A veteran cybersecurity govt who prosecutors stated “betrayed” the USA will spend not less than the subsequent seven years behind bars, after pleading responsible to stealing and promoting hacking and surveillance instruments to a Russian agency.
Peter Williams, a former govt at U.S. protection contractor L3Harris, was sentenced on Tuesday to 87 months in jail for leaking his former firm’s commerce secrets and techniques in trade for $1.3 million in crypto between 2022 and 2025. Williams offered the exploits to Operation Zero, which the U.S. authorities calls “one of many world’s most nefarious exploit brokers.”
The profitable conviction of Williams follows some of the high-profile leaks of delicate Western-made hacking instruments in recent times. Even now that the case is over, there are nonetheless unanswered questions.
Williams, a 39-year-old Australian citizen who resided in Washington, D.C., was the overall supervisor of Trenchant, the division of L3Harris that develops hacking and surveillance instruments for the U.S. authorities and its closest world intelligence companions. Prosecutors say Williams took benefit of getting “full entry” to the corporate’s safe networks to obtain the hacking instruments onto a conveyable onerous drive, and later to his laptop. Williams contacted Operation Zero below a pseudonym although, so it’s unclear if Operation Zero ever knew Williams’ actual identification.
Trenchant is a crew of hackers and bug hunters who dig deep into different well-liked software program made by corporations like Google and Apple, determine flaws in these thousands and thousands of traces of code, then devise strategies to show these flaws into workable exploits that can be utilized to reliably hack into these merchandise. These instruments are sometimes referred to as zero-day exploits as a result of they reap the benefits of software program flaws unknown to its developer, which may be value thousands and thousands of {dollars}.
The U.S. Division of Justice alleged that the hacking instruments Williams offered might have allowed whoever used them to “probably entry thousands and thousands of computer systems and units world wide.”
For the previous few months, I’ve been speaking to sources and reporting on Williams’ story earlier than information broke that he had been arrested. However what I had heard was patchwork and at instances conflicting. I had heard somebody had been arrested, however given the key nature of the work concerned in exploit improvement, proving it will be difficult.
Contact Us
Do you will have extra details about this case, and the alleged leak of Trenchant hacking instruments? From a non-work machine, you possibly can contact Lorenzo Franceschi-Bicchierai securely on Sign at +1 917 257 1382, or through Telegram, Keybase and Wire @lorenzofb, or by electronic mail.
After I first heard of Williams, I wasn’t clear that I had even gotten his title proper. At that time, his story was a rumor, transferring by the hush-hush grapevine of zero-day exploit builders, sellers, and folks with ties to the intelligence group.
I heard that perhaps he was referred to as John, or maybe Duggan? Or all of the alternative ways you possibly can spell that in English.
A number of the first rumors I heard have been contradictory. Apparently he stole zero-days from Trenchant, and perhaps he offered them to Russia, or maybe one other enemy of the USA and its allies, like North Korea or China?
It took weeks simply to substantiate that there was certainly somebody who even match that description. (It turned out that Williams’ center title is John, and Doogie is his nickname in hacker circles.)
Then, because the weeks of reporting rolled on, issues began to develop into a lot clearer.
The Russian connection
As I first revealed in October, Trenchant fired an worker after Williams, who was nonetheless on the time head of Trenchant, accused the worker of stealing and leaking Chrome zero-days. The story was much more intriguing as a result of the worker instructed me that after he was fired, Apple notified him that somebody had focused his private iPhone.
What I discovered was simply the tip of the iceberg. I had heard extra from my sources, however we have been nonetheless piecing elements of the story collectively.
Quickly after, prosecutors made their first formal accusation towards a person named Peter Williams for stealing commerce secrets and techniques, which first surfaced within the U.S. public court docket system. In that first court docket doc, prosecutors confirmed that the customer of those commerce secrets and techniques was a purchaser in Russia.
Nevertheless, there was no specific reference to L3Harris nor Trenchant, nor the truth that the commerce secrets and techniques that Williams stole have been zero-days. Crucially, we nonetheless couldn’t verify for sure that it was the identical Peter Williams, who we thought would have entry to extremely delicate exploits as Trenchant’s boss, and never some horrible case of mistaken identification.
We nonetheless weren’t there.
On a hunch and with nothing to lose, we contacted the Division of Justice to ask if they might verify that the particular person within the doc was in truth Peter Williams, the previous boss of L3Harris Trenchant. A spokesperson confirmed.
Lastly, the story was out. Every week later, Williams pleaded responsible.
After I first heard of his story, whereas I trusted my sources, I remained skeptical. Why would somebody like Williams do what the rumors claimed? However he did, and did so for cash, prosecutors allege, which Williams then used to purchase a home, jewellery, and luxurious watches.
It was a exceptional fall from grace for Williams, as soon as seen as an completed and good hacker, and particularly for somebody who beforehand labored at Australia’s high overseas spy company and served within the nation’s army.

