I just read something quite serious that happened with Operation Zero, a Russian cybersecurity company. It turns out that the U.S. Treasury has just sanctioned the company and its director Sergey Sergeyevich Zelenyuk for financing operations involving the theft of trade secrets using cryptocurrencies. This is not an isolated case, apparently.



What caught my attention the most is how this operation worked. Operation Zero is dedicated to trading exploitation tools that take advantage of software vulnerabilities. Basically, unauthorized access, data theft, device control. And they paid bonuses in crypto to those who carried out the attacks. That’s how they recruited an Australian named Peter Williams who worked for a U.S. defense contractor.

Williams admitted to stealing proprietary software from his employer and providing classified information in exchange for millions in crypto assets. He has already pleaded guilty to two charges of trade secret theft. The investigation started a year ago by the Department of Justice.

What’s interesting here is that cryptocurrencies were used as a means of payment for criminal activities, which probably accelerated the sanctions. The Treasury indicated that Operation Zero operated from a zero hour zone, if you see it that way, where national security was constantly at risk. Scott Bessent, Treasury Secretary, was quite clear: anyone who steals U.S. trade secrets will be held accountable.

This reflects a broader trend of how governments are tracking the use of crypto in illicit activities. It’s no surprise, but it’s a reminder that blockchain transparency is a double-edged sword.
View Original
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
  • Reward
  • Comment
  • Repost
  • Share
Comment
Add a comment
Add a comment
No comments
  • Pin