Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

429+ Articles
114+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. News
  3. U.S. Treasury Sanctions Russian Zero-Day Broker Operation
U.S. Treasury Sanctions Russian Zero-Day Broker Operation
NEWS

U.S. Treasury Sanctions Russian Zero-Day Broker Operation

The U.S. Treasury sanctioned Russian zero-day exploit broker Operation Zero, its founder Sergey Zelenyuk, and affiliated entities after an FBI...

Dylan H.

News Desk

February 24, 2026
5 min read

U.S. Government Targets Russian Exploit Supply Chain

The U.S. Department of the Treasury announced sanctions on February 24, 2026 against Operation Zero, a Russian zero-day exploit brokerage, its founder Sergey Zelenyuk, and several affiliated individuals and entities. The action follows an FBI investigation that revealed Operation Zero acquired at least eight proprietary cyber tools originally developed for the exclusive use of the U.S. government and select allies — tools that were stolen from U.S. defense contractor L3Harris by a former employee and sold for millions of dollars in cryptocurrency.

The sanctions represent the first time the U.S. has formally designated a zero-day broker and its leadership for trafficking in stolen U.S. government cyber capabilities.


Incident Details

AttributeValue
Sanctioned EntityOperation Zero (Russian zero-day exploit broker, est. 2021)
FounderSergey Zelenyuk
Affiliated EntitySpecial Technology Services (UAE-based)
Sanctioned IndividualsMarina Evgenyevna Vasanovich, Azizjon Makhmudovich Mamashoyev, Oleg Vyacheslavovich Kucherov
Insider ThreatPeter Williams (former L3Harris employee)
Stolen Tools8+ proprietary U.S. government cyber tools
Payment MethodMillions in cryptocurrency
Theft Period2022–2025
Announcing AgenciesU.S. Treasury (OFAC), U.S. Department of State, FBI

How It Happened

The Insider Theft

Peter Williams, a former employee of U.S. defense contractor L3Harris (specifically its Trenchant division, which develops offensive cyber tools for U.S. intelligence agencies), stole several proprietary cyber tools from the company between 2022 and 2025. Williams then sold these tools to Operation Zero in exchange for millions of dollars paid in cryptocurrency.

Williams has pleaded guilty to the theft and sale of these tools. On the same day the sanctions were announced, he was sentenced for his role in the scheme.

The Broker Network

Operation Zero launched in 2021 as a Russian firm that acquires and resells zero-day exploits. According to the Treasury Department, Zelenyuk sold the stolen exploits to foreign intelligence agencies and sought to develop spyware and hacking technologies using the stolen U.S. tools as a foundation.

The company operated through an international network that included Special Technology Services, a UAE-based affiliate, suggesting a multi-jurisdictional structure designed to facilitate exploit sales to customers that U.S. export controls would normally restrict.

The Tools at Stake

The eight stolen tools were created exclusively for U.S. government and allied use — likely offensive cyber capabilities developed under classified or restricted programs. Operation Zero then sold those stolen tools to at least one unauthorized user, according to the Treasury statement, effectively providing adversary nations with capabilities designed by U.S. defense contractors.


Impact Assessment

Impact AreaDescription
National securityProprietary U.S. offensive cyber tools now in adversary hands
Intelligence operationsCompromised tools may reveal U.S. cyber operational methods and targets
Defense industrial baseExposes insider threat risks within classified cyber programs
Exploit marketFirst formal U.S. sanctions targeting a zero-day broker's entire operation
Cryptocurrency enforcementDemonstrates traceability of crypto payments in cyber espionage cases
International coordinationUAE-based affiliate sanctioned, signaling cross-border enforcement

Broader Context

The Zero-Day Broker Market

Operation Zero is part of a growing industry of companies that buy and sell zero-day exploits — vulnerabilities unknown to the software vendor. While some brokers operate in legal gray areas by selling to government clients, Operation Zero crossed a clear line by knowingly purchasing stolen U.S. government tools and reselling them to unauthorized parties.

The sanctions come amid heightened U.S. concern about the proliferation of offensive cyber capabilities, particularly to Russia and China. Previous actions have targeted commercial spyware vendors like NSO Group and Intellexa, but this marks the first action specifically against a zero-day broker accused of trafficking stolen U.S. tools.

The L3Harris Connection

L3Harris's Trenchant division (formerly Azimuth Security) is one of several U.S. defense contractors that develop offensive cyber tools for the intelligence community. The Williams case exposes the risk of insider threats within these programs, where a single employee with access can exfiltrate highly sensitive capabilities.


Key Takeaways

  1. Operation Zero sanctioned — First U.S. designation of a Russian zero-day broker and its full network for trafficking in stolen U.S. cyber tools
  2. 8+ proprietary tools stolen from L3Harris by former employee Peter Williams between 2022–2025, paid for in cryptocurrency
  3. Williams pleaded guilty and was sentenced on the same day sanctions were announced
  4. UAE affiliate also sanctioned — Special Technology Services designated alongside three associated individuals
  5. Exploit market disruption — Signals U.S. willingness to use financial sanctions against the zero-day trade, not just espionage charges
  6. Insider threat remains critical — A single employee compromised tools built exclusively for U.S. government use

Sources

  • TechCrunch — Treasury Sanctions Russian Zero-Day Broker Accused of Buying Exploits Stolen from U.S. Defense Contractor
  • U.S. Department of State — Designation of Russia-Based Zero-Day Exploits Broker and Affiliates for Theft of U.S. Trade Secrets
  • The Record — U.S. Sanctions Russian Exploit Broker for Buying Cyber Tools Stolen from Defense Contractor
  • CoinDesk — Millions in Crypto Funded Tools to Exploit U.S. Software, Treasury Says

Related Reading

  • Ex-L3Harris Executive Pleads Guilty to Selling Eight
  • APT28 Weaponizes Microsoft Office Zero-Day in 3 Days
  • CrowdStrike 2026 Threat Report: eCrime Breakout Time Falls
#Zero-Day#Sanctions#Russia#Operation Zero#L3Harris#Exploit Broker

Related Articles

Ex-L3Harris Executive Pleads Guilty to Selling Eight

Peter Williams, former GM of L3Harris's cyber subsidiary Trenchant, admits to selling eight zero-day exploit kits to a Russian broker for $1.3M in...

4 min read

APT28 Weaponizes Microsoft Office Zero-Day in 3 Days

Russia-linked APT28 (Fancy Bear) weaponized Microsoft Office CVE-2026-21509 within days of disclosure, deploying espionage implants against Ukrainian...

3 min read

Bearlyfy Hits Russian Firms with Custom GenieLocker Ransomware

Pro-Ukrainian hacktivist group Bearlyfy has conducted over 70 cyberattacks against Russian companies since January 2025, recently deploying a custom Windows ransomware strain called GenieLocker in targeted operations.

4 min read
Back to all News