Ammyy scam – a phone scam that asks users to install remote access tools
Ammyy scam is used for tricking people into giving fake technicians remote access to their computers in order to fix various problems.
Ammyy scam is an old hoax that targets Windows OS users at least since 2013. Scammers call random people and present themselves as Microsoft specialists. They claim of detecting important issues or infections on their computers and ask to install a remote tool to fix them. Of course, this service is not for free. People are asked to pay $200.
|Targets||Windows OS users|
|Operation||Scammers call potential victims and ask to install a remote access tool in order to fix computer-related problems or clean from viruses|
|Used remote access tool||Ammyy Admin|
|The swindled sum of money||Around $200 per victim|
|Elimination||You can uninstall Ammyy as an ordinary program, but it's important to scan the device with Reimage Reimage Cleaner Intego to clean possibly installed malware or spyware|
Scammers ask to install Ammyy admin software that allows establishing a remote desktop connection and get access to victim’s computer. Therefore, the name of the program explains the title of this hoax.
The program is free and is available to download on the official website. We want to point out that this tool itself is not malicious and cannot do the damage. The company is also aware of the issue and warns users to be careful with suspicious phone calls. Attackers can only get access to your device if you let them. In this case, Ammyy removal is a must.
This legitimate program is available to download from the official website so, unsurprisingly, it has been exploited by cyber criminals.
When you give scammers access to your computer via remote access tool, they can do whatever they want. They might install malware, spyware, keyloggers or delete your files. This activity can lead not only to data loss but emptied bank account or stolen identity too. So, Ammyy admin removal has to be completed immediately.
Ammyy scam fix requires not only uninstalling the program via Control Panel, but checking the system for other cyber threats too. The latter task is extremely important if you let scammers access your PC. In this case, we highly recommend scanning the computer with Reimage Reimage Cleaner Intego or another anti-malware to make sure that attackers haven’t installed any malware.
Ammy Admin scam is an example of phone scams that are used for swindling the money from computer users.
The purpose of Ammyy scam – to make people pay for useless service
Researchers from NoVirus.uk assume that Ammyy admin scam is operated from India. Callers usually have a strong Indian accent. Though, unusual English accent is the first warning sign that you are not talking with Microsoft technicians. Why do they keep calling and report about invented computer problems? The answer is very simple – they seek to scare people into paying $200 for their useless service.
Ammy Admin scam is the term used for phone support hoax that gives attackers remote access to a targeted computer with a legitimate software.
I got scammed by this yesterday. They called saying they were from microsoft and my computer was a host of some nasty viruses and was sending out illegal information(!). I should have known better but they were extremely persuasive, I let them in via the ammyy remote access and they started messing around with things – to show me all the ‘errors’ in my computer.
Usually, scammers try to convince people that they work for Microsoft, scammers start reporting about various PC problems and offer to let them access the system. We highly recommend avoiding such suggestions because by doing so you can easily give attackers ability to steal your logins, passwords, and other personally identifiable information.
In addition, they may also try to infect your machine with malicious programs, redirect you to malicious sites and initiate similar issues. Please, keep in mind that Microsoft has never been calling for people in order to ask them pay for computer repair services. If you were involved in Microsoft Ammy hoax, follow the guide below and prevent additional problems.
The way how scammers reachers potential victims
Differently than regular tech support scams spreading on the web, this hoax does not require downloading any potentially unwanted program (PUP) or clicking a suspicious ad. Scammers usually use random phone numbers and can call anyone all over the world.
Hence, you may receive a call from AMMYY accidentally. Beware that these scammers always do their homework before they start contacting people, so they know who they are calling for. By using public phone directories and other sources, they can not only tell a full victim's name. They may also tell you where you live, your marital status and other personal details.
We want to remind one more time that Microsoft does not make such phone calls. Thus, you should quit the conversation and block the number if possible. Scammers tend to call the same people again and again in order to reach their goal.
Ammyy scam fix: uninstall remote access program and check the system with anti-malware software
If you became a victim the cam, you need to act immediately. If you are still talking on the phone with a scammer, hang up immediately. Then disconnect your computer from the Internet and uninstall the program. In order to remove Ammyy from Windows computer, follow these steps:
- Click Start -> Control Panel -> Programs (or Add/Remove Programs) -> Uninstall a Program.
- Here, look for AMMYY, Ammyy Admin, and other unknown entries, and select Uninstall/Change.
- Follow the guide on screen and click OK to save the changes.
Once you perform these steps, you should immediately download one of these programs and scan the system: Reimage Reimage Cleaner Intego, SpyHunter 5Combo Cleaner or Malwarebytes. They will not only help you to make sure that your computer is free of malware. They will also help you to find its hidden components and remove them in order to prevent the loss of your personal information.
After Ammyy removal, you should also monitor your banking transactions and inform the bank if you notice any suspicious activities on your account. Additionally, you should change all your passwords. You cannot be sure if the attackers managed to steal credentials or not. Make sure that you set strong and unique passwords for each account.
Access your website securely from any location
When you work on the domain, site, blog, or different project that requires constant management, content creation, or coding, you may need to connect to the server and content management service more often. It is a hassle when your website is protected from suspicious connections and unauthorized IP addresses.
The best solution for creating a tighter network could be a dedicated/fixed IP address. If you make your IP address static and set to your device, you can connect to the CMS from any location and do not create any additional issues for server or network manager that need to monitor connections and activities. This is how you bypass some of the authentications factors and can remotely use your banking accounts without triggering suspicious with each login.
VPN software providers like Private Internet Access can help you with such settings and offer the option to control the online reputation and manage projects easily from any part of the world. It is better to clock the access to your website from different IP addresses. So you can keep the project safe and secure when you have the dedicated IP address VPN and protected access to the content management system.
Backup files for the later use, in case of the malware attack
Computer users can suffer various losses due to cyber infections or their own faulty doings. Software issues created by malware or direct data loss due to encryption can lead to problems with your device or permanent damage. When you have proper up-to-date backups, you can easily recover after such an incident and get back to work.
It is crucial to create updates to your backups after any changes on the device, so you can get back to the point you were working on when malware changes anything or issues with the device causes data or performance corruption. Rely on such behavior and make file backup your daily or weekly habit.
When you have the previous version of every important document or project you can avoid frustration and breakdowns. It comes in handy when malware occurs out of nowhere. Use Data Recovery Pro for the system restoring purpose.