Former Trenchant exec pleads guilty to selling cyber exploits to Russian broker

A former executive at the defense contractor L3 Harris on Wednesday pleaded guilty to selling spyware exploits to a Russian broker.

Peter Williams, who formerly led Trenchant, the L3Harris division dealing in spyware and zero days, sold the trade secrets to a Russian cyber-tools broker that “publicly advertises itself as a reseller of cyber exploits to various customers, including the Russian government,” according to a Department of Justice (DOJ) press release.

Williams pleaded to two counts of theft of trade secrets for peddling the information which officials said he stole over a three-year period from 2022 to 2025. The material sold was national security software that included at least eight “sensitive and protected cyber-exploit components” which were only supposed to be sold to the U.S. government and approved allies, DOJ said.

Each of the charges carries a maximum of 10 years in prison and fines. 

Williams was promised millions of dollars in cryptocurrency for selling the secrets, prosecutors said. Officials say he signed multiple contracts with the Russian broker for both the initial sales and “follow-on support.”

“These international cyber brokers are the next wave of international arms dealers and we continue to be vigilant about their activities,” U.S. Attorney Jeanine Ferris Pirro said in a prepared statement. 

Pirro said Williams’s offenses cost L3Harris $35 million in addition to providing foreign cyber actors who are not allies with the U.S. “sophisticated cyber exploits that were likely used against numerous unsuspecting victims.”

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Suzanne Smalley

Suzanne Smalley

is a reporter covering privacy, disinformation and cybersecurity policy for The Record. She was previously a cybersecurity reporter at CyberScoop and Reuters. Earlier in her career Suzanne covered the Boston Police Department for the Boston Globe and two presidential campaign cycles for Newsweek. She lives in Washington with her husband and three children.

 

Total
0
Shares
Previous Post

Cloud Atlas hackers target Russian agriculture sector ahead of industry forum

Next Post

PhantomRaven Malware Found in 126 npm Packages Stealing GitHub Tokens From Devs

Related Posts

North Korean Hackers Lure Defense Engineers With Fake Jobs to Steal Drone Secrets

Threat actors with ties to North Korea have been attributed to a new wave of attacks targeting European companies active in the defense industry as part of a long-running campaign known as Operation Dream Job. "Some of these [companies] are heavily involved in the unmanned aerial vehicle (UAV) sector, suggesting that the operation may be linked to North Korea's current efforts to scale up its
Read More

FBI Warns of UNC6040 and UNC6395 Targeting Salesforce Platforms in Data Theft Attacks

The U.S. Federal Bureau of Investigation (FBI) has issued a flash alert to release indicators of compromise (IoCs) associated with two cybercriminal groups tracked as UNC6040 and UNC6395 for orchestrating a string of data theft and extortion attacks. "Both groups have recently been observed targeting organizations' Salesforce platforms via different initial access mechanisms," the FBI said.
Read More

BadIIS Malware Spreads via SEO Poisoning — Redirects Traffic, Plants Web Shells

Cybersecurity researchers are calling attention to a search engine optimization (SEO) poisoning campaign likely undertaken by a Chinese-speaking threat actor using a malware called BadIIS in attacks targeting East and Southeast Asia, particularly with a focus on Vietnam. The activity, dubbed Operation Rewrite, is being tracked by Palo Alto Networks Unit 42 under the moniker CL-UNK-1037, where "
Read More