Ukrainian Forces Pull Soldier From Russian Captivity in Pokrovsk

Ukrainian Forces Pull Soldier From Russian Captivity in Pokrovsk
Soldiers of the 425th Separate Skelya Assault Regiment. November 2025. Photo credits: Facebook page of the Regiment

In Pokrovsk, Ukrainian assault troops and drone operators freed a Ukrainian Armed Forces soldier from Russian captivity.

The operation was carried out by members of the 425th Separate Skelya Assault Regiment.

The captured soldier serves in the 157th Separate Mechanized Brigade.

He had lost his route and inadvertently entered Russian positions.

A Ukrainian soldier in Russian captivity in the Pokrovsk area. November 2025. Screenshot from the drone camera of the Skelya Regiment

“The regiment command ordered us to extract the soldier at any cost,” the Skelya Regiment said.

The operation began with drone operators striking Russian positions at night.

During the attacks, the drones tracked enemy movements and disrupted their actions.

After the strikes, Russian troops began leaving shelters and scattering through a nearby tree line.

The drone footage showed at least five Russian soldiers, who were then pursued by Ukrainian drones.

Ukrainian drones chasing Russian troops in the Pokrovsk area. November 2025. Screenshor from the drone camera of the Skelya Regiment

Two Ukrainian soldiers were then sent to recover the captive. They found him in one of the craters.

He had minor injuries but was transported back to Ukrainian positions and given medical care.

Ukrainian soldier of the 157th Motorized Rifle Brigade released from Russian captivity. November 2025. Photo credits: Facebook page of the Skelya Regiment

This is not the first such incident. In April, drone operators of the 1st Separate Siversk Tank Brigade forced Russian troops away from captured Ukrainian soldiers and freed them.

Share this post:

SUPPORT MILITARNYI

PrivatBank ( Bank card )
5169 3351 0164 7408
Bank Account in UAH (IBAN)
UA043052990000026007015028783
BTC
bc1qg0z99m95fte7kj8faa7h2kvnq92wvc53exe8gm
USDT
0x8676644fA7B6d328310283cAC1065Ae01d97CEe7
ETH
0xfD02863D3289416fcF50975c9DFda13623f97758
Popular
Button Text