Ukrainian hackers infiltrate Russian Repey military app
Cyber Resistance activists successfully accessed the complete documentation for the Repey system, a Russian prototype similar to the Ukrainian Kropyva app designed for military purposes
The National Resistance Center reported the information.
It noted that the Ukrainian Kropyva tactical command and control system was developed in 2014 and allows to establish interaction between units, data exchange and provides access to a map of the area with regard to the landscape.
"Russian National Guard Lieutenant Colonel Yury Vishnyakov, an employee of the Organizational Department of the Special Forces of the Russian National Guard, has chosen to assist the Ukrainian Defense Forces by granting access to the Russian Repey app. This Russian system is being developed by the Sozvezdie concern for use by the occupiers," the statement said.
From the lieutenant colonel's correspondence with the manufacturers, it is evident that Repey is a counterfeit version of Kropyva.
The ideology, functional architecture, and even the interface copy the Ukrainian app completely. There are offline maps, switching between layers, and calculations of visibility and shelling zones based on a 3D terrain model.
Russian developers appear to be lacking in their ability to formulate original concepts, as they either seem incapable of doing so or their military leadership is so impressed with Ukrainian models like Kropyva, Delta, and Hryzelda that they opt for similar specifications in their terms of reference.
The National Resistance Center believes that this phenomenon forces Russia into a "catch-up strategy" concerning tactical and operational-tactical systems. In this strategy, the aggressor country will constantly lag behind Ukraine since their efforts are focused on copying trophy models, while Ukrainian developers continue to introduce new and innovative systems.
"Finally, there is no need for the Russians to continue implementing Repey because Lieutenant Colonel Vishnyakov failed in this task and provided the Ukrainian Defense Forces with all the documentation and access to the program. We express our gratitude to Comrade Vishnyakov for his assistance," the National Resistance Center summarized.
On September 21, the Cyber Resistance group gained access to the e-mail of the Russian military officer most likely responsible for the drone attacks on the Nikopol Ferroalloy Plant.