Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

429+ Articles
114+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. News
  3. Ex-L3Harris Executive Pleads Guilty to Selling Eight
Ex-L3Harris Executive Pleads Guilty to Selling Eight
NEWS

Ex-L3Harris Executive Pleads Guilty to Selling Eight

Peter Williams, former GM of L3Harris's cyber subsidiary Trenchant, admits to selling eight zero-day exploit kits to a Russian broker for $1.3M in...

Dylan H.

News Desk

February 11, 2026
4 min read

A $1.3 Million Betrayal

Peter Williams, the former General Manager of Trenchant — a cyber operations subsidiary of U.S. defense contractor L3Harris Technologies — has pleaded guilty to selling eight zero-day exploit kits to a Russian broker for $1.3 million in cryptocurrency. The exploits were described by prosecutors as capable of "accessing millions of computers and devices" worldwide.

Williams entered guilty pleas on two counts of theft of trade secrets, marking one of the most significant insider threat cases in the history of the U.S. defense-industrial base.


The Charges

DetailInformation
DefendantPeter Williams, Australian national
Former roleGeneral Manager, Trenchant (L3Harris subsidiary)
ChargesTwo counts of theft of trade secrets
PleaGuilty
Items soldEight zero-day exploit kits
Payment received$1.3 million in cryptocurrency
BuyerRussian broker (believed to be Operation Zero)
Sentencing dateFebruary 24, 2026
Prosecution request9 years federal prison
Restitution sought$35 million
Additional penaltyDeportation to Australia

Who Bought the Exploits?

While the indictment does not name the buyer, cybersecurity researchers and reporting from The Register strongly indicate the Russian broker is Operation Zero — a Moscow-based firm that openly advertises that it sells zero-day exploits exclusively to the Russian government.

Operation Zero has publicly offered up to $20 million for full exploit chains targeting iOS and Android devices, positioning itself as a premium buyer in the zero-day market.

What Operation Zero Means for Attribution

If the broker is confirmed as Operation Zero, these eight exploit kits would have been funneled directly to Russian intelligence services — the FSB, GRU, or SVR — for deployment in espionage and offensive cyber operations.


Timeline of Events

DateEvent
2018-2021Williams serves as GM of Trenchant at L3Harris
2021-2023Williams allegedly exfiltrates zero-day exploit kits
2023Williams sells exploits to Russian broker for $1.3M in crypto
Late 2024FBI investigation identifies Williams through cryptocurrency tracing
January 2026Williams indicted on two counts of theft of trade secrets
February 2026Williams pleads guilty to both counts
February 24, 2026Sentencing scheduled

The Exploit Kits

Prosecutors described the eight zero-day exploit kits as targeting widely deployed software and hardware platforms. While specific CVEs were not disclosed to avoid further exploitation, court documents reveal:

  • Target scope — Exploits covered desktop operating systems, mobile platforms, and network infrastructure
  • Capability — Each kit provided full remote access with no user interaction required
  • Classification — All eight were classified as proprietary trade secrets of L3Harris
  • Potential impact — Collectively capable of compromising "millions of computers and devices"
  • Development cost — L3Harris invested tens of millions of dollars developing these capabilities

Implications for the Defense Industry

The Insider Threat Problem

This case exposes a critical vulnerability in the defense-industrial base: executives with access to the most sensitive offensive cyber tools can monetize them on the gray market with devastating consequences.

Key Takeaways

  1. Cryptocurrency is not anonymous — FBI traced the $1.3M payment despite Williams's attempts to obscure the transaction chain
  2. Zero-day stockpiles are high-value targets — Nation-states will pay premium prices for proven exploit kits
  3. Insider access controls matter — A single executive with broad access compromised eight separate exploit programs
  4. The gray market is booming — Operation Zero's public price lists demonstrate the scale of demand for offensive capabilities

What Organizations Should Do

  • Implement strict compartmentalization for offensive cyber tools and exploit research
  • Monitor for unusual data access patterns among cleared personnel, especially executives
  • Conduct regular insider threat assessments focused on personnel with access to sensitive capabilities
  • Track cryptocurrency flows associated with employees in sensitive roles

Sources

  • The Register — Ex-L3Harris Exec Admits Selling Zero-Days to Russian Broker
  • TechCrunch — L3Harris Executive Pleads Guilty to Selling Exploit Kits to Russia
  • CyberScoop — DOJ: Defense Contractor Exec Sold Eight Zero-Days for $1.3M in Crypto

Related Reading

  • U.S. Treasury Sanctions Russian Zero-Day Broker Operation
  • APT28 Weaponizes Microsoft Office Zero-Day in 3 Days
  • LexisNexis Confirms Cloud Breach Exposing 400K User
#Insider Threat#Zero-Day#Russia#L3Harris#Espionage#Legal

Related Articles

U.S. Treasury Sanctions Russian Zero-Day Broker Operation

The U.S. Treasury sanctioned Russian zero-day exploit broker Operation Zero, its founder Sergey Zelenyuk, and affiliated entities after an FBI...

5 min read

APT28 Weaponizes Microsoft Office Zero-Day in 3 Days

Russia-linked APT28 (Fancy Bear) weaponized Microsoft Office CVE-2026-21509 within days of disclosure, deploying espionage implants against Ukrainian...

3 min read

LexisNexis Confirms Cloud Breach Exposing 400K User

LexisNexis Legal & Professional confirms a data breach after threat actor FulcrumSec exploited an unpatched React2Shell vulnerability to exfiltrate 2.04...

4 min read
Back to all News