Former U.S. Defense contractor executive sentenced for selling zero-day exploits to Russian broker Operation Zero
嗯,用户让我帮忙总结一下这篇文章的内容,控制在一百个字以内,而且不需要用“文章内容总结”或者“这篇文章”这样的开头,直接写描述。好的,我先看看文章讲了什么。 文章讲的是一个前美国国防承包商的高管彼得·威廉姆斯,他因向俄罗斯的Operation Zero出售零日漏洞而被判刑七年多。他从L3Harris公司窃取了八个零日漏洞,赚了几百万。这些漏洞可以被用来进行网络攻击、间谍活动等,对国家安全造成了威胁。司法部还制裁了相关的俄罗斯公司和个人。 好的,我需要把这些信息浓缩到100字以内。首先,彼得·威廉姆斯的身份和判刑情况是重点。然后是出售零日漏洞的数量和买家是谁。接着是这些漏洞的危害,以及司法部的制裁措施。 可能的结构是:前美国国防承包商高管彼得·威廉姆斯因向俄罗斯Operation Zero出售八个零日漏洞获刑七年多,并没收资产。这些漏洞可被用于网络攻击和间谍活动,威胁国家安全。司法部同时制裁了相关俄罗斯公司和个人。 检查一下字数是否在100字以内。看起来差不多,可以调整一下用词让句子更紧凑。 </think> 前美国国防承包商高管彼得·威廉姆斯因向俄罗斯Operation Zero出售八个零日漏洞获刑七年多,并没收资产。这些漏洞可被用于网络攻击和间谍活动,威胁国家安全。司法部同时制裁了相关俄罗斯公司和个人。 2026-2-25 10:6:10 Author: securityaffairs.com(查看原文) 阅读量:15 收藏

Former U.S. Defense contractor executive sentenced for selling zero-day exploits to Russian broker Operation Zero

Pierluigi Paganini February 25, 2026

A former employee at U.S. defense contractor L3Harris got over 7 years in prison for selling eight zero-days to a Russian broker.

Peter Williams, a 39-year-old Australian former L3Harris employee, received a prison sentence of just over seven years for selling eight zero-day exploits to the Russian broker Operation Zero for millions. Williams pleaded guilty in October 2025 to two counts of trade secret theft. The court also imposed three years of supervised release and ordered him to forfeit assets, including property, luxury items, and cryptocurrency proceeds.

“Today, Peter Williams, 39, an Australian national, was sentenced in the U.S. District Court for the District of Columbia to 87 months in prison for selling his employer’s trade secrets — sensitive and protected cyber-exploit components — to a Russian cyber-tools broker, announced the Department of Justice.” reads the press release published by DoJ. “In addition to the 87-month prison term, U.S. District Court Judge AliKhan for the District of Columbia ordered Williams to serve three years of supervised release with special conditions, to forfeit a money judgment of $1.3 million, cryptocurrency and property to include a house, and luxury items such as watches and jewelry. The Court also set a restitution hearing for May 12, 2026.”

In October 2025, the journalist Kim Zetter revealed the case’s connection to Operation Zero, which had occurred the previous year.

“The former executive of Trenchant who pleaded guilty this week to selling his company’s software hacking tools to a zero-day broker in Russia, sold at least one of these tools to the Russian firm even after learning that a previous tool he sold the broker was being used by a South Korean broker – indicating that the stolen tools were being passed on to others downstream.” wrote Zetter. “In June 2025, he signed an agreement with the Russian buyer to sell stolen code for $500,000 and transmitted the code to the buyer just days before he met with the FBI to discuss their investigation in to the theft of Trenchant’s code.”

Trenchant sells zero-day exploits and advanced hacking tools exclusively to the U.S. government and a limited group of allied governments, likely including Australia. Williams worked for the Australian Signals Directorate in the 2010s, conducting cyber espionage similar to the U.S. NSA. After leaving ASD, he joined a company that later became L3Trenchant. The firm emerged in 2018 after L3Harris acquired Australian exploit developers Azimuth and Linchpin Labs, both known for supplying zero-days and hacking tools to the U.S. and allied governments.

Court documents say the stolen exploits could target civilian and military victims worldwide, enabling fraud, ransomware, espionage, and offensive cyber operations. According to court documents, Williams abused his senior role and sold the tools for up to $4 million in cryptocurrency, potentially exposing millions of devices. Over three years, from 2022 to 2025, eight zero-day exploit components were stolen from L3Harris. The tools, intended only for the U.S. government and select allies, caused an estimated $35 million in losses.

“Williams took trade secrets comprised of national security software and sold them for up to $4 million in crypto currency. These incredibly powerful tools would have allowed Russia to access millions of digital devices,” said U.S. Attorney Jeanine Pirro for the District of Columbia. “By betraying a position of trust and selling sensitive American technology, Williams’ crime is not only one of theft, it is a crime of national security. Our nation’s defense capabilities are not commodities to be auctioned off. People like Williams who endanger our national security will be met with swift and decisive consequences.”

The U.S. State Department designated Operation Zero, its director Sergey Sergeyevich Zelenyuk, and Special Technology Services LLC FZ (STS) under the Protecting American Intellectual Property Act over the stolen trade secrets. Zelenyuk, a Russian national, founded STS in the UAE to expand operations across Asia and the Middle East and likely bypass U.S. sanctions.

OFAC is sanctioning individuals and companies linked to Zelenyuk, including his assistant Marina Vasanovich and UAE-based STS, for acting on his behalf. Azizjon Mamashoyev and Oleg Kucherov, former Operation Zero associates—with Kucherov tied to the Trickbot gang—are also designated for materially supporting Zelenyuk. Advance Security Solutions, Mamashoyev’s UAE/Uzbekistan exploit brokerage, is sanctioned for similar reasons.

Russian national Sergey Zelenyuk has run Operation Zero, based in St. Petersburg, since 2021 as an exploit broker. The company offers large bounties for exploits targeting widely used software, including U.S. operating systems and encrypted messaging apps, without notifying developers, allowing customers to use them for ransomware or other malicious activities.

“In advertisements and other public-facing materials, Zelenyuk and Operation Zero have stated that they will only sell the exploits they acquire to customers from non-NATO countries.  Zelenyuk, through Operation Zero, has sought to sell exploits to foreign intelligence agencies.  Zelenyuk and Operation Zero have also sought to develop other cyber intelligence systems, including spyware and methods to extract personal identifying information and other sensitive data uploaded by users of artificial intelligence applications like large language models.” reads the press release by the US Treasury. “Operation Zero has sought to recruit hackers to support its activities and develop business relationships with foreign intelligence agencies through use of social media.”

Pierluigi Paganini

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

(SecurityAffairs – hacking, US CISA Known Exploited Vulnerabilities catalog)




文章来源: https://securityaffairs.com/188482/intelligence/former-u-s-defense-contractor-executive-sentenced-for-selling-zero-day-exploits-to-russian-broker-operation-zero.html
如有侵权请联系:admin#unsafe.sh