TechCrunch News 前天 05:59
前L3Harris高管承认窃取并出售公司黑客工具给俄方
index_new5.html
../../../zaker_core/zaker_tpl_static/wap/tpl_guoji1.html

 

前L3Harris公司Trenchant部门总经理Peter Williams承认窃取并出售公司开发的监控和黑客工具给一位俄罗斯中间商。Williams利用其“超级用户”权限,通过外部硬盘将八个“零日”漏洞(价值高达3500万美元)转移,并最终获得了130万美元的加密货币。他利用公司内部调查的机会,试图将责任推给一名开发者。此案暴露了公司内部信任机制的漏洞以及敏感技术泄露的严重后果。

🚨 **内部信任与滥用:** Peter Williams作为Trenchant部门的高管,拥有对公司敏感黑客工具存储网络的“超级用户”访问权限。他利用这种极高的信任度和广泛的访问权限,规避了多重身份验证和内部安全措施,将价值巨高的“零日”漏洞通过物理介质(外部硬盘)窃取,并转移至个人设备,最终出售给俄罗斯的中间商。

💰 **经济损失与交易细节:** 尽管Williams声称窃取的八个“零日”漏洞价值高达3500万美元,但他从俄罗斯中间商那里仅收到了130万美元的加密货币。交易发生在2022年至2025年7月之间,他利用虚假身份和加密通信方式与中间商进行接触,显示出其行为的蓄意和隐蔽性。

🕵️ **掩盖与栽赃:** 在公司内部调查此次泄露事件时,Williams被指派负责调查。他曾在一名前Trenchant开发者因双重雇佣被解雇后,指控该开发者窃取了Chrome零日漏洞。这名开发者后来声称自己被Williams陷害,并表示其iPhone曾遭受过“雇佣间谍软件攻击”,暗示Williams可能试图通过栽赃来掩盖自己的罪行。

🛡️ **安全漏洞与国家安全担忧:** 此案暴露了即使是高度安全的内部网络也可能存在的漏洞,以及内部人员滥用权限带来的巨大风险。这些敏感的黑客工具落入敌对国家手中,对西方国家安全和情报能力构成了严重威胁,被视为对国家安全体系的“背叛”。

Peter Williams, the former general manager of Trenchant, a division of defense contractor L3Harris that develops surveillance and hacking tools for Western governments, pleaded guilty last week to stealing some of those tools and selling them to a Russian broker.  

A court document filed in the case, as well as exclusive reporting by TechCrunch and interviews with Williams’ former colleagues, explained how Williams was able to steal the highly valuable and sensitive exploits from Trenchant. 

Williams, a 39-year-old Australian citizen who was known inside the company as “Doogie,” admitted to prosecutors that he stole and sold eight exploits, or “zero-days,” which are security flaws in software that are unknown to its maker and are extremely valuable to hack into a target’s devices. Williams said some of those exploits, which he stole from his own company Trenchant, were worth $35 million, but he only received $1.3 million in cryptocurrency from the Russian broker. Williams sold the eight exploits over the course of several years, between 2022 and July 2025. 

Thanks to his position and tenure at Trenchant, according to the court document, Williams “maintained ‘super-user’ access” to the company’s “internal, access-controlled, multi-factor authenticated” secure network where its hacking tools were stored, and to which only employees with a “need to know” had access.  

As a “super-user,” Williams could view all the activity, logs, and data associated with Trenchant’s secure network, including its exploits, the court document notes. Williams’ company network access gave him “full access” to Trenchant’s proprietary information and trade secrets. 

Abusing this wide-ranging access, Williams used a portable external hard drive to transfer the exploits out of the secure networks in Trenchant’s offices in Sydney, Australia and Washington D.C., and then onto a personal device. At that point, Williams sent the stolen tools via encrypted channels to the Russian broker, per the court document.  

A former Trenchant employee with knowledge of the company’s internal IT systems told TechCrunch that Williams “was in the very high echelon of trust” within the company as part of the senior leadership team. Williams had worked at the company for years, including prior to L3Harris’ acquisition of Azimuth and Linchpin Labs, two sister startups that merged into Trenchant.  

“He was, in my opinion, perceived to be beyond reproach,” said the former employee, who asked to remain anonymous as they were not authorized to speak about their work at Trenchant.  

