What are browser hijackers?
Written by a NortonLifeLock employee
A browser hijacker is defined as a “form of unwanted software that modifies a web browser’s settings without the user’s permission.” The result is the placement of unwanted advertising into the browser, and possibly the replacement of an existing home page or search page with the hijacker page. The idea is to make users visit certain websites whether they want to or not so the hijacker enjoys higher advertising revenue. Browser hijackers may also contain spyware to obtain banking information and other sensitive data.
Safety for every device.
Security is no longer a one-machine affair. You need a security suite that helps protect all your devices – your Windows PC, Mac, Android smartphone or your iPad.
As frustrating as browser hijackers can be, they luckily aren’t terribly challenging to remove—most of the time. Utilizing various software packages is therefore essential to keep hijackers away.
How Browser Hijackers Infect Computers
Browser hijackers infect computers by numerous means, including through shareware, freeware, and advertisement support applications “deployed through the installation of a web browser toolbar or add-on.” Adware and spyware infections also result in browser hijackers, as does exploitation of various browser vulnerabilities.
Symptoms of Browser Hijacking
Signs a browser is hijacked include:
- Searches that are redirected to different websites
- Multiple pop-up advertisement alerts
- Slow-loading web pages
- Multiple toolbars on a web browser not installed by the user
Examples of browser hijackers include:
- Ask Toolbar
- Coupon Server
Removing Browser Hijackers
Removing a browser hijacker generally means using computer virus programs that specialize in spyware removal. For example, downloading the Norton Power Eraser makes it possible to scan and remove unwanted toolbars. Norton provides the following instructions for using the Power Eraser:
- Download Norton Power Eraser.
- Click Save.
- Select the location as Desktop, and then click Save.
- To run Norton Power Eraser, double-click the NPE.exe file.
- If the User Account Control window prompts, click Yes or Continue.
- Read the license agreement, and click Accept.
- In the Norton Power Eraser window, click the Unwanted Application Scan icon.
- When Norton Power Eraser completes the scan, the results are displayed in the Unwanted Apps Scan Complete window.
- In the Unwanted Apps Scan Complete window, next to the unwanted application or toolbar, click Uninstall.
- Follow the on-screen instructions.
- When the uninstallation completes, restart the computer.
Sometimes the Power Eraser or a similar option doesn’t remove the toolbars, meaning they must be removed manually. This is done by resetting browser settings to remove unnecessary toolbars and search engines entirely. For example, if resetting Microsoft Internet Explorer settings, Norton recommends doing the following:
- Start Internet Explorer.
- On the Tools menu, click Manage add-ons.
- In the Manage Add-ons window, under Add-on Types, select Toolbars and Extensions.
- If you find any suspicious toolbar listed, select that toolbar, and click Disable.
- In the Manage Add-ons window, under Add-on Types, select Search Providers.
- Select a search engine, and click Set as default.
- Select the unknown search engine, and click Remove and Close.
- On the Tools menu, click Internet Options.
- In the General tab, under Home page, enter the address of your preferred page.
- Click Apply and OK.
- On the desktop, right-click the Internet Explorer shortcut and select Properties.
- In the Internet Explorer Properties window, under the Shortcut tab, in the Target field, delete the text after iexplore.exe.
- Click Apply and OK to save the changes.
- Click Close.
As with most things, the more you research and learn about browser hijacking, the better you’ll become at spotting the signs and taking the necessary action.
Try Norton 360 FREE 30-Day Trial* - Includes Norton Secure VPN
30 days of FREE* comprehensive antivirus, device security and online privacy with Norton Secure VPN.
Join today. Cancel anytime.
Editorial note: Our articles provide educational information for you. NortonLifeLock offerings may not cover or protect against every type of crime, fraud, or threat we write about. Our goal is to increase awareness about cyber safety. Please review complete Terms during enrollment or setup. Remember that no one can prevent all identity theft or cybercrime, and that LifeLock does not monitor all transactions at all businesses.
Copyright © 2022 NortonLifeLock Inc. All rights reserved. NortonLifeLock, the NortonLifeLock Logo, the Checkmark Logo, Norton, LifeLock, and the LockMan Logo are trademarks or registered trademarks of NortonLifeLock Inc. or its affiliates in the United States and other countries. Firefox is a trademark of Mozilla Foundation. Android, Google Chrome, Google Play and the Google Play logo are trademarks of Google, LLC. Mac, iPhone, iPad, Apple and the Apple logo are trademarks of Apple Inc., registered in the U.S. and other countries. App Store is a service mark of Apple Inc. Alexa and all related logos are trademarks of Amazon.com, Inc. or its affiliates. Microsoft and the Window logo are trademarks of Microsoft Corporation in the U.S. and other countries. The Android robot is reproduced or modified from work created and shared by Google and used according to terms described in the Creative Commons 3.0 Attribution License. Other names may be trademarks of their respective owners.