Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
U.S. Targets Russian Cyber Exploit Network with Sanctions

U.S. Targets Russian Cyber Exploit Network with Sanctions

Posted on February 26, 2026 By CWS

This week, the United States government imposed sanctions on several individuals and organizations involved in the trade of cyber exploits deemed a threat to national security. This move targets entities linked to the Russian exploit broker known as Operation Zero.

Key Players Identified

The U.S. Department of State has identified Sergey Sergeyevich Zelenyuk as the key figure behind Operation Zero (Matrix LLC) and Special Technology Services LLC FZ (STS). These entities are at the center of the exploit acquisition operation.

Between 2022 and 2025, it is reported that Operation Zero obtained eight zero-day exploits from Peter Williams, a former employee of Trenchant, a division of L3Harris. Williams, an Australian, was convicted in the United States and sentenced to 87 months in prison.

Financial Transactions and Sanctions

These exploits were intended solely for U.S. government and allied use. Operation Zero allegedly paid $1.3 million in cryptocurrency for these cyber tools. The sanctions aim to disrupt these financial flows and the operations of those involved.

The Treasury Department’s Office of Foreign Assets Control (OFAC) has also imposed sanctions on Zelenyuk, his companies, and several affiliated individuals and organizations. The sanctions are part of a broader effort to curb the proliferation of cyber exploits.

Wider Implications and Ongoing Activities

OFAC highlights that Operation Zero sold exploits to non-NATO countries, which were subsequently used in ransomware attacks and other cyber threats. Zelenyuk’s activities included attempts to sell these exploits to foreign intelligence agencies and the development of spyware systems.

Among those sanctioned are Marina Evgenyevna Vasanovich, Zelenyuk’s assistant, Oleg Vyacheslavovich Kucherov from the Trickbot group, and Azizjon Makhmudovich Mamashoyev, a former collaborator with Operation Zero.

Future Outlook

In addition, Advance Security Solutions, a company founded by Mamashoyev operating in the UAE and Uzbekistan, faces sanctions. These actions underline the U.S. commitment to countering cyber threats posed by exploit brokers.

As the U.S. continues its efforts to safeguard national security, these sanctions serve as a significant warning to those engaged in cyber exploit activities. The international community is closely watching to see the impact of these measures on the global cybersecurity landscape.

Security Week News Tags:Cybersecurity, OFAC, Operation Zero, Russian cyber exploits, U.S. sanctions

Post navigation

Previous Post: Firefox 148 Debuts Sanitizer API to Curb XSS Threat
Next Post: Claude Code Flaws Risk Remote Code Attacks

Related Posts

DELMIA Factory Software Vulnerability Exploited in Attacks DELMIA Factory Software Vulnerability Exploited in Attacks Security Week News
Possible Zero-Day Patched in SonicWall SMA Appliances Possible Zero-Day Patched in SonicWall SMA Appliances Security Week News
Cartier Data Breach: Luxury Retailer Warns Customers that Personal Data Was Exposed Cartier Data Breach: Luxury Retailer Warns Customers that Personal Data Was Exposed Security Week News
Opti Raises  Million for Identity Security Platform Opti Raises $20 Million for Identity Security Platform Security Week News
APT-Grade PDFSider Malware Used by Ransomware Groups APT-Grade PDFSider Malware Used by Ransomware Groups Security Week News
Technical Details Published for Critical Cisco IOS XE Vulnerability Technical Details Published for Critical Cisco IOS XE Vulnerability Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Malicious NuGet Package Targets Financial Sector
  • Critical Telnet Flaw Exposes Root Access Vulnerability
  • Zyxel Resolves Critical Security Flaw in Multiple Devices
  • Microsoft Alerts Developers to Malicious Repos Spreading Malware
  • Claude Code Flaws Risk Remote Code Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Malicious NuGet Package Targets Financial Sector
  • Critical Telnet Flaw Exposes Root Access Vulnerability
  • Zyxel Resolves Critical Security Flaw in Multiple Devices
  • Microsoft Alerts Developers to Malicious Repos Spreading Malware
  • Claude Code Flaws Risk Remote Code Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News