What occurred to the stolen exploits?
We nonetheless don’t know particularly which exploits and hacking instruments Williams stole and offered. Trenchant estimated a lack of $35 million, per court docket paperwork. However Williams’ legal professionals stated the stolen instruments weren’t categorised as a authorities secret.
We are able to glean some perception based mostly on the circumstances of the case.
On condition that the Justice Division stated the stolen instruments may very well be used to hack “thousands and thousands of computer systems and units,” it’s seemingly the instruments discuss with zero-days in well-liked client software program, similar to Android units, Apple’s iPhones and iPads, and net browsers.
There may be some proof pointing of their route. Throughout a listening to final 12 months, prosecutors learn out loud a submit revealed on X by Operation Zero, in line with unbiased cybersecurity reporter Kim Zetter, who attended the listening to.
“Resulting from excessive demand available on the market, we’re growing payouts for top-tier cellular exploits,” learn the submit, which particularly talked about Android and iOS. “As at all times, the tip person is a non-NATO nation.”
Operation Zero provides thousands and thousands of {dollars} for particulars of security vulnerabilities in Android units and iPhones, messaging apps like Telegram, in addition to different kinds of software program, similar to Microsoft Home windows, and {hardware} distributors, similar to a number of manufacturers of servers and routers.
Operation Zero claims to work with the Russian authorities. On the time Williams offered the exploits to the Russian dealer, Putin’s full-scale invasion of Ukraine was already underway.
On the identical day that Williams was sentenced, the U.S. Treasury introduced it had imposed sanctions towards Operation Zero and its founder Sergey Zelenyuk, calling the corporate a nationwide security risk. This was the federal government’s first affirmation that Williams had offered the exploits to Operation Zero.
In its assertion, the Treasury stated the dealer “offered these stolen instruments to not less than one unauthorized person.” At this level we don’t know who this person is. The person may very well be a overseas intelligence service, or it may very well be a ransomware gang, provided that the Treasury additionally sanctioned Oleg Vyacheslavovich Kucherov, an alleged member of the Trickbot gang, who additionally allegedly labored with Operation Zero.
In a court docket doc, prosecutors stated that L3Harris was in a position to determine that “an unauthorized vendor was promoting a element” of one of many stolen commerce secrets and techniques “by evaluating company-specific vendor information discovered on a stolen element that matched.”
Prosecutors additionally stated that Williams “acknowledged code he wrote and offered” to Operation Zero “being utilized by a South Korean dealer,” additional suggesting that each L3Harris and prosecutors know which instruments have been stolen and offered to Operation Zero.
One other unanswered query is: Did anybody, both the U.S. authorities or L3Harris, alert Apple, Google, or whichever tech firm’s merchandise have been affected by the zero-day flaws, now that the exploits had leaked?
Any firm or developer would wish to know that somebody might have used (or might nonetheless use) a zero-day towards their customers and clients in order that they will patch the failings as quickly as attainable. And at this level, the zero-days are of no use for L3Harris and its authorities clients.
After I requested Apple and Google, neither firm responded to my inquiries. L3Harris didn’t reply both.
Who hacked the scapegoat, and why?
Then there’s the thriller of the scapegoat, who was fired after Williams accused him of stealing and leaking code.
At sentencing, Justice Division prosecutors confirmed that the worker was fired, saying Williams “stood idly by whereas one other worker of the corporate was basically blamed for [his] personal conduct.” In response, Williams’ lawyer rebuffed prosecutors, claiming that the previous worker “was fired for misconduct,” citing claims of dual-employment and improper dealing with of the corporate’s mental property.
Based on a court docket doc submitted by Williams’ legal professionals, as a part of the L3Harris inner investigation, the corporate positioned the worker on go away, seized his units, transferred them to the U.S., and “provided them to the FBI.”
When reached for remark, an unnamed FBI spokesperson stated the bureau had nothing so as to add other than the Justice Division’s press launch.
After being fired, that worker, whom we recognized with the alias Jay Gibson, acquired a notification from Apple that his private iPhone was focused “with a mercenary spy ware assault.”
Apple sends these notifications to customers it thinks have been the goal of assaults utilizing instruments like these made by NSO Group or Intellexa.
Who tried to hack Gibson? He acquired the notification on March 5, 2025, greater than six months after the FBI investigation had begun. The FBI “commonly interacted with [Williams] in late 2024 by the summer time of 2025,” in line with a court docket doc.
Given the character of the leaked instruments, it’s believable that the FBI, or even perhaps a U.S. intelligence company, focused Gibson as a part of the investigation into Williams’ leaks. However we simply don’t know, and there’s an opportunity that neither the general public, nor Gibson, will ever discover out.
Up to date to make clear twenty second paragraph attributing the instruments’ lack of classification to Williams’ legal professionals.



