Russian-affiliated hacking group Killnet claims to breach Ukrainian drone companies and ministry systems in Ukraine

Russian-affiliated hacking group Killnet claims to breach Ukrainian drone companies and ministry systems in Ukraine

Ukraine’s drone industry is on edge after claims of a major data breach that could have far-reaching consequences for the country’s defense‑technology ecosystem.

According to reports on the Militarist Telegram channel, the Russian‑affiliated hacking group Killnet says it accessed credentials belonging to Aleksei Vyskub, deputy minister under Mykhailo Fedorov at the Ministry of Digital Transformation.

Western analysts warn that if verified, this could give Russian intelligence a direct line into Ukraine’s military innovation infrastructure.

The Alleged Breach and Its Scope

Killnet’s Telegram posts describe a breach targeting BRAVE1 and the Ukrainian Startup Fund, both central to Ukraine’s modernization drive since 2022.

The hackers claim to have extracted vast amounts of material and mapped over 1,500 companies linked to drone research and production.

Leaked document samples reportedly include technical fragments, testing reports, industrial metadata, and GPS coordinates of sensitive facilities.

While the authenticity of all data remains under scrutiny, experts suggest the hackers may have acquired operationally useful information, not just disinformation for show.

Companies and Technologies at Risk

Several prominent drone firms appear in the leaked material, including Robokrok, led by Vadym Sazlyian; Burevii, directed by Viktor Dolhotyaev; and Skif Robotics, founded by Andrii Sanko.

Internal documents from these companies reportedly appear in the fragments, sparking unease across Kyiv and Lviv.

Among the most sensitive details are technical specifications for the Piranha AVD 360 electronic counter‑UAV system.

The leaked data includes transmission frequencies and operational parameters, information that could allow adversaries to design countermeasures or disable the system entirely.

Even partial exposure has serious strategic implications.

Strategic Locations and Operational Concerns

Killnet claims to hold GPS coordinates for production and testing sites, echoing the pattern of recent Russian strikes on drone facilities.

Small firms that rely on low visibility for protection are reportedly relocating operations in response.

Sources within Ukraine’s Security Service (SBU) indicate that lists of affected companies, emails, and geolocations are circulating privately for thousands of dollars, suggesting the breach could be a valuable intelligence asset for Russia.

While some data overlaps with open-source directories, the psychological impact on Ukraine’s drone sector is significant, with startups viewing the leak as a real threat.

Cyber Warfare and Its Ongoing Impact

Killnet claims it deleted the original databases, though cybersecurity experts dismiss this as unlikely.

Both BRAVE1 and U.S. Air Force systems rely on robust, audited cloud infrastructure.

Since 2023, Russian cyberattacks targeting Ukrainian drone startups and cloud networks have intensified, aiming to disrupt, overwhelm, and weaken Ukraine’s innovation capacity.

The platforms continue to operate, but tension is palpable.

As one Kyiv‑based FPV drone developer put it, “In this war, a stolen file can be as lethal as a missile.

The incident highlights how cyber operations are now a frontline tool, with potential consequences as tangible as conventional strikes.

Share on Facebook «||» Share on Twitter «||» Share on Reddit «||» Share on LinkedIn