Ukrainian 3rd assault brigade seizes prisoners in attack on Russian positions

Ukrainian 3rd assault brigade seizes prisoners in attack on Russian positions
Soldiers of the 3rd assault brigade and a captured Russian invader near Bakhmut. May 2023. Ukraine. Footage from the video of the 3rd Assault Brigade

The Ukrainian military continues to advance and repel attacks in the Bakhmut area.

The 3rd Assault Brigade managed to capture prisoners during the attack on Russian positions.

The brigade also reported that they succeed in pushing the enemy back 1,730 meters in length and 700 meters in depth.

The units of the Russian 72nd Brigade tried to recapture the lost positions and failed.

“During yesterday’s battles alone, 23 invaders were killed, and more than 40 were injured. Enemy equipment, including tanks, was also eliminated,” the 3rd Assault Brigade informed.

The task was completed by the soldiers of the 2nd Assault Battalion of the 3rd Brigade.

Three Russians from the so-called Storm Z unit of the Russian 72nd Brigade, were captured.

One of them, a former prisoner, stayed at the frontline near Bakhmut for three days.

“Yesterday (May 20 – Ed.) he was successfully captured as a result of the assault actions of our brigade,” the military said.

The Storm-Z assault companies were formed by the Russian military command as part of certain Russian military units. The military command decided to do so to strengthen the “army assault groups”, taking into account the experience of manning the Wagner PMC assault groups.

The principle of forming such companies, similar to the Wagner units, involves recruiting individuals from correctional facilities.

As previously reported, the Ukrainian military command is waiting for an opportunity to regain full control of Bakhmut. The Armed Forces of Ukraine aim to encircle Bakhmut.

Share this post:

SUPPORT MILITARNYI

PrivatBank ( Bank card )
5169 3351 0164 7408
Bank Account in UAH (IBAN)
UA043052990000026007015028783
BTC
bc1qg0z99m95fte7kj8faa7h2kvnq92wvc53exe8gm
USDT
0x8676644fA7B6d328310283cAC1065Ae01d97CEe7
ETH
0xfD02863D3289416fcF50975c9DFda13623f97758
Popular
Button Text