I've seen videos showing how tech support scammers operate. In nearly all of these videos, the scammer instructs their intended victim to install and run remote-control software, which allows the scammer to control the victim's computer. No surprises here. However, in at least some of these videos, the first thing the scammer does when he has control of the victim's computer is to install and run a different remote-control application and use it to connect to his own computer.
For example, in the YouTube videos Destroying Scammers Computer With Virus and Destroying All Computers On Scammers Network, the scammer instructs his victim to install and run Supremo, and then once he is controlling the victim's computer through Supremo, he installs and runs TeamViewer and seemingly uses it to connect to his own computer. (In these two videos, the intended victim is actually a scam-baiter, who exploits the reverse connection by installing and running malware on the scammer's computer.)
I don't understand why the scammers make the reverse connection in the first place. What advantage does this give them?