Ukrainian Operation Spider's Web

Last updated on June 13, 2025

Background and Strategic Context

On June 1, 2025, Ukraine’s Security Service (SBU) initiated Operation Spider’s Web, a carefully planned covert drone assault targeting five Russian air bases—Belaya, Dyagilevo, Ivanovo Severny, Olenya, and Ukrainka—spanning five time zones deep inside Russian territory. The operation was the culmination of over 18 months of preparation, managed under the direct guidance of SBU head Vasyl Malyuk and President Zelenskyy .

Planning, Logistics, and Tradecraft

Drone deployment leveraged 117 Ukrainian-made Osa FPV quadcopters, each carrying explosive payloads. These drones were covertly smuggled into Russia hidden inside wooden modular cabins mounted on flatbed trucks driven by unwitting Russian drivers . As the trucks neared target bases, drivers received phone instructions to park, remotely raised the cabin roofs, and released the drones . Agents assembled and loaded the drones in a warehouse near Chelyabinsk, then safely departed before launch .

Technology and Targeting Systems

Navigation relied on ArduPilot, a nearly 20‑year‑old open‑source autopilot software enabling waypoint navigation and resilience to GPS jamming . Real-time targeting employed AI-assisted image recognition to identify aircraft features such as wing fuel tanks; deep-learning models were trained using imagery of Tu-22M3 from the Poltava museum . The FPV drones had fail-safe autonomy to complete missions even if communications dropped .

Execution and Damage Assessment

The strike inflicted damage across multiple air bases:

Ukrainian official figures asserting 41 aircraft hit with at least 13 destroyed, while U.S. assessments report 20 struck, including 10 destroyed—together representing roughly one-third of Russia’s strategic bomber force . The financial damage totaled approximately US $7 billion, achieved with drones costing barely a few thousand dollars each .

Technological and Tactical Innovations

Strategic and Psychological Effects