U.S. Treasury sanctions Russia's "Zero Day" operation: Exposure of stolen U.S. government cyber tools case

The U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) announced on February 25th sanctions against Russian exploitation broker Sergei Zelenyuk and his St. Petersburg company Matrix LLC (also known as “Operation Zero”). They are accused of selling stolen U.S. government proprietary network tools, marking the first law enforcement case under the “Protecting American Intellectual Property Act” to target digital trade secrets theft.

Operation Zero’s Operations and Sanctioned Entities

US sanctions Russia's Operation Zero

(Source: U.S. Department of the Treasury)

“Operation Zero” was launched in 2021, employing a public bounty system to purchase security vulnerabilities targeting mainstream operating systems and encrypted communication apps. Multiple bounties have been publicly posted on the X platform. Known rewards include $500,000 for 26 iOS vulnerabilities (November 2025) and $4 million for a complete attack chain vulnerability in Telegram (March 2025).

OFAC states that the exploits sold by “Operation Zero” enable attackers to gain unauthorized access, steal information, or remotely control targeted systems. The client base is explicitly limited to “private and government organizations in Russia,” focusing on offensive security research and software tools.

The sanctions also target two individuals: Oleg Vyacheslavovich Kucherov, suspected member of the Trickbot cybercriminal group, and Marina Evgenyevna Vasanovich, described as Zelenyuk’s assistant.

Australian Contractor Data Theft Case: $1.3 Million in Cryptocurrency as Key Evidence

The sanctions stem from investigations by the U.S. Department of Justice and FBI into Australian citizen Peter Williams. Williams, a former employee of a U.S. defense contractor, is accused of stealing eight “commercial secret zero-day exploits” between 2022 and 2025, selling them to “Operation Zero” for $1.3 million in cryptocurrency. Williams pleaded guilty in October 2025 to two counts of commercial secrets theft.

The U.S. State Department emphasized in an independent statement that the stolen tools were originally intended solely for sale to the U.S. government and its allies. Unauthorized resale poses a direct threat to U.S. intelligence capabilities. The Treasury also disclosed that “Operation Zero” is involved in developing espionage software and AI-driven tools to steal personal identification information, recruiting hackers via social media, and establishing contacts with foreign intelligence agencies.

Key Information on the Sanctions

Sanctioned Parties: Sergei Zelenyuk and Matrix LLC (“Operation Zero”), Kucherov, Vasanovich

Legal Basis: Protecting American Intellectual Property Act, marking its first application to digital trade secrets theft cases

Stolen Tools: Eight U.S. government proprietary network tools, originally intended for U.S. government and specific allies

Cryptocurrency Payments: Peter Williams sold stolen zero-day exploits for $1.3 million in cryptocurrency

Highest Bounty: “Operation Zero” previously offered a $4 million reward for a Telegram attack chain vulnerability

Frequently Asked Questions

What is the historical significance of the legal basis for these U.S. Treasury sanctions?

These sanctions are executed under the Protecting American Intellectual Property Act, which is the first time this law has been used to combat the theft and sale of digital trade secrets. OFAC states this signifies an expansion of U.S. enforcement tools against cyber tool theft into the realm of commercial secrets law, setting an important legal precedent.

What is “Operation Zero,” and how do their vulnerability trading operations work?

“Operation Zero” is a Russian exploitation broker led by Sergei Zelenyuk, purchasing security vulnerabilities for operating systems and encrypted communication apps through public bounties. Its clients are limited to Russian private and government organizations. The bounty rewards can reach up to $4 million, with transactions publicly posted on X, reflecting transparency in their dealings.

What implications does the use of cryptocurrency payments in this case have for crypto regulation?

Peter Williams paid $1.3 million in cryptocurrency to acquire stolen U.S. government zero-day exploits, highlighting cryptocurrency’s role as a primary payment method in transnational cyber espionage. This case raises regulatory concerns about the role of cryptocurrencies in national security crimes and underscores the importance of on-chain tracking tools and anti-money laundering measures in combating such transactions.

View Original
Disclaimer: The information on this page may come from third parties and does not represent the views or opinions of Gate. The content displayed on this page is for reference only and does not constitute any financial, investment, or legal advice. Gate does not guarantee the accuracy or completeness of the information and shall not be liable for any losses arising from the use of this information. Virtual asset investments carry high risks and are subject to significant price volatility. You may lose all of your invested principal. Please fully understand the relevant risks and make prudent decisions based on your own financial situation and risk tolerance. For details, please refer to Disclaimer.

Related Articles

Iran and North Korea are both using it! Stablecoins have become the preferred virtual asset for illegal transactions, with involved fraud totaling $51 billion.

According to the FATF report, stablecoins have become the preferred asset for illegal transactions, especially in countries like Iran and North Korea. The organization calls for increased regulation of stablecoin issuers and states that by 2025, stablecoins will account for the majority of illegal virtual asset transactions. To address these challenges, the FATF recommends that issuers strengthen their technical capabilities to improve regulatory efficiency.

区块客2h ago

Trump signs executive order to combat cybercrime, requiring multiple agencies to submit action plans within 120 days

U.S. President Trump signed an executive order on March 6th to combat cybercrime and fraud, requiring relevant ministers to review frameworks and develop action plans. The order establishes an action team to coordinate the fight against transnational cybercrime and proposes a victim recovery plan to compensate victims of online fraud. At the same time, it calls for negotiations with countries that tolerate such crimes and measures to restrict them.

GateNews3h ago

New Stablecoin Rules Passed By Florida Lawmakers

Florida lawmakers have passed a bill to regulate stablecoins, establishing clear rules for issuance, oversight, and consumer protection. This bipartisan effort aims to provide regulatory certainty and attract blockchain innovation while ensuring financial stability and transparency.

TodayqNews3h ago

Patrick Witt Calls Out The Irony At Banks’ Stance On Clarity Act

White House crypto advisor Patrick Witt highlighted that the big banks’ unwillingness to reach a compromise with the crypto sector on the Clarity Act discussions will only keep stablecoins unregulated and amplify their concerns about deposit flight. The digital asset adviser of the White House, Pa

Blockzeit3h ago

Vancouver "Bitcoin Reserve" Dream Shattered! City Hall Staff "This Reason" Suggests Withdraw Proposal

Vancouver Mayor Ken Sim proposed establishing a "Bitcoin Strategic Reserve," but city officials assessed that Bitcoin does not meet legal investment standards and recommended that the city council withdraw the proposal. According to the report, Bitcoin is not classified as a legal asset and requires reallocation of human resources to align with municipal priority plans. The Ministry of Municipal Affairs of British Columbia has already stated that local governments are not permitted to include cryptocurrencies in their financial reserves to avoid risks.

区块客4h ago
Comment
0/400
No comments