“No one had any supervision over him at all. He was kind of allowed to do things the way he wanted to,” they said. 

Do you have more information about this case, and the alleged leak of Trenchant hacking tools? From a non-work device, you can contact Lorenzo Franceschi-Bicchierai securely on Signal at +1 917 257 1382, or via Telegram, Keybase and Wire @lorenzofb, or by email.

Another former employee, who also asked to not be named, said that “the general awareness is that whoever is the [general manager] would have unfettered access to everything.” 

Before the acquisition, Williams worked at Linchpin Labs, and before then at Australian Signals Directorate, the country’s intelligence agency tasked with digital and electronic eavesdropping, according to the cybersecurity podcast Risky Business.  

Sara Banda, a spokesperson for L3Harris did not respond to a request for comment.  

In October 2024, Trenchant “was alerted” that one of its products had leaked and was in the possession of “an unauthorized software broker,” per the court document. Williams was put in charge of the investigation into the leak, which ruled out a hack of the company’s network but found that a former employee “had improperly accessed the internet from an air-gapped device,” according to the court document.  

As TechCrunch previously and exclusively reported, Williams fired a Trenchant developer in February 2025 after accusing him of being double employed. The fired employee later learned from some of his former colleagues that Williams accused him of stealing Chrome zero-days, which he had no access to since he worked on developing exploits for iPhones and iPads. By March, Apple notified the former employee that his iPhone had been targeted by “mercenary spyware attack.”  

In an interview with TechCrunch, the former Trenchant developer said he believed Williams framed him to cover up his own actions. It’s unclear if the former developer is the same employee mentioned in the court document.  

In July, the FBI interviewed Williams, who told the agents that “the most likely way” to steal products from the secure network would be for someone with access to that network to download the products to an “air‑gapped device […] like a mobile telephone or external drive.” (An air-gapped device is a computer or server that has no access to the internet.)  

As it turned out, that’s exactly what Williams confessed to the FBI in August after being confronted with evidence of his crimes. Williams told the FBI that he recognized his code being used by a South Korean broker after he sold it to the Russian broker; though, it remains unclear how Trenchant’s code ended up with the South Korean broker to begin with. 

Williams used the alias “John Taylor,” a foreign email provider, and unspecified encrypted apps when interacting with the Russian broker, likely Operation Zero. This is a Russia-based broker that offers up to $20 million for tools to hack Android phones and iPhones, which it says it sells to “Russian private and government organizations only.”  

Wired was first to report that Williams likely sold the stolen tools to Operation Zero, given that the court document mentions a September 2023 post on social media announcing an increase in the unnamed broker’s “bounty payouts from $200,000 to $20,000,000,” which matches an Operation Zero post on X at the time.  

Operation Zero did not respond to TechCrunch’s request for comment.  

Williams sold the first exploit for $240,000, with the promise of additional payments after confirming the tool’s performance, and for subsequent technical support to keep the tool updated. After this initial sale, Williams sold another seven exploits, agreeing to a total payment of $4 million, although he ended up only receiving $1.3 million, according to the court document.  

Williams’ case has rocked the offensive cybersecurity community, where his rumored arrest had been a topic of conversation for weeks, according to multiple people who work in the industry.  

Some of these industry insiders see Williams’ actions as causing grave damage. 

“It’s a betrayal to the Western national security apparatus, and it’s a betrayal towards the worst kind of threat actor that we have right now, which is Russia,” said the former Trenchant employee with knowledge of the company’s IT systems told TechCrunch.  

“Because these secrets have been given to an adversary that absolutely is going to undermine our capabilities and is going to potentially even use them against other targets.” 

Fish AI Reader

Fish AI Reader

AI辅助创作,多种专业模板,深度分析,高质量内容生成。从观点提取到深度思考,FishAI为您提供全方位的创作支持。新版本引入自定义参数,让您的创作更加个性化和精准。

FishAI

FishAI

鱼阅,AI 时代的下一个智能信息助手,助你摆脱信息焦虑

联系邮箱 441953276@qq.com

相关标签

Peter Williams L3Harris Trenchant 黑客工具 零日漏洞 国家安全 网络安全 Hacking Tools Zero-days National Security Cybersecurity Insider Threat
相关文章