Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Ex-Defense Employee Sentenced for Selling Zero-Day Exploits

Ex-Defense Employee Sentenced for Selling Zero-Day Exploits

Posted on February 25, 2026 By CWS

An Australian national formerly working for U.S. defense contractor L3Harris has received a prison sentence exceeding seven years for selling zero-day exploits to a Russian broker. Peter Williams, 39, was convicted for illegally distributing eight zero-day exploits to Operation Zero, a known Russian entity, reportedly earning millions in cryptocurrency.

Details of the Conviction

Williams admitted guilt to two counts of trade secret theft in October 2025. His sentence includes over seven years in prison, three years of supervised release, and the forfeiture of illicit assets acquired through the illicit sales, including properties and luxury items. These actions were uncovered by journalist Kim Zetter, who linked the trades to Operation Zero late last year.

The specific nature of the exploits remains undisclosed, but information from a recent sentencing memorandum indicates they could be used in various cybercrimes, from espionage to cyber fraud. Assistant Attorney General John A. Eisenberg emphasized the betrayal of trust, as these exploits were intended to bolster U.S. national defense.

Operation Zero’s Role

U.S. Attorney Jeanine Pirro revealed that Williams’ sales potentially earned him up to $4 million in cryptocurrency, and the exploits could facilitate unauthorized access to countless digital devices. The breaches took place over three years, from 2022 to 2025, causing an estimated $35 million loss for L3Harris.

The U.S. State Department, under the Protecting American Intellectual Property Act, has sanctioned Operation Zero and its affiliated entities and individuals. These include Sergey Sergeyevich Zelenyuk, who founded Operation Zero and STS, to circumvent U.S. sanctions and engage in global business.

Responses from Authorities

The U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) has also imposed sanctions on Zelenyuk, Operation Zero, and others involved in distributing harmful cyber tools. Operation Zero reportedly offered substantial bounties for various exploits, with a history of recruiting hackers and establishing ties with foreign intelligence agencies.

Zelenyuk purportedly assured that the sold exploits would only reach non-NATO customers. The Treasury Department linked these activities to efforts to develop cyber intelligence tools, such as spyware and AI data extraction methods.

Additional sanctioned individuals and firms include Marina Evgenyevna Vasanovich, Azizjon Makhmudovich Mamashoyev, and Oleg Vyacheslavovich Kucherov, among others. The FBI’s Roman Rozhavsky warned against prioritizing personal gain over national security, affirming that breaches of trust will be met with justice.

As the case concludes, the implications for national security and international relations remain significant, emphasizing the importance of safeguarding sensitive information within the cybersecurity domain.

The Hacker News Tags:Cryptocurrency, Cybersecurity, L3Harris, national security, Operation Zero, Peter Williams, Russian broker, trade secrets, U.S. State Department, zero-day exploits

Post navigation

Previous Post: Windows 11 Update Enhances AI and User Interface
Next Post: Astelia Secures $35M to Enhance Cybersecurity Solutions

Related Posts

NGINX Vulnerability Exploited in Web Traffic Hijacking NGINX Vulnerability Exploited in Web Traffic Hijacking The Hacker News
Astaroth Banking Trojan Abuses GitHub to Remain Operational After Takedowns Astaroth Banking Trojan Abuses GitHub to Remain Operational After Takedowns The Hacker News
ZeroDayRAT Spyware Threatens Android and iOS Security ZeroDayRAT Spyware Threatens Android and iOS Security The Hacker News
Why Non-Human Identity Management is the Next Cybersecurity Frontier Why Non-Human Identity Management is the Next Cybersecurity Frontier The Hacker News
Operation Endgame Dismantles Rhadamanthys, Venom RAT, and Elysium Botnet in Global Crackdown Operation Endgame Dismantles Rhadamanthys, Venom RAT, and Elysium Botnet in Global Crackdown The Hacker News
Three PCIe Encryption Weaknesses Expose PCIe 5.0+ Systems to Faulty Data Handling Three PCIe Encryption Weaknesses Expose PCIe 5.0+ Systems to Faulty Data Handling The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Kali Linux Enhances Security Testing with Claude AI
  • Hacker Exploits AI to Breach Mexican Government Systems
  • Critical Cisco Vulnerability Exposes SD-WAN to Attacks
  • SURXRAT Android Malware Threatens Global Device Security
  • Cortex XDR Vulnerability Enables Covert Command Channels

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Kali Linux Enhances Security Testing with Claude AI
  • Hacker Exploits AI to Breach Mexican Government Systems
  • Critical Cisco Vulnerability Exposes SD-WAN to Attacks
  • SURXRAT Android Malware Threatens Global Device Security
  • Cortex XDR Vulnerability Enables Covert Command Channels

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News