Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
US Targets Exploit Brokers for Cyber Tool Theft

US Targets Exploit Brokers for Cyber Tool Theft

Posted on February 25, 2026 By CWS

The U.S. Department of the Treasury has taken unprecedented action against a Russian network accused of stealing American cyber tools. On February 24, 2026, the Office of Foreign Assets Control (OFAC) sanctioned Sergey Sergeyevich Zelenyuk and his company, Matrix LLC, known publicly as Operation Zero. This move targets entities that have reportedly compromised U.S. national security by acquiring and distributing harmful cyber tools.

First Use of PAIPA Sanctions

This marks the inaugural application of the Protecting American Intellectual Property Act (PAIPA) to sanction foreign entities. The act aims to deter the theft of U.S. intellectual property by imposing penalties on foreign actors who profit from such activities. The sanctions highlight a shift in enforcement against international entities involved in cyber theft.

Central to this case is Peter Williams, an Australian who once worked at Trenchant, a cybersecurity unit of U.S. defense contractor L3Harris. Between 2022 and 2025, Williams misused his access to steal at least eight zero-day exploits, selling them to Operation Zero for $1.3 million in cryptocurrency. The theft reportedly caused $35 million in losses to Trenchant. Williams pleaded guilty to theft of trade secrets and received a sentence of 87 months in federal prison.

Operation Zero’s Role in Exploit Brokering

Active since 2021, Operation Zero has made a name as a broker of exploits, offering significant bounties for zero-day vulnerabilities in widely used software. The company targets software from non-NATO countries, including U.S. systems. The group does not inform software vendors about discovered vulnerabilities, posing a threat to global cybersecurity.

Beyond brokering, Zelenyuk and Operation Zero have been involved in developing spyware and techniques to extract data from AI models. They have also recruited hackers through social media to bolster their operations. Tools stolen from Trenchant were sold to unauthorized users, potentially compromising millions of devices worldwide.

Sanctioned Entities and Individuals

Alongside Zelenyuk, several individuals and entities have been sanctioned. These include Marina Evgenyevna Vasanovich, Zelenyuk’s assistant, and Special Technology Services LLC FZ, a UAE-based affiliate controlled by Zelenyuk. Other sanctioned parties include Oleg Vyacheslavovich Kucherov, a suspected member of the TrickBot gang, and Azizjon Makhmudovich Mamashoyev, operator of Advance Security Solutions.

These sanctions block any U.S.-held assets of the designated parties and prohibit U.S. persons from engaging with them. The Department of State has also issued designations under PAIPA, reinforcing the U.S. commitment to protecting its intellectual property.

Treasury Secretary Scott Bessent emphasized the administration’s resolve to hold accountable those who steal U.S. trade secrets, using all available legal measures to safeguard national security and intellectual property.

Cyber Security News Tags:cyber tools, Cybersecurity, exploit brokers, intellectual property, national security, OFAC, Operation Zero, PAIPA, TrickBot, US sanctions

Post navigation

Previous Post: GitHub Codespaces Vulnerability Enables Repository Takeover
Next Post: Critical Apache ActiveMQ Flaw Exploited for Ransomware Attack

Related Posts

Sonesta International Hotels Implements Industry-Leading Cloud Security Through AccuKnox Collaboration Sonesta International Hotels Implements Industry-Leading Cloud Security Through AccuKnox Collaboration Cyber Security News
HardBit 4.0 Ransomware Actors Attack Open RDP and SMB Services to Persist Access HardBit 4.0 Ransomware Actors Attack Open RDP and SMB Services to Persist Access Cyber Security News
Open VSX Registry Addresses Leaked Tokens and Malicious Extensions in Wake of Security Scare Open VSX Registry Addresses Leaked Tokens and Malicious Extensions in Wake of Security Scare Cyber Security News
How IOC Feeds Streamline Response and Threat Hunting for Best SOC Teams  How IOC Feeds Streamline Response and Threat Hunting for Best SOC Teams  Cyber Security News
Windows Defender Enhancements for Advanced Threat Mitigation Windows Defender Enhancements for Advanced Threat Mitigation Cyber Security News
New Wave of Steganography Attacks: Hackers Hiding XWorm in PNGs  New Wave of Steganography Attacks: Hackers Hiding XWorm in PNGs  Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hacker Exploits AI to Breach Mexican Government Systems
  • Critical Cisco Vulnerability Exposes SD-WAN to Attacks
  • SURXRAT Android Malware Threatens Global Device Security
  • Cortex XDR Vulnerability Enables Covert Command Channels
  • Cybercriminals Exploit Fake Avast Site for Credit Card Data

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Hacker Exploits AI to Breach Mexican Government Systems
  • Critical Cisco Vulnerability Exposes SD-WAN to Attacks
  • SURXRAT Android Malware Threatens Global Device Security
  • Cortex XDR Vulnerability Enables Covert Command Channels
  • Cybercriminals Exploit Fake Avast Site for Credit Card Data

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News