Former L3Harris executive Peter Williams sentenced to 87 months for stealing and selling US cyber tools to Russian broker, causing $35M in damages
Former L3Harris executive Peter Williams has been sentenced to 87 months in federal prison for stealing and selling US cyber tools to Russian interests, marking one of the most significant cases of insider threat to national security in recent years.

The Inside Job
The case centers on Peter Williams, 39, who served as general manager of Trenchant, a cyber division of L3Harris Technologies, a major US defense contractor. Between 2022 and 2024, Williams systematically stole eight cyber exploits that were supposed to remain exclusively within US intelligence and defense circles.
Williams admitted to selling these tools to a Russian broker through encrypted communications, accepting payment in cryptocurrency. The Australian national used the proceeds to fund a lavish lifestyle, purchasing luxury items including jewelry, properties, and vacations.
The Damage Assessment
According to court documents, Williams' actions resulted in approximately $35 million in losses to the United States and its allies. The stolen exploits compromised intelligence capabilities and potentially exposed countless potential victims to cyber threats.
US Attorney Jeanine Pirro stated that Williams sold the exploits for up to $4 million in cryptocurrency. A restitution hearing has been scheduled for May 12, and Williams has been ordered to forfeit $1.3 million in cash, cryptocurrency, properties, and luxury items purchased with the illicit proceeds.
FBI Response
Roman Rozhavsky, assistant director of the FBI's Counterintelligence and Espionage Division, emphasized the severity of the breach: "Peter Williams stole a US defense contractor's trade secrets about highly sensitive cyber capabilities and sold them to a broker whose clients include the Russian government, putting our national security and countless potential victims at risk."
Rozhavsky added that the FBI remains committed to protecting American critical technologies and will ensure that anyone attempting to profit at the nation's expense faces full criminal prosecution.
Russian Broker Identified
On the same day as Williams' sentencing, the US Treasury Department sanctioned Russian exploit broker Sergey Sergeyevich Zelenyuk and his company Operation Zero. The Treasury confirmed that Operation Zero was the recipient of the eight exploits Williams sold.
Operation Zero, based in St. Petersburg, had been actively purchasing exploits since 2021, offering millions of dollars for tools targeting popular US software and encrypted messaging platforms. The company openly stated it would only sell exploits to non-NATO countries and had developed its own products including spyware and data exfiltration tools for AI systems.
Broader Sanctions Network
The sanctions also targeted United Arab Emirates-based Special Technology Services LLC FZ (STS), another company allegedly established by Zelenyuk to conduct similar business in Asia and the Middle East. Additional individuals sanctioned include Marina Evgenyevna Vasanovich (Zelenyuk's assistant), Azizjon Makhmudovich Mamashoyev, and Oleg Vyacheslavovich Kucherov.
Mamashoyev's company, Advance Security Solutions, an alleged exploit broker based in the UAE and Uzbekistan, was also sanctioned. Kucherov is suspected of being a member of the Trickbot cybercrime gang.
Legal Precedent
These actions represent the first sanctions imposed under the Protecting American Intellectual Property Act (PAIPA), which became law in 2023. Treasury Secretary Scott Bessent stated: "If you steal US trade secrets, we will hold you accountable. Treasury will continue to work alongside the rest of the Trump administration to protect sensitive American intellectual property and safeguard our national security."
The case serves as a stark warning to current and former defense contractors about the severe consequences of betraying national security for personal gain. The combination of criminal prosecution and economic sanctions demonstrates the US government's multi-faceted approach to combating insider threats and protecting sensitive cyber capabilities from falling into adversarial hands.
For L3Harris Technologies and other defense contractors, this case highlights the critical importance of internal security measures and the ongoing challenge of preventing insider threats, particularly when employees have access to highly sensitive cyber tools and intelligence capabilities.

Comments
Please log in or register to join the discussion