitted a letter to the judge explaining his decisions, saying that he regretted his actions. 

Techcrunch event

Boston, MA | June 23, 2026

“I made choices that directly violated the values I believed in and the trust placed in me by my family, colleagues, and friends,” wrote Williams. “I recognize now that I allowed myself to ignore my obligations and my training, and I failed to seek help or guidance when I knew I was moving in the wrong direction.”

Williams’ lawyer, John P. Rowley, wrote in response to prosecutors that none of the stolen hacking tools were classified, and there was no evidence that Williams knew the tools would end up in the hands of the governments of Russia or another country. His lawyer said that Williams did not intend to harm the U.S. and his native Australia, “although he now recognizes that was a consequence of his actions.”

When reached by TechCrunch, Justice Department spokesperson Pierson Furnish declined to comment. Rowley, Williams’ attorney, did not respond to a request for comment. 

From scapegoat to sentencing

During mid-2025, several sources with knowledge of the offensive cybersecurity industry told TechCrunch that someone working for Trenchant had stolen sensitive hacking tools and sold them to an adversary of the United States. 

A former Trenchant employee came forward, telling TechCrunch that he had been wrongly fired after the company accused him of stealing and leaking details of some of the company’s exploits.

But by October, prosecutors formally accused Williams, who also goes by “Doogie” and was Trenchant’s general manager at the time, of being behind the theft of the company’s hacking tools. The U.S. government charged Williams with selling the exploits to a Russian broker in exchange for crypto.  

Prosecutors said that FBI agents were in contact with Williams from late 2024 until the time of his arrest in mid-2025, during which he was overseeing Trenchant’s internal investigation into the theft of the company’s secrets.

Despite the ongoing investigation, Williams continued to sell the company’s secrets and exploits — technically known as zero-days since the software maker affected hadn’t had time to fix them — even when he was aware that the FBI was investigating the theft and sale of Trenchant’s hacking tools. 

Williams also oversaw the firing of the Trenchant employee accused of leaking the tools, sources told TechCrunch and prosecutors have since confirmed. The fired employee told TechCrunch that he believed he was a scapegoat for someone else at the company. Weeks after his firing, the employee received a notification from Apple that he had been targeted with government spyware, which has still not been explained. 

“[Williams] stood idly by while another employee of the company was essentially blamed for the Defendant’s own conduct,” the prosecutors wrote in their sentencing memorandum. “He looked on while an internal corporate investigation falsely cast blame on his subordinate.”

A spokesperson for Trenchant did not respond to a request for comment about Williams or its investigation.

On August 6, FBI agents obtained and executed search warrants for Williams’ home, and then confronted Williams with evidence that showed receipts of crypto payments, the alias he used to interact with the Russian broker that purchased the stolen trade secrets, and his contract with the broker. 

The Russian broker is likely Operation Zero, which offers up to $20 million for tools to hack into Android devices and iPhones. The company explicitly says it only sells to the Russian government and local organizations. 

Operation Zero did not return a request for comment.

Prosecutors called the broker, which it did not name, “one of the world’s most nefarious exploit brokers,” and said that Williams chose it because, “by his own admission, he knew they paid the most.”

Williams’ “desire for more money, a better lifestyle, bigger home and more jewels and trinkets simply could not be satiated, and he chose to risk it all to betray his company, his colleagues, and the United States and its allies to satisfy that desire,” the prosecutors wrote.


文章来源: https://techcrunch.com/2026/02/11/doj-says-trenchant-boss-sold-exploits-to-russian-broker-capable-of-accessing-millions-of-computers-and-devices/
如有侵权请联系:admin#unsafe.sh