Ex-L3Harris Exec Convicted for Selling Cyber Exploits to Russia

▼ Summary
– Peter Williams, a former L3Harris Trenchant manager, pleaded guilty to stealing and selling confidential cybersecurity information to a Russian broker.
– He stole at least eight protected cyber-exploit components intended for the U.S. government and allies between 2022 and 2025.
– Williams sold the trade secrets for $1.3 million in cryptocurrency, which were valued at $35 million and gave Russian cyber actors an advantage.
– He faces up to 10 years in prison and fines of $250,000 or twice the gain or loss from the offense after his guilty plea.
– The Russian broker, suspected to be Operation Zero, was not officially named, and it is unknown if recent Chrome zero-days involved Williams’ stolen exploits.
A former L3Harris Trenchant executive has admitted guilt in a U.S. federal court for pilfering and selling classified cybersecurity materials to a Russian entity specializing in vulnerability exploits. Peter Williams, an Australian national who served as general manager at the defense contractor, engaged in this illicit activity from 2022 through 2025, during which he stole no fewer than eight protected cyber-exploit components. These tools were developed specifically for restricted use by the U.S. government and its closest international partners.
According to the U.S. Department of Justice, Williams exploited his senior position and high-level security clearance at Trenchant to access and steal trade secrets valued at approximately $35 million. He then sold these assets to an unnamed Russian broker for $1.3 million in cryptocurrency. The stolen materials included national security-grade software components designed for both offensive and defensive cyber operations.
Trenchant operates as a specialized cyber capabilities division within L3Harris Technologies, focusing on vulnerability research and the creation of sophisticated tools utilized by defense and intelligence agencies across the Five Eyes alliance. Williams not only transferred these sensitive components but also entered into formal agreements with the Russian broker, committing to provide ongoing technical support for the deployed exploits.
An FBI representative from the Counterintelligence Division, Roman Rozhavsky, emphasized the severity of the breach, stating that Williams’ actions directly empowered Russian cyber operatives, enhancing their ability to target American citizens and commercial enterprises. While the Department of Justice refrained from publicly identifying the purchasing broker, previous investigative reports point to Operation Zero, a Russia-based platform known for acquiring zero-day vulnerabilities, particularly those enabling remote code execution without user interaction.
Media outlets have attempted to contact Operation Zero for comment regarding these allegations, but no official response has been provided. Following his guilty plea, Williams now confronts serious legal consequences, including a potential prison sentence of up to ten years and financial penalties reaching $250,000 or double the monetary impact linked to his crimes.
In a related development, Trenchant has initiated an internal inquiry concerning the possible leakage of Google Chrome zero-day vulnerabilities, with another staff member, Jay Gibson, under scrutiny for his expertise in iOS zero-day exploits. Recent years have witnessed a troubling surge in Chrome zero-day attacks, with six documented instances in 2025 alone, following ten in 2024, eight in 2023, and nine in 2022. Investigators have yet to determine whether any of these incidents involved the exploits Williams sold to the Russian broker.
(Source: Bleeping Computer)
