Close Menu
TechBrunchTechBrunch
  • Home
  • AI
  • Apps
  • Crypto
  • Security
  • Startups
  • TechCrunch
  • Venture

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

What's Hot

FBI announces suspension of phishing operation that targeted thousands of victims

April 13, 2026

Booking.com confirms hackers accessed customer data

April 13, 2026

Vercel CEO Guillermo Rauch suggests AI agent is ready for IPO as revenue soars

April 13, 2026
Facebook X (Twitter) Instagram
TechBrunchTechBrunch
  • Home
  • AI

    OpenAI seeks to extend human lifespans with the help of longevity startups

    January 17, 2025

    Farewell to the $200 million woolly mammoth and TikTok

    January 17, 2025

    Nord Security founder launches Nexos.ai to help enterprises move AI projects from pilot to production

    January 17, 2025

    Data proves it remains difficult for startups to raise capital, even though VCs invested $75 billion in the fourth quarter

    January 16, 2025

    Apple suspends AI notification summaries for news after generating false alerts

    January 16, 2025
  • Apps

    Google brings Pixel 6 and new devices to Material3 Expressive, along with other features, to the Pixel 6 and new devices

    September 3, 2025

    Google's NoteBookLM now allows you to customize the tone of your AI podcasts

    September 3, 2025

    Roblox expands the use of age estimation techniques and introduces standardized assessments

    September 3, 2025

    Instagram finally launches the iPad app

    September 3, 2025

    Complete the 2025 Confusion Builder Stage Agenda with the Maximum Scaling Voice

    September 3, 2025
  • Crypto

    Last 2 days to save up to $500 on Disrupt 2026 tickets

    April 9, 2026

    British cryptologist Adam Back denies NYT report that he is Bitcoin founder Satoshi Nakamoto

    April 8, 2026

    4 days left to save nearly $500 on Disrupt 2026 passes

    April 7, 2026

    Google paid startup Form Energy $1 billion for a high-capacity battery that lasts 100 hours.

    February 26, 2026

    Welcome to the post-hype crypto market

    February 25, 2026
  • Security

    FBI announces suspension of phishing operation that targeted thousands of victims

    April 13, 2026

    Booking.com confirms hackers accessed customer data

    April 13, 2026

    Anodot hack leaves more than a dozen compromised companies facing extortion charges

    April 13, 2026

    France ditches Windows for Linux to reduce dependence on US technology

    April 10, 2026

    Hackers stole £700,000 from British energy company by redirecting payments

    April 9, 2026
  • Startups

    7 days left: Founders and VCs save over $300 on all stage passes

    March 24, 2025

    AI chip startup Furiosaai reportedly rejecting $800 million acquisition offer from Meta

    March 24, 2025

    20 Hottest Open Source Startups of 2024

    March 22, 2025

    Andrill may build a weapons factory in the UK

    March 21, 2025

    Startup Weekly: Wiz bets paid off at M&A Rich Week

    March 21, 2025
  • TechCrunch

    OpenSea takes a long-term view with a focus on UX despite NFT sales remaining low

    February 8, 2024

    AI will save software companies' growth dreams

    February 8, 2024

    B2B and B2C are not about who buys, but how you sell

    February 5, 2024

    It's time for venture capital to break away from fast fashion

    February 3, 2024

    a16z's Chris Dixon believes it's time to focus on blockchain use cases rather than speculation

    February 2, 2024
  • Venture

    Vercel CEO Guillermo Rauch suggests AI agent is ready for IPO as revenue soars

    April 13, 2026

    Nvidia-backed SiFive open AI chip reaches $3.65 billion valuation

    April 11, 2026

    Last 24 hours: Save up to $500 on Disrupt 2026 passes

    April 10, 2026

    How to get into the Startup Battlefield Top 20 — and what every company can gain nonetheless

    April 9, 2026

    Collide Capital raises $95 million to back fintech, future of work startups

    April 9, 2026
TechBrunchTechBrunch

The inside story of the US defense contractor who leaked hacking tools to Russia

TechBrunchBy TechBrunchFebruary 25, 20269 Mins Read
Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
Share
Facebook Twitter LinkedIn Pinterest Telegram Email


A veteran cybersecurity executive who prosecutors said “betrayed” the United States will spend at least the next seven years in prison after pleading guilty to stealing hacking and surveillance tools and selling them to a Russian company.

Peter Williams, a former executive at US defense contractor L3Harris, was sentenced on Tuesday to 87 months in prison for leaking his former company's trade secrets in exchange for $1.3 million in virtual currency between 2022 and 2025. Williams sold the exploit to Operation Zero, which the U.S. government calls “one of the most nefarious exploit brokers in the world.”

Williams' conviction follows one of the most high-profile leaks of classified Western-made hacking tools in recent years. Even though the case is over, there are still unanswered questions.

