Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Chinese AI Firms Hit Claude with Distillation Attacks, Anthropic Warns

February 26, 2026

Notepad++ Fixes Hijacked Update Mechanism Used to Deliver Targeted Malware

February 26, 2026

Former Defense Contractor Boss Gets 7+ Years for Selling Zero Days

February 25, 2026
Facebook X (Twitter) Instagram
Thursday, February 26
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Former Defense Contractor Boss Gets 7+ Years for Selling Zero Days
News

Former Defense Contractor Boss Gets 7+ Years for Selling Zero Days

Team-CWDBy Team-CWDFebruary 25, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A former senior executive at a US defense contractor has been handed an 87-month jail term after selling zero-day exploits to a Russian broker.

Australian national Peter Williams, 39, is the former general manager of L3Harris cyber-division Trenchant – a company that develops digital surveillance tools for Five Eyes agencies.

In addition to the jail term, he was ordered to serve three years of supervised release with special conditions, to forfeit $1.3m, cryptocurrency, a house, and luxury items including watches and jewelry.

“Williams took trade secrets comprised of national security software and sold them for up to $4m in cryptocurrency. These incredibly powerful tools would have allowed Russia to access millions of digital devices,” said US attorney Jeanine Pirro for the District of Columbia.

“By betraying a position of trust and selling sensitive American technology, Williams’ crime is not only one of theft, it is a crime of national security. Our nation’s defense capabilities are not commodities to be auctioned off.”

Read more on the trade in zero-day exploits: Pall Mall Process to Define Responsible Commercial Cyber Intrusion.

Williams pleaded guilty last October to two counts of theft of trade secrets.

He admitted to stealing eight “cyber-exploit components” over a three-year period and selling them to a Russian broker in exchange for crypto payments. The broker counts the Russian government among its clients.

Williams not only sold the exploits but agreed to provide “follow-on support” for which he was also paid, according to the Justice Department (DoJ).

He also admitted that his actions cost Trenchant/L3Harris $35m and had a “significant impact” on customers including the US and allied governments.

Sanctions in Place

The case shines a light on the murky world of commercial spyware; something Western governments are increasingly concerned about.

To tackle the trade, a joint agreement, dubbed the “Pall Mall Process,” was signed in 2024 by 25 countries led by the UK, US and France, as well as tech giants including Google, Microsoft, Apple, Meta and others.

The State Department announced on February 24 that it was issuing sanctions on the broker Williams sold his zero-days to under the Protecting American Intellectual Property Act (PAIPA).

They apply to Matrix LLC (aka Operation Zero), its sole owner, Sergey Sergeyevich Zelenyuk, and four “associated individuals and entities.”

“All property and interests in property of those designated that are in the United States or that are in possession or control of a US person are blocked,” the State Department said. “US persons are generally prohibited from conducting business with sanctioned persons, and persons that engage in certain transactions or activities with those designated may expose themselves to sanctions risk.”

Zelenyuk has apparently founded a new UAE-based company under the name Special Technology Services with the intention of evading US sanctions.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleCISA Flags Four Security Flaws Under Active Exploitation in Latest KEV Update
Next Article Notepad++ Fixes Hijacked Update Mechanism Used to Deliver Targeted Malware
Team-CWD
  • Website

Related Posts

News

Chinese AI Firms Hit Claude with Distillation Attacks, Anthropic Warns

February 26, 2026
News

Notepad++ Fixes Hijacked Update Mechanism Used to Deliver Targeted Malware

February 26, 2026
News

CISA Flags Four Security Flaws Under Active Exploitation in Latest KEV Update

February 25, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

What are brushing scams and how do I stay safe?

December 24, 2025

Why you should never pay to get paid

September 15, 2025

Look out for phony verification pages spreading malware

September 14, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.