Drone Strikes Russian Military Base in Grozny
Drone strike on Grozny. May 8, 2026. Source: Exilenova+

On the morning of May 8, a strike drone attacked a Russian military base in Grozny.

According to Astra, citing OSINT analysis of videos from the scene, at least two large fixed-wing drones targeted the capital of Chechnya.

One of the drones struck a military base in Khankala, a suburb of Grozny, where the headquarters of Russia’s 42nd Guards Motor Rifle Division (military unit 27777) is located.

The division is part of the 58th Combined Arms Army of Russia’s Southern Military District.

Another drone crashed near the railway station in central Grozny. Its likely target was the Chechen branch of the Federal Security Service, located about 120 meters away.

The military base attacked in Grozny on May 8, 2026. Source: Astra.

According to footage published by Exilenova+, the Ukrainian Defense Forces used light aircraft converted into kamikaze drones for the strike.

The use of such long-range unmanned aerial vehicles to hit key targets inside Russia has been known since 2024.

Ukrainian specialists have managed to transform civilian light aircraft into deadly weapons capable of carrying a large warhead and flying long distances.

An unmanned aircraft during the attack on Grozny on May 8, 2026. Source: Exilenova+.

Despite its size, this type of drone remains a difficult target for Russian air defense systems.

This is evidenced by today’s strike on the Chechen capital, as well as attacks on other Russian regions located more than 1,000 kilometers from Ukraine’s border.

The Grozny-City building after the drone strike. December 5, 2025. Source: ASTRA.

In early December last year, drones struck the building of the Security Council of the Chechen Republic, which had been sending militants to Ukraine.

Share this post:

SUPPORT MILITARNYI

PrivatBank ( Bank card )
5169 3351 0164 7408
Bank Account in UAH (IBAN)
UA043052990000026007015028783
BTC
bc1qg0z99m95fte7kj8faa7h2kvnq92wvc53exe8gm
USDT
0x8676644fA7B6d328310283cAC1065Ae01d97CEe7
ETH
0xfD02863D3289416fcF50975c9DFda13623f97758
Popular
Button Text