Mr. Williams, a 39-year-old Australian national who lives in Washington, D.C., was the general manager of Trenchint, a division of L3Harris that develops hacking and surveillance tools for the U.S. government and its closest global intelligence partners. Prosecutors said Williams used his “full access” to the company's secure network to download hacking tools onto a portable hard drive and then onto his own computer. However, since Williams contacted Operation Zero under a false name, it is unclear whether Operation Zero knew Williams' true identity.

Trenchant is a team of hackers and bug hunters who dig deep into other popular software created by companies like Google and Apple, identify flaws in their millions of lines of code, and devise techniques to turn those flaws into workable exploits that can be used to reliably hack those products. These tools are commonly referred to as zero-day exploits because they exploit flaws in the software that the developers are unaware of. This could be worth millions of dollars.

The US Department of Justice claimed that anyone using the hacking tools Williams sold “could potentially gain access to millions of computers and devices around the world.”

Over the past several months, I have been speaking with sources and reporting on Mr. Williams' story, even before news broke that he had been arrested. But what I was hearing was patchy and sometimes contradictory. I had heard that someone had been arrested, but that would be difficult to prove given the secretive nature of the work involved in exploit development.

Contact Us Do you have more information about this incident and the alleged leak of Trenchint's hacking tools? You can contact Lorenzo Franceschi-Bicchierai securely from a non-work device on Signal (+1 917 257 1382) or on Telegram, Keybase and Wire @lorenzofb, or by email.

When I first heard about Williams, I couldn't even get his name right. At that point, his story was a rumor, quietly circulating among zero-day exploit developers, sellers, and people connected to the intelligence community.

I heard he was probably called John, or Duggan. Or there are different ways to spell it in English.

Some of the initial rumors I heard were contradictory. Apparently he stole the zero-day from Trentint and sold it to Russia, or to another enemy of the US and its allies, countries like North Korea and China?

It took me weeks just to confirm that someone who even fit that description actually existed. (It turns out Williams' middle name is John, and Dougie is his nickname in hacker circles.)

Then, as the weeks of reporting continued, the picture began to become clearer.

Connection with Russia

As I first revealed in October, Trenchint fired the employee after Mr. Williams, who was still the head of Trenchint at the time, accused the employee of stealing and leaking the Chrome zero-day. The story got even more interesting because the employee told me that after he was fired, Apple notified him that someone had targeted his personal iPhone.

What I learned is just the tip of the iceberg. I had heard more details from sources, but I was still piecing together parts of the story.

Shortly thereafter, prosecutors for the first time formally charged a man named Peter Williams with stealing trade secrets, which surfaced for the first time in a U.S. trial. In its first court document, prosecutors identified the purchaser of these trade secrets as a Russian purchaser.

However, there was no explicit reference to L3 Harris or Trentint, nor was there any evidence that the trade secrets Williams stole were zero-days. Crucially, it could not yet be confirmed with certainty that it was the same Peter Williams, who as Trenchant's boss was thought to have access to highly sensitive exploits, and that it was not some gross case of mistaken identity.

we weren't there yet.

Acting on a hunch that we had nothing to lose, we contacted the Department of Justice and asked if they could confirm that the person in this document was indeed Peter Williams, L3 Harris Trentent's former boss. A spokesperson confirmed this.

The story has finally come out. A week later, Williams pleaded guilty.

When I first heard his story, I trusted the source but remained skeptical. Why would someone like Williams do what the rumors say? But he did it for the money, prosecutors say, and Williams used the money to buy a house, jewelry and a luxury watch.

It was a stunning fall from grace for Williams, who was once considered a skilled and talented hacker, especially for someone who previously worked for Australia's top foreign intelligence agency and served in the country's military.

L3Harris Building in Burlington, Canada Image Credit: JHVE Photo / Getty Images

What happened to the stolen exploit?

It is not yet known exactly what exploits and hacking tools Williams stole and sold. Trenchent estimated the loss at $35 million in court documents, but said the stolen tools were not classified as government secrets.

You can gain some insight based on the circumstances of the incident.

Given that the Justice Department said the stolen tools could be used to hack “millions of computers and devices,” the tools likely refer to zero-days in consumer software such as Android devices, Apple's iPhones and iPads, and web browsers.

There is some evidence pointing in their direction. At last year's hearing, prosecutors read out posts posted on X by Operation Zero, said Kim Zetter, an independent cybersecurity reporter who attended the hearing.

“Due to high market demand, we're increasing the amount we pay for our top mobile exploits,” the post said, specifically mentioning Android and iOS. “As always, the end users are non-NATO countries.”

Operation Zero offers millions of dollars for details of security vulnerabilities in Android devices and iPhones, messaging apps such as Telegram, other types of software such as Microsoft Windows, and hardware vendors such as several brands of servers and routers.

