Tetkikler

Ishihara Testi

Vovan Braga Software (FHD 2027)

A second operator watches news feeds and social media during the call. If the target mentions a current event, the software suggests ad-libs via an earpiece to the prankster.

The call is auto-edited, captioned, and pushed to Telegram and YouTube within minutes—often before the target realizes they were duped. 3. Notable Exploits Enabled by the Software The software’s capabilities have led to several high-profile penetrations:

As AI-generated audio improves, the line between “prank” and “deepfake-driven intelligence operation” will blur further. The Vovan Braga toolkit is not merely a nuisance—it is a preview of the future of voice-based disinformation. Note: No actual software named “Vovan Braga” exists as a commercial product. This analysis describes the toolset reportedly used by the individuals known as Vovan and Lexus, based on forensic analysis of their leaked calls and public security reports. vovan braga software

| Target | Spoofed Identity | Software Feature Used | |--------|------------------|------------------------| | Elton John (2015) | Vladimir Putin | Basic spoofing + sentimental script | | US Senator John McCain (2018) | Ukrainian PM Volodymyr Groysman | Voice cloning + real-time translation | | UK Secretary Ben Wallace (2022) | Ukrainian PM Denys Shmyhal | Advanced AI voice cloning + crisis scenario | | European Central Bank’s Christine Lagarde (2022) | Ukrainian President Zelensky | Real-time translation + emotional manipulation |

In the shadowy intersection of trolling, disinformation, and social engineering lies —not a single piece of software, but a toolkit and brand associated with Russian pranksters Vladimir “Vovan” Kuznetsov and Alexei “Lexus” Stolyarov. Over the past decade, this duo has duped world leaders, celebrities, and politicians, including Elton John, Bill Clinton, and Canadian Prime Minister Justin Trudeau. While their notoriety stems from the calls themselves, the enabling technology—the “Vovan Braga software”—is a sophisticated suite of caller ID spoofing, voice manipulation, and reconnaissance tools. A second operator watches news feeds and social

The operator chooses a spoofed ID: the target’s own assistant’s number. The software initiates a VoIP call over a chain of anonymous VPNs and proxy servers, often routing through multiple countries (Netherlands → Singapore → US) to evade traceback.

If the target is wary, the software plays a pre-cloned audio snippet of a known colleague (“Hi, it’s [real person], could you take a call from [fake official]?”). Once connected, the prankster speaks into a microphone; the software applies real-time voice conversion to match the alleged caller (e.g., “Ukrainian Prime Minister”). Note: No actual software named “Vovan Braga” exists

Introduction

The software scans for high-value targets—e.g., a European parliamentarian. It automatically flags their office switchboard, known staff, and recent public events.