Yeah, they called me as well a few months ago when they were still using a different remote-login program that, incidentally, had some known vulnerabilities that would let the client take control of the host. So I led them on for about 40 minutes and never once mentioned that I was running Linux. 40 minutes was enough time to spin up a fake windows VM and install the exploited client binary on. Combine that with a .bat file that B) issues a force-delete on C:\ and it took them about 2 months before they tried calling me again, by then they had changed their remote agent to logmein. LogMeIn has some known vulnerabilities, but I haven't found one that will let me take control of their "agent's" computer.
They still call from time to time. I usually just do something like this:
https://www.youtube.com/watch?v=XFWeoxrhbE8 and hang up, but if anyone finds a admin-level reverse session exploit for LogMeIn, lemme know. . .next bozo who calls I'm gonna install a keylogger and then write a script that parses their identity-theft-related information out and emails the victim and the FTC notifying them as soon as it gets typed in via email or text if such contact info is available.