Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Ex-Defense Employee Sentenced for Selling Zero-Day Exploits

Ex-Defense Employee Sentenced for Selling Zero-Day Exploits

Posted on February 25, 2026 By CWS

An Australian national formerly working for U.S. defense contractor L3Harris has received a prison sentence exceeding seven years for selling zero-day exploits to a Russian broker. Peter Williams, 39, was convicted for illegally distributing eight zero-day exploits to Operation Zero, a known Russian entity, reportedly earning millions in cryptocurrency.

Details of the Conviction

Williams admitted guilt to two counts of trade secret theft in October 2025. His sentence includes over seven years in prison, three years of supervised release, and the forfeiture of illicit assets acquired through the illicit sales, including properties and luxury items. These actions were uncovered by journalist Kim Zetter, who linked the trades to Operation Zero late last year.

The specific nature of the exploits remains undisclosed, but information from a recent sentencing memorandum indicates they could be used in various cybercrimes, from espionage to cyber fraud. Assistant Attorney General John A. Eisenberg emphasized the betrayal of trust, as these exploits were intended to bolster U.S. national defense.

Operation Zero’s Role

U.S. Attorney Jeanine Pirro revealed that Williams’ sales potentially earned him up to $4 million in cryptocurrency, and the exploits could facilitate unauthorized access to countless digital devices. The breaches took place over three years, from 2022 to 2025, causing an estimated $35 million loss for L3Harris.

The U.S. State Department, under the Protecting American Intellectual Property Act, has sanctioned Operation Zero and its affiliated entities and individuals. These include Sergey Sergeyevich Zelenyuk, who founded Operation Zero and STS, to circumvent U.S. sanctions and engage in global business.

Responses from Authorities

The U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) has also imposed sanctions on Zelenyuk, Operation Zero, and others involved in distributing harmful cyber tools. Operation Zero reportedly offered substantial bounties for various exploits, with a history of recruiting hackers and establishing ties with foreign intelligence agencies.

Zelenyuk purportedly assured that the sold exploits would only reach non-NATO customers. The Treasury Department linked these activities to efforts to develop cyber intelligence tools, such as spyware and AI data extraction methods.

Additional sanctioned individuals and firms include Marina Evgenyevna Vasanovich, Azizjon Makhmudovich Mamashoyev, and Oleg Vyacheslavovich Kucherov, among others. The FBI’s Roman Rozhavsky warned against prioritizing personal gain over national security, affirming that breaches of trust will be met with justice.

As the case concludes, the implications for national security and international relations remain significant, emphasizing the importance of safeguarding sensitive information within the cybersecurity domain.

The Hacker News Tags:Cryptocurrency, Cybersecurity, L3Harris, national security, Operation Zero, Peter Williams, Russian broker, trade secrets, U.S. State Department, zero-day exploits

Post navigation

Previous Post: Windows 11 Update Enhances AI and User Interface
Next Post: Astelia Secures $35M to Enhance Cybersecurity Solutions

Related Posts

MOVEit Transfer Faces Increased Threats as Scanning Surges and CVE Flaws Are Targeted MOVEit Transfer Faces Increased Threats as Scanning Surges and CVE Flaws Are Targeted The Hacker News
OpenAI Launches ChatGPT Health with Isolated, Encrypted Health Data Controls OpenAI Launches ChatGPT Health with Isolated, Encrypted Health Data Controls The Hacker News
New ‘Curly COMrades’ APT Using NGEN COM Hijacking in Georgia, Moldova Attacks New ‘Curly COMrades’ APT Using NGEN COM Hijacking in Georgia, Moldova Attacks The Hacker News
WhatsApp Issues Emergency Update for Zero-Click Exploit Targeting iOS and macOS Devices WhatsApp Issues Emergency Update for Zero-Click Exploit Targeting iOS and macOS Devices The Hacker News
PLUGGYAPE Malware Uses Signal and WhatsApp to Target Ukrainian Defense Forces PLUGGYAPE Malware Uses Signal and WhatsApp to Target Ukrainian Defense Forces The Hacker News
CISA Adds Citrix NetScaler CVE-2025-5777 to KEV Catalog as Active Exploits Target Enterprises CISA Adds Citrix NetScaler CVE-2025-5777 to KEV Catalog as Active Exploits Target Enterprises The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical Cisco SD-WAN Vulnerability Exploited Since 2023
  • Kali Linux Enhances Security Testing with Claude AI
  • Hacker Exploits AI to Breach Mexican Government Systems
  • Critical Cisco Vulnerability Exposes SD-WAN to Attacks
  • SURXRAT Android Malware Threatens Global Device Security

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical Cisco SD-WAN Vulnerability Exploited Since 2023
  • Kali Linux Enhances Security Testing with Claude AI
  • Hacker Exploits AI to Breach Mexican Government Systems
  • Critical Cisco Vulnerability Exposes SD-WAN to Attacks
  • SURXRAT Android Malware Threatens Global Device Security

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News