From a cryptoanalysis point of view, there are two means to attack the enemies cryptosystems.
1. break the system through a weakness
2. convince the enemy that you already have broken the system when you can't find a weakness in hopes that they switch to a weaker system you can break.
As far as I am aware, we have absolutely NO information which one of the two applies.