


Therefore, the cyber criminals can eliminate the necessity of any user interaction past the initial one by using this function. This means that a device can be reaccessed repeatedly without requiring the user to provide their password consecutively – one instance is enough.įurthermore, UltraViewer has an “unattended access” functionality, which the connected party can configure on the remotely accessed device. Hence, scammers do not need to walk their victims through multiple steps on how to create such a password, as they can do so themselves upon initial access. At the time of writing, our testing revealed that it is possible for the party remotely controlling a device to set a custom password on UltraViewer. However, there is a feature that allows for custom passwords to be set, which do not change after the session is terminated. UltraViewer also employs preventative measures against brute-force attacks – to stop cyber criminals from forcibly obtaining said passwords. The program aims to prevent repeated access by generating new passwords for each session, which the user can terminate at any time. To connect with another device using UltraViewer, the user needs to give their UltraViewer ID and password to the connecting party. Remote app developers are aware of the potential abuse of their software and tend to use a variety of security measures to counteract it.

This is achieved through the use of software like UltraViewer. Tech support scams require remote access so that the scammers could variously abuse victims’ devices/data for revenue – under the guise of providing “ technical support” services.

However, like many other remote access tools, UltraViewer is misused by cyber criminals to facilitate their scams. This program is operational on Windows XP all the way to the Windows 11 operating system version. Technical support scams are promoted on deceptive websites, and they typically involve claims about users’ devices being infected but recoverable by calling “ expert technicians“, “ technical support“, etc.Īs mentioned in the introduction, UltraViewer is a legitimate application that offers remote access/control functionalities for single/multiple devices, file sharing, chatting, etc. It must be stressed that the developers of this software are not associated with scams cyber criminals abuse these apps for their own malicious goals. Tech support scammers rely on such programs to gain access/control over their victims’ devices. UltraViewer is a legitimate remote access software which allows users to connect and control systems over a distance. “UltraViewer Tech Support Scam” refers to technical support scams facilitated through the use of the UltraViewer application. What to do if you fell for a pop-up scam?.What to do if I have encountered/trusted a technical support scam?.What is “UltraViewer Tech Support Scam”?.
