‘Mole’ in AFU exposed for helping Russia plot strike on commander Biletskyi

photo, video

The military counterintelligence of the Security Service of Ukraine (SSU) has detained a Russian agent who was preparing a targeted missile and bomb strike on the location of the commander of the Third Army Corps of the Defense Forces of Ukraine in the combat zone.

According to Ukrinform, the SSU reported this.

The enemy accomplice turned out to be a drone operator from another brigade performing tasks in the Kharkiv region.

Russian special services recruited him through his former wife, who lives in the temporarily occupied part of the Zaporizhzhia region and cooperates with Russia.

The investigation established that the suspect attempted to determine the time and place of arrival of an AFU general at the positions of his formation. To gather intelligence, the perpetrator used his access to official information and also tried to discreetly extract classified information from fellow servicemen.

At the same time, he was supposed to inform the Russians about the location of his brigade’s headquarters and training center, which the enemy was preparing to strike separately.

The SSU exposed the “mole” at the initial stage of his activity. Contacts between the suspect and Russians were gradually documented, and the relevant Defense Forces locations were secured.

The enemy agent was detained on the territory of a garrison during the final stage of the special operation. A smartphone used to maintain communication with the invaders was seized from him.

The suspect has been notified of suspicion under Part 2 of Article 111 of the Criminal Code of Ukraine – high treason committed under martial law.

The man is currently in custody. He faces life imprisonment with confiscation of property.

The mole was uncovered with the assistance of the Commander-in-Chief of the Armed Forces of Ukraine, Oleksandr Syrskyi, and the commander of the Unmanned Systems Forces of the Ukrainian Armed Forces, Robert Brovdi.

Read also: SSU detains Russian “welder” spying on Ukrainian air defenses and airfields

For its part, the Prosecutor General’s Office reported that the Ukrainian serviceman exposed for cooperating with Russian intelligence had collected data for the enemy while serving near the line of combat contact in the area of the city of Izium in the Kharkiv region.

According to investigators, the Russians recruited the soldier no later than February 2026. Communication between them took place via the Telegram messaging app using code words.

Investigators have documented that on February 13 the suspect informed Russian forces about the accumulation of reserves and military equipment of the Defense Forces of Ukraine in the Izium area. He also stated that he knew the location of the headquarters of one Ukrainian military unit and was ready to pass on its coordinates.

In subsequent messages, the agent provided information about the location of the headquarters of a battalion of unmanned systems, noting that the command staff were present there during the daytime. On the same day, he sent screenshots from Google Maps marking the coordinates of dugouts with Ukrainian personnel, areas where staff units conducted coordination and training, and positions visited by the command of one of the army corps.

Among other things, the suspect also passed on the coordinates of a location where medical evacuation of wounded soldiers was taking place, as well as sites where unmanned systems, robotic complexes, and weapons were being transferred.

In messages sent to the Russians, the suspect noted that he had personally been at those locations and knew where FPV drone operators were working.

The next day, the suspect transmitted information about the movements of the commander of the Defense Forces’ army corps.

On February 20, following instructions from a representative of Russian intelligence services, the perpetrator sent the phone number of his commander, indicating his rank and name.

The activities of the enemy agent were stopped on March 11.

Read also: SBU uncovers scheme for mass production of fake security service IDs

According to information on the official Facebook page of the Third Army Corps of the Armed Forces of Ukraine, the corps commander is Andrii Biletskyi.

As reported by Ukrinform, in Dnipro two underage boys were detained in connection with an attempted premeditated murder of a Ukrainian Armed Forces serviceman.