Former L3Harris Trenchant boss pleads guilty to selling zero-day exploits to Russian broker
嗯,用户让我帮忙总结一下这篇文章的内容,控制在100字以内,而且不需要用“文章内容总结”之类的开头。我得先仔细读一下这篇文章,看看主要讲了什么。 文章讲的是Peter Williams,他以前是L3Harris公司的总经理。他被指控向一个俄罗斯中间商出售监视技术。这些技术是从他工作的美国国防承包商那里偷窃的,持续了三年时间。DOJ的声明说这些软件是国家安全重点软件,包含至少八个敏感和受保护的网络漏洞组件。这些组件本来是只卖给美国政府和少数盟友的。 Williams负责Trenchant部门,这个部门开发间谍软件、漏洞和零日漏洞。Trenchant卖给五眼联盟国家的政府客户。Williams把这些东西卖给了一个俄罗斯中间商,对方承诺用加密货币支付数百万美元。检察官称这个中间商公开声称是漏洞的转售商,客户包括俄罗斯政府。 DOJ说Williams的行为导致Trenchant损失超过3500万美元。助理司法部长说他背叛了美国和雇主,危害了国家安全。Williams对两项窃取商业机密的罪名认罪,可能面临10年监禁,判决在2026年1月。 用户的需求是要一个简短的总结,控制在100字以内。所以我要抓住关键点:谁、做了什么、结果如何。 可能的结构是:前高管Peter Williams向俄罗斯出售监视技术,涉及国家安全软件和零日漏洞,导致3500万美元损失,并认罪面临监禁。 检查一下字数是否在100字以内,并且没有使用开头语。 </think> 前L3Harris高管Peter Williams向俄罗斯中间商出售涉及国家安全的监视技术及零日漏洞,导致3500万美元损失并认罪。 2025-10-29 18:4:9 Author: techcrunch.com(查看原文) 阅读量:35 收藏

Peter Williams, the former general manager at defense contractor L3Harris, has pleaded guilty to selling surveillance technology to a Russian broker that buys “cyber tools,” the U.S. Department of Justice confirmed Wednesday. 

“The material, stolen over a three-year period from the U.S. defense contractor where he worked, was comprised of national-security focused software that included at least eight sensitive and protected cyber-exploit components,” read the DOJ’s press release on Wednesday. “Those components were meant to be sold exclusively to the U.S. government and select allies.”

TechCrunch previously exclusively reported, citing four former Trenchant employees, that the company was investigating a leak of its hacking tools. Prosecutors now say Williams exploited his access to the company’s “secure network to steal the cyber exploit components.”

Williams headed Trenchant, the division at L3Harris that develops spyware, exploits, and zero-days — security vulnerabilities in software that are unknown to its maker. Trenchant sells its surveillance tech to government customers in Australia, Canada, New Zealand, the United States, and the United Kingdom, the so-called Five Eyes intelligence alliance. Trenchant was founded after L3Harris in 2019 acquired two Australian sister startups, Azimuth and Linchpin Labs, which developed and sold zero-days to the Five Eyes alliance of countries. 

The DOJ said Williams, a 39-year-old Australian citizen who resides in Washington, D.C., sold exploits to the unnamed Russian broker, who promised Williams millions of dollars in cryptocurrency in exchange. The former Trenchant general manager allegedly signed contracts with the broker that stipulated an initial payment for the exploits, and periodic payments “for follow-on” support. 

Prosecutors did not name the Russian broker Williams sold to, but said that the broker publicly bills itself as a reseller of exploits to several customers, including the Russian government. 

Contact Us

Do you have more information about this case, and the alleged leak of Trenchant hacking tools? From a non-work device, you can contact Lorenzo Franceschi-Bicchierai securely on Signal at +1 917 257 1382, or via Telegram, Keybase and Wire @lorenzofb, or by email.

U.S. Attorney Jeanine Pirro said Wednesday that the broker whom Williams sold exploits to is part of “the next wave of international arms dealers.” Pirro said Williams’ crimes caused over $35 million in losses to Trenchant. 

“Williams betrayed the United States and his employer by first stealing and then selling intelligence-related software,” said U.S. Assistant Attorney General for National Security John A. Eisenberg. “His conduct was deliberate and deceitful, imperiling our national security for the sake of personal gain.”

L3Harris spokesperson Sara Banda declined to comment when reached by TechCrunch on Wednesday.

Attorneys for Williams did not immediately respond to a request for comment.

On October 14, the U.S. government accused Williams, who is known in the industry as “Doogie,” of selling trade secrets to a buyer in Russia, without specifying what those trade secrets were nor what company he stole them from. According to a document filed in mid-October, Williams made $1.3 million for the sale of the exploits. 

Williams pleaded guilty to two charges of stealing trade secrets, which each can carry a sentence of 10 years in prison. He will be sentenced in January 2026, prosecutors said. 

According to Risky Business host and journalist Patrick Gray, Williams is currently under house arrest in the Washington, D.C. area where he lives. Gray said Williams used to work at the Australian Signals Directorate (ASD), the country’s top signals intelligence and eavesdropping agency. 

When previously reached by TechCrunch, a spokesperson for the ASD would not comment on Williams, citing a law enforcement matter. 

Last week, TechCrunch reported that Williams had fired a Trenchant developer earlier this year who was suspected of stealing Chrome zero-days. The former Trenchant employee told TechCrunch that he never had access to those tools, as he worked on developing iOS zero-days. Other of his former colleagues supported his account.

“I know I was a scapegoat. I wasn’t guilty. It’s very simple,” the exploit developer told TechCrunch. “I didn’t do absolutely anything other than working my ass off for them.” 

Lorenzo Franceschi-Bicchierai is a Senior Writer at TechCrunch, where he covers hacking, cybersecurity, surveillance, and privacy.

You can contact or verify outreach from Lorenzo by emailing [email protected], via encrypted message at +1 917 257 1382 on Signal, and @lorenzofb on Keybase/Telegram.

View Bio


文章来源: https://techcrunch.com/2025/10/29/former-l3harris-trenchant-boss-pleads-guilty-to-selling-zero-day-exploits-to-russian-broker/
如有侵权请联系:admin#unsafe.sh