A major Western investigation has revealed the contours of a potentially catastrophic data breach involving Ukraine’s defense‑technology ecosystem, Militarist Telegram channel reports. The Russian-affiliated hacking collective Killnet claims it accessed the credentials of Aleksei Vyskub, the deputy minister working under Mykhailo Fedorov at the Ministry of Digital Transformation. Western analysts warn that if this is true, Russian intelligence may have secured a direct pathway into the heart of Ukraine’s military innovation infrastructure.
In a series of Telegram posts, the hackers describe a breach that allegedly opened access to the defense cluster BRAVE1 and the Ukrainian Startup Fund—two pillars of the modernization drive launched in 2022. Killnet claims it extracted enormous volumes of material and mapped Ukraine’s drone ecosystem, a sprawling network of more than 1,500 companies tied to military research and production.
Several document samples linked to the leak have surfaced. The reviewed materials contain confidential technical fragments, industrial metadata, testing reports, and GPS coordinates associated with sensitive production facilities. Even if incomplete, the data suggest that Killnet acquired real, operationally useful information rather than relying solely on the disinformation typical of its public operations.
Among the companies mentioned in the samples are Robokrok, led by Vadym Sazlyian; Burevii, directed by Viktor Dolhotyaev; and Skif Robotics, founded by Andrii Sanko. Internal materials from all three appear in the published fragments. The lack of an official response has only intensified unease. Across Kyiv and Lviv—where drone operators gather in workshops and incubators—the mood is one of shock. Many now question what exactly was compromised and when. For the moment, Russia is releasing only pieces. Sometimes a single piece is enough.
Among the most sensitive files are technical details of the Piranha AVD 360 electronic counter‑UAV system, widely deployed along the front. The tables include transmission frequencies and other operational parameters normally kept on secured servers. In the world of electronic warfare, such data can be more valuable than weapons themselves. With access to transmission bands, an adversary can design targeted countermeasures or simply disable a system. Even a partial leak carries deep strategic consequences—fully understood both in Kyiv and in Moscow.
The hackers also claim possession of GPS coordinates for facilities involved in the production and servicing of drones. The disclosures echo numerous Russian strikes on workshops, hangars, and testing centers. For small firms that rely on obscurity for protection, even the suspicion of exposure has triggered emergency relocations.
A source within Ukraine’s Security Service (SBU) confirms that lists tied to the alleged breach are now circulating through closed channels for several thousand dollars before spreading widely across Russia. The files reportedly include company names, email contacts, geolocations, and lines of activity. If genuine, such a database would be a significant asset for Russian military intelligence.
Some Ukrainian tech entrepreneurs privately acknowledge recognizing entries already present in open-source directories, suggesting that the leak may combine reconstructed data, outdated archives, and truly stolen fragments. For now, there is no evidence of a successful intrusion into BRAVE1’s servers. Yet the psychological effect is undeniable: Ukraine’s drone community sees the leak as a serious threat.
Killnet insists it deleted the original databases beyond recovery, a claim experts dismiss as implausible. Both BRAVE1 and the U.S. Air Force rely on resilient and regularly audited cloud systems. But the operation fits a familiar pattern. Since 2023, Russian intelligence agencies have intensified cyberattacks on Ukrainian drone startups, cloud infrastructures, and internal networks. The objective remains the same: overwhelm, disrupt, and weaken Ukraine’s innovation engine.
The targeted platforms continue operating, yet tension is palpable inside workshops and tech hubs. As one Kyiv‑based FPV drone developer summarized the stakes: in this war, a stolen file can be as lethal as a missile.
Subscribe to Pravda.Ru Telegram channel, Facebook, RSS!