DOJ Says Trenchant Boss Sold Exploits to Russian Broker Capable of Accessing ‘Millions of Computers and Device’

Federal prosecutors have now drawn a sharp line around a case that sits at the intersection of cyber weapons, private profit, and national security. An Australian executive, once trusted inside a U.S. defense contractor’s elite hacking unit, admitted to stealing and selling powerful digital exploits. Prosecutors say those tools went to a Russian broker tied to government clients and could open doors into millions of systems worldwide. What this signals is simple and uncomfortable: the most dangerous vulnerabilities aren’t always in code. Sometimes they sit in senior leadership, holding administrator access and chasing fast money, ignoring every obvious warning sign.
From Defense Contractor to Insider Threat
The story begins inside Trenchant, a unit of L3Harris that builds offensive cyber tools for the U.S. government and close allies. The former boss, Australian national Peter Williams, didn’t just manage sensitive capabilities; he looted them. Prosecutors say he stole at least eight high‑value exploits and moved them out the door for personal gain. These weren’t side projects or castoffs. They came from a shop trusted with zero‑day level tools, the sort of code that lets operators slip into targets without a whisper. The breach wasn’t technical. It was managerial. Trust sat in the wrong hands for far too long.

Eight Exploits, Global Reach
Prosecutors now describe those stolen exploits in stark terms. Each one targeted software flaws that, when chained together or deployed at scale, could enable broad, indiscriminate access to computers and devices across the globe. Not just a handful. Potentially millions of endpoints, including inside the United States. That kind of reach turns niche hacking tools into infrastructure-level risk. Once sold, those exploits don’t stay neatly contained in a lab. They move, they’re copied, they’re reused. A single transaction can seed an entire ecosystem of cybercrime, espionage, and ransomware, all built on code that originated in a Western defense shop.
Russian Broker and Intelligence Fallout
The buyer list matters. Prosecutors say Williams sold the exploits to a Russian company whose customers include the Russian government. That admission changes the case from simple theft into strategic damage. Federal filings state that the sale “directly harmed” the U.S. intelligence community. Translation: tools built for American and allied operations may now sit in a foreign arsenal, able to mirror or counter the very techniques they once enabled. Offensive advantage turns into shared knowledge. That’s not just embarrassing for a contractor; it erodes confidence in the whole supply chain of government hacking capabilities and their supposed guardians in industry circles.
Money, Regret, and a Harsh Ask
The financial piece looks almost small compared with the fallout. Williams pulled in more than $1.3 million in cryptocurrency between 2022 and 2025. A high price for a salary bump, a low price for strategic tools. Prosecutors now want nine years in prison, three years of supervised release, $35 million in restitution, and a hefty fine. Williams sent the court a remorseful letter, describing betrayal of values and training. His lawyer stresses that none of the tools were classified and argues he didn’t intend to aid any government. Intent rarely matters much once exploits land in hostile ecosystems and rapidly proliferate.
The case lands at a tense moment for the offensive security world. Governments lean on private vendors for cutting‑edge exploits, while those vendors juggle profit, secrecy, and loose internal controls. One senior insider crossed the line, and the result, by the Justice Department’s own telling, is a Russian-linked broker holding keys to millions of devices. That’s not just one man’s fall; it’s a warning shot for every company trading in digital weapons. Stronger guardrails, tighter oversight, deeper logging, and real accountability aren’t optional anymore, because the market for exploits doesn’t respect borders, intentions, or comforting diplomatic narratives.
