Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
US Targets Exploit Brokers for Cyber Tool Theft

US Targets Exploit Brokers for Cyber Tool Theft

Posted on February 25, 2026 By CWS

The U.S. Department of the Treasury has taken unprecedented action against a Russian network accused of stealing American cyber tools. On February 24, 2026, the Office of Foreign Assets Control (OFAC) sanctioned Sergey Sergeyevich Zelenyuk and his company, Matrix LLC, known publicly as Operation Zero. This move targets entities that have reportedly compromised U.S. national security by acquiring and distributing harmful cyber tools.

First Use of PAIPA Sanctions

This marks the inaugural application of the Protecting American Intellectual Property Act (PAIPA) to sanction foreign entities. The act aims to deter the theft of U.S. intellectual property by imposing penalties on foreign actors who profit from such activities. The sanctions highlight a shift in enforcement against international entities involved in cyber theft.

Central to this case is Peter Williams, an Australian who once worked at Trenchant, a cybersecurity unit of U.S. defense contractor L3Harris. Between 2022 and 2025, Williams misused his access to steal at least eight zero-day exploits, selling them to Operation Zero for $1.3 million in cryptocurrency. The theft reportedly caused $35 million in losses to Trenchant. Williams pleaded guilty to theft of trade secrets and received a sentence of 87 months in federal prison.

Operation Zero’s Role in Exploit Brokering

Active since 2021, Operation Zero has made a name as a broker of exploits, offering significant bounties for zero-day vulnerabilities in widely used software. The company targets software from non-NATO countries, including U.S. systems. The group does not inform software vendors about discovered vulnerabilities, posing a threat to global cybersecurity.

Beyond brokering, Zelenyuk and Operation Zero have been involved in developing spyware and techniques to extract data from AI models. They have also recruited hackers through social media to bolster their operations. Tools stolen from Trenchant were sold to unauthorized users, potentially compromising millions of devices worldwide.

Sanctioned Entities and Individuals

Alongside Zelenyuk, several individuals and entities have been sanctioned. These include Marina Evgenyevna Vasanovich, Zelenyuk’s assistant, and Special Technology Services LLC FZ, a UAE-based affiliate controlled by Zelenyuk. Other sanctioned parties include Oleg Vyacheslavovich Kucherov, a suspected member of the TrickBot gang, and Azizjon Makhmudovich Mamashoyev, operator of Advance Security Solutions.

These sanctions block any U.S.-held assets of the designated parties and prohibit U.S. persons from engaging with them. The Department of State has also issued designations under PAIPA, reinforcing the U.S. commitment to protecting its intellectual property.

Treasury Secretary Scott Bessent emphasized the administration’s resolve to hold accountable those who steal U.S. trade secrets, using all available legal measures to safeguard national security and intellectual property.

Cyber Security News Tags:cyber tools, Cybersecurity, exploit brokers, intellectual property, national security, OFAC, Operation Zero, PAIPA, TrickBot, US sanctions

Post navigation

Previous Post: GitHub Codespaces Vulnerability Enables Repository Takeover
Next Post: Critical Apache ActiveMQ Flaw Exploited for Ransomware Attack

Related Posts

ASUS MyASUS Flaw Lets Hackers Escalate to SYSTEM-Level Access ASUS MyASUS Flaw Lets Hackers Escalate to SYSTEM-Level Access Cyber Security News
New Ghost Tapped Attack Uses Your Android Device to Drain Your Bank Account New Ghost Tapped Attack Uses Your Android Device to Drain Your Bank Account Cyber Security News
AWS Addresses Major Security Flaws in RES Platform AWS Addresses Major Security Flaws in RES Platform Cyber Security News
Warlock Ransomware Actors Exploiting Sharepoint ToolShell Zero-Day Vulnerability in New Attack Wave Warlock Ransomware Actors Exploiting Sharepoint ToolShell Zero-Day Vulnerability in New Attack Wave Cyber Security News
Authorities Dismantle Cybercrime-as-a-Service Platform, Seize 40,000 Active SIM Cards Authorities Dismantle Cybercrime-as-a-Service Platform, Seize 40,000 Active SIM Cards Cyber Security News
Microsoft Teams to Introduce External Domains Anomalies Report for Enhanced Security Microsoft Teams to Introduce External Domains Anomalies Report for Enhanced Security Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical Adobe Reader Flaw Patched After Months of Exploitation
  • Critical Adobe Acrobat Reader Flaw Patched Amid Exploitation
  • CPUID Breach: STX RAT Spread via Compromised Downloads
  • OpenAI Urges macOS Users to Update Apps Amid Security Threat
  • Google Enhances Gmail with Mobile End-to-End Encryption

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical Adobe Reader Flaw Patched After Months of Exploitation
  • Critical Adobe Acrobat Reader Flaw Patched Amid Exploitation
  • CPUID Breach: STX RAT Spread via Compromised Downloads
  • OpenAI Urges macOS Users to Update Apps Amid Security Threat
  • Google Enhances Gmail with Mobile End-to-End Encryption

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark