Former Trenchant exec pleads guilty to selling cyber exploits to Russian broker

A former executive at the defense contractor L3 Harris on Wednesday pleaded guilty to selling spyware exploits to a Russian broker.

Peter Williams, who formerly led Trenchant, the L3Harris division dealing in spyware and zero days, sold the trade secrets to a Russian cyber-tools broker that “publicly advertises itself as a reseller of cyber exploits to various customers, including the Russian government,” according to a Department of Justice (DOJ) press release.

Williams pleaded to two counts of theft of trade secrets for peddling the information which officials said he stole over a three-year period from 2022 to 2025. The material sold was national security software that included at least eight “sensitive and protected cyber-exploit components” which were only supposed to be sold to the U.S. government and approved allies, DOJ said.

Each of the charges carries a maximum of 10 years in prison and fines. 

Williams was promised millions of dollars in cryptocurrency for selling the secrets, prosecutors said. Officials say he signed multiple contracts with the Russian broker for both the initial sales and “follow-on support.”

“These international cyber brokers are the next wave of international arms dealers and we continue to be vigilant about their activities,” U.S. Attorney Jeanine Ferris Pirro said in a prepared statement. 

Pirro said Williams’s offenses cost L3Harris $35 million in addition to providing foreign cyber actors who are not allies with the U.S. “sophisticated cyber exploits that were likely used against numerous unsuspecting victims.”

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Suzanne Smalley

Suzanne Smalley

is a reporter covering privacy, disinformation and cybersecurity policy for The Record. She was previously a cybersecurity reporter at CyberScoop and Reuters. Earlier in her career Suzanne covered the Boston Police Department for the Boston Globe and two presidential campaign cycles for Newsweek. She lives in Washington with her husband and three children.

 

Total
0
Shares
Previous Post

Cloud Atlas hackers target Russian agriculture sector ahead of industry forum

Next Post

PhantomRaven Malware Found in 126 npm Packages Stealing GitHub Tokens From Devs

Related Posts

Two Chrome Extensions Caught Secretly Stealing Credentials from Over 170 Sites

Cybersecurity researchers have discovered two malicious Google Chrome extensions with the same name and published by the same developer that come with capabilities to intercept traffic and capture user credentials. The extensions are advertised as a "multi-location network speed test plug-in" for developers and foreign trade personnel. Both the browser add-ons are available for download as of
Read More

Warning: WinRAR Vulnerability CVE-2025-6218 Under Active Attack by Multiple Threat Groups

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added a security flaw impacting the WinRAR file archiver and compression utility to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. The vulnerability, tracked as CVE-2025-6218 (CVSS score: 7.8), is a path traversal bug that could enable code execution. However, for exploitation
Read More

CrashFix Chrome Extension Delivers ModeloRAT Using ClickFix-Style Browser Crash Lures

Cybersecurity researchers have disclosed details of an ongoing campaign dubbed KongTuke that used a malicious Google Chrome extension masquerading as an ad blocker to deliberately crash the web browser and trick victims into running arbitrary commands using ClickFix-like lures to deliver a previously undocumented remote access trojan (RAT) dubbed ModeloRAT. This new escalation of ClickFix has
Read More