US sanctions Russian broker for buying stolen zero-day exploits
嗯,用户让我用中文总结一篇文章,控制在100字以内,而且不需要特定的开头。首先,我需要仔细阅读文章内容,抓住主要信息。 文章讲的是美国财政部制裁了一个俄罗斯的漏洞经纪人,他从美国国防承包商的前高管那里购买了被盗的黑客工具。然后提到了具体的公司和人物,比如Matrix LLC、Sergey Zelenyuk,以及涉及的法律PAIPA。还有Peter Williams被判刑,涉及出售零日漏洞给Operation Zero。制裁措施包括冻结资产和禁止交易。 接下来,我需要把这些要点浓缩到100字以内。重点包括:美国财政部制裁俄罗斯公司及其所有人;涉及PAIPA法律;前高管Peter Williams出售零日漏洞;制裁措施如冻结资产等。 最后,确保语言简洁明了,不使用复杂的术语,并且直接描述内容。 </think> 美国财政部制裁俄罗斯公司Matrix LLC及其所有人Sergey Zelenyuk,因其收购并出售从美国国防承包商窃取的零日漏洞工具。相关个人和企业也被列入制裁名单。 2026-2-25 10:45:21 Author: www.bleepingcomputer.com(查看原文) 阅读量:16 收藏

Operation Zero

The U.S. Treasury Department has sanctioned a Russian exploit broker who bought stolen hacking tools from a former executive of a U.S. defense contractor.

The Department's Office of Foreign Assets Control (OFAC) designated Matrix LLC (doing business as Operation Zero and headquartered in St. Petersburg, Russia) on Tuesday, along with its owner, Sergey Sergeyevich Zelenyuk, and five associated individuals and companies.

OFAC sanctioned the targets under the Protecting American Intellectual Property Act (PAIPA), a law specifically targeting intellectual property theft by foreign adversaries, the first time that law has been used since its enactment.

Wiz

The designations also coincide with the sentencing of Peter Williams, a 39-year-old Australian national and former general manager of Trenchant, a cybersecurity unit of U.S. defense contractor L3Harris that develops zero-day exploits and surveillance tools.

Williams was sentenced Tuesday to 87 months in prison after pleading guilty in October to stealing eight zero-day exploits from Trenchant and selling them to Operation Zero for approximately $1.3 million in cryptocurrency, even though they were designed exclusively for use by the U.S. government and allied intelligence agencies.

Operation Zero is offering millions of dollars in bounties to security researchers and others for the development or acquisition of exploits targeting commonly used software, including U.S.-built operating systems and encrypted messaging applications.

The company, whose clients also include the Russian government, says it's selling zero-day exploits only to Russian private and government organizations.

"Zelenyuk and Operation Zero trade in 'exploits'—pieces of code or techniques that take advantage of vulnerabilities in a computer program to allow users to gain unauthorized access, steal information, or take control of an electronic device—and have offered rewards to anyone who will provide them with exploits for U.S.-built software," the Department of the Treasury said.

"Among the exploits that Operation Zero acquired were at least eight proprietary cyber tools, which were created for the exclusive use of the U.S. government and select allies and which were stolen from a U.S. company.  Operation Zero then sold those stolen tools to at least one unauthorized user."

OFAC also sanctioned Zelenyuk's UAE-based front company, Special Technology Services LLC, as well as two individuals with prior ties to Operation Zero (including Oleg Vyacheslavovich Kucherov, who is a suspected member of the Trickbot cybercrime gang) and a second exploit brokerage firm, Advance Security Solutions, with operations in the United Arab Emirates and Uzbekistan.

The sanctions freeze all U.S.-held assets belonging to designated entities and individuals and expose American businesses and individuals conducting transactions with them to secondary sanctions or enforcement actions.

tines

The future of IT infrastructure is here

Modern IT infrastructure moves faster than manual workflows can handle.

In this new Tines guide, learn how your team can reduce hidden manual delays, improve reliability through automated response, and build and scale intelligent workflows on top of tools you already use.


文章来源: https://www.bleepingcomputer.com/news/security/us-sanctions-russian-exploit-broker-for-buying-stolen-zero-days/
如有侵权请联系:admin#unsafe.sh