Operation Zero claims to be working with the Russian government. By the time Williams sold the exploit to a Russian broker, Putin's invasion of Ukraine had already begun in earnest.

On the same day that Williams was sentenced, the U.S. Treasury Department announced sanctions against Operation Zero and its founder Sergei Zelenyuk, calling the company a national security threat. This was the government's first confirmation that Williams sold the exploit to Operation Zero.

The Treasury Department said in a statement that the broker “sold the stolen tools to at least one unauthorized user.” At this time, we do not know who this user is. The user could be a foreign intelligence agency or even a ransomware gang, given that the Treasury Department has also sanctioned Oleg Vyacheslavovich Kucherov, a member of the Trickbot gang who allegedly collaborated with Operation Zero.

Prosecutors said in court documents that L3Harris was able to figure out that “an unauthorized vendor was selling the component,” which was one of the stolen trade secrets, “by comparing matches to company-specific vendor data found on the stolen components.”

Prosecutors also said Williams “realized that the code he wrote and sold” to Operation Zero was being used by Korean brokers, further suggesting that both L3Harris and prosecutors knew which tools were stolen and sold to Operation Zero.

Another open question is whether, now that the exploit has been leaked, either the U.S. government or L3Harris has warned Apple, Google, or other tech companies that their products are affected by the zero-day flaw.

Every company and developer wants to know that someone may have used (or is currently using) a zero-day against a user or customer so they can fix the flaw as quickly as possible. And right now, zero-days are of no use to L3Harris and its government customers.

When we contacted Apple and Google, neither company responded. L3 Harris also did not respond.

Who hacked Scapegoat and why?

Then there's the mystery of the scapegoat, who was fired after Williams accused him of stealing and leaking code.

At sentencing, Justice Department prosecutors acknowledged that the employee was fired and said Williams “stood by and did nothing while another employee of the company was essentially held accountable.” [his] own actions. '' Williams' lawyers rejected the prosecution's claims, arguing that the former employee was “terminated for misconduct,'' citing allegations of dual employment and mishandling of the company's intellectual property.

As part of L3Harris' internal investigation, the company placed employees on leave, seized devices, transported them to the United States, and “provided them to the FBI,” according to court documents filed by Williams' attorneys.

Asked for comment, an anonymous FBI spokesperson said the FBI had nothing to add beyond the Justice Department's press release.

After being fired, the employee, whom we identified under the alias Jay Gibson, received a notification from Apple that his personal iPhone had been targeted in a “mercenary spyware attack.”

Apple sends these notifications to users it believes are targets of attacks using tools such as those created by NSO Group and Intellexa.

Who tried to hack Gibson? He received the notification on March 5, 2025, more than six months after the FBI investigation began. The FBI was 'in regular contact' [Williams] “From the end of 2024 until the summer of 2025,” court documents state.

Given the nature of the leaked tools, it's plausible that the FBI, or perhaps the U.S. intelligence community, targeted Gibson as part of their investigation into the Williams leak. But we just don't know, and the public and Gibson may never know.



Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

FBI announces suspension of phishing operation that targeted thousands of victims

April 13, 2026

Booking.com confirms hackers accessed customer data

April 13, 2026

Anodot hack leaves more than a dozen compromised companies facing extortion charges

April 13, 2026

France ditches Windows for Linux to reduce dependence on US technology

April 10, 2026

Hackers stole £700,000 from British energy company by redirecting payments

April 9, 2026

WireGuard VPN developer can no longer ship software updates after Microsoft locks account

April 8, 2026

Leave A Reply Cancel Reply

Top Reviews
Editors Picks

7 days left: Founders and VCs save over $300 on all stage passes

March 24, 2025

AI chip startup Furiosaai reportedly rejecting $800 million acquisition offer from Meta

March 24, 2025

20 Hottest Open Source Startups of 2024

March 22, 2025

Andrill may build a weapons factory in the UK

March 21, 2025
About Us
About Us

Welcome to Tech Brunch, your go-to destination for cutting-edge insights, news, and analysis in the fields of Artificial Intelligence (AI), Cryptocurrency, Technology, and Startups. At Tech Brunch, we are passionate about exploring the latest trends, innovations, and developments shaping the future of these dynamic industries.

Our Picks

FBI announces suspension of phishing operation that targeted thousands of victims

April 13, 2026

Booking.com confirms hackers accessed customer data

April 13, 2026

Vercel CEO Guillermo Rauch suggests AI agent is ready for IPO as revenue soars

April 13, 2026

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

© 2026 TechBrunch. Designed by TechBrunch.
  • Home
  • About Tech Brunch
  • Advertise with Tech Brunch
  • Contact us
  • DMCA Notice
  • Privacy Policy
  • Terms of Use

Type above and press Enter to search. Press Esc to cancel.