Hello, I hope you can help. Do you keep a list of connections made through Teamviewer? including IP address etc to help the police find scammers who are using your product?
Firstly, I am sorry if you have been caught out by any scammers, this is not the intention of the software and we are doing everything we can to mitigate this kind of activity.
Can you send us an email with any of the information you had to email@example.com so we can look at this.
For anyone dealing with "customer support" / "Security Support" / "Windows Support" / others where they call you... and need you to use another vendor's remote access software, very likely a scam. If your skills are good enough to send them to a "virtual machine" then kick the **bleep** out of their computer (while connected to the virtual machine), have at it. Waste their resources and help take them down. If they are passing through some systems, can be a bit of a challenge for IP address. Impossible? No, just more difficult. What they are looking for? Passwords / Banking Info / access to other's systems / leave a tacker behind for more info / other. Lazy ones, looking for quick cash vs a larger amout (or anything you might have or others have), will just lock up your machine for a fee to unlock. Price varies depending if they spent time to look through your machine to see what is there. "Good stuff" and the price goes up. They might sound agressive as they look at any interferrance as "stealing the food off their table". Interesting, is true but they chose the life of stealing from others and you are only keeping what was yours to start with. Since you are stopping them from stealing from you.... you are stealing from them??? Word games / fast talkers / everything is right now so no time for some to think and get caught in their net. Do what you can to help shut them down. Waste their time, play ignorant of systems / access their systems but only if yours is isolated. Pay them nothing. If anyone pays them, it is "feeding the beast" and makes them stronger. As they strengthen they multiply. Take them down sooner than later.
They use several sites for their "games". Yesterday was Teamviewer, today they use **Third Party Product**, a while back another.... best is not to let anyone in. You reach out to your own support people or vis the proper channels to reach the proper vendor support people. Use the numbers your vendors provided. They will have their own access means. If you do not know the people looking to access your machine, do not "let them in". A legal issue which arises with such means of access, "You Let them in" by following their instructions. Word games yes but, people doing such are pretty good with words and twisting them.
These systems are great for many things, in the right hands. As with any tool, there are those who misuse / abuse them. Be smart, don't know the person trying to access? Don't "let them in"....