
The 404 Media Podcast Government Hacking Tools Are Now in Criminals' Hands (with Lorenzo Franceschi-Bicchierai)
41 snips
Apr 27, 2026 Lorenzo Franceschi-Bicchierai, TechCrunch cyber reporter who investigates spyware and zero-day markets. He unpacks a trench of stolen hacking tools from a government vendor, how those iPhone exploits surfaced in Russia and China, and why powerful offensive tech can spiral beyond intended buyers. Short, wild stories about leaks, forensic clues, and the dangerous ripple effects.
AI Snips
Chapters
Transcript
Episode notes
How Trenchant Became The Trusted Five Eyes Exploit Shop
- Trenchant evolved from Azimuth and Linchpin Labs and built a reputation for selling zero-days to Five Eyes allies only.
- Lorenzo explains they were secretive high-end exploit developers later acquired by L3 and rebranded as Transient/Trenchant, trusted by Western governments.
Insider Scapegoat And The Missing Name Puzzle
- Peter Williams, a Trenchant general manager, allegedly stole trade secrets and tried to scapegoat an employee during an internal probe.
- Lorenzo traced his resignation and a UK business record, then found a matching US indictment listing stolen trade secrets.
How The Theft Happened And What Was Stolen
- DOJ alleges Williams removed malware and vulnerabilities on USBs across Trenchant offices over years and confessed after FBI pressure.
- He admitted stealing eight trade secrets likely including iOS/Android/Chrome exploits that could affect millions.

