- Category
- Latest news
Ukraine’s Deep-Cover Agents Inside Russian Army Sabotage Kremlin Offensive in East of Ukraine

Ukrainian partisans operating within the Russian military helped prevent a planned offensive near the town of Vovchansk in the Kharkiv region, according to reports from the resistance movement ATESH on October 11.
“Our sources in the 82nd Motor Rifle Regiment of the Russian Armed Forces passed on critical intelligence about preparations for an offensive in the forested area near Vovchansk,” ATESH stated. “Agents provided precise coordinates of Russian artillery positions, armored vehicles, and troop concentrations.”
According to ATESH, the data included the locations of firing points, ammunition transport routes, and the rotation schedule of Russian units.
This intelligence enabled Ukraine’s Defense Forces to fortify their positions in advance and launch preemptive strikes against Russian troops, preventing the assault before it began.

The group emphasized that its informants are embedded within active Russian military units, where they collect and transmit battlefield intelligence to Ukrainian defense structures. Ukrainian forces reportedly used the information to conduct targeted strikes, disrupting Russian logistics and neutralizing potential attack vectors.
Russian forces have continued efforts to establish what Moscow calls a “buffer zone” along the northern border of Ukraine.
Vovchansk remains a key target for Russian operations in the South Slobozhansky direction. Ukrainian troops continue to hold positions on the northern bank of the Vovcha River, including the territory of the local Aggregate Plant.
Earlier, on September 29, ATESH reported that one of its agents inside Russia’s 439th Guards Rocket Artillery Brigade helped disable a Pantsir‑S1 air‑defense system on the Kherson front by leaking its coordinates and video footage to Ukraine’s Defense Forces, resulting in a strike that destroyed the radar and left the system inoperable for months.
-f223fd1ef983f71b86a8d8f52216a8b2.jpg)





