A browser hijacker is a malicious program, usually a web browser plug-in that modifies web browser settings in order to change default home, search or error page and redirect a user to undesirable Internet sites. A browser hijacker also can record all web pages the user visits and send gathered information out through a background Internet connection. Practically all browser hijackers are created for commercial, advertising or marketing purposes. Most parasites are very similar to spyware or adware threats and often have some of their functions. They are installed without explicit user consent and often attempt to obstruct their removal. All browser hijackers are harmful and therefore are always classified as security and privacy risks. Navigate to browser hijacker parasites

Newest Browser Hijackers

Delta Homes fix

July 31st, 2015. What is Delta Homes? Delta Homes is a nasty browser hijacker, which may start initiating various changes on each of your web browsers. After doing so, it may cause lots of unwanted activities, such as tracking of your browsing habits, initiating redirects to unknown websites, showing you... More...

Search.certified-toolbar.com removal steps

July 31st, 2015. What is Search.certified-toolbar.com? Search.certified-toolbar.com may try to create an image that it's a legitimate website, which was designed to help users with their search sessions on the Internet. However, many security experts have started to categorize it as browser hijacker and... More...

Get rid of Search.yac.mx

July 31st, 2015. What is Search.yac.mx? Search.yac.mx is not a virus or malware. However, no matter that it doesn't steal personal information, which is kept on the system, or doesn't spread viruses, it may lead your computer to some issues. According to 2spyware security experts, you should try to avoid... More...


Total Browser Hijackers parasites in our DB: 856

# | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

  • 123rede.com May 21st, 2015 | No Comments
    What is 123rede.com? 123rede.com is a Brazilian search engine that seems very suspicious. In fact, it's not o...

  • 16Start.com hijack February 4th, 2014 | No Comments
    16Start.com is an unfair search engine, which may return altered search results and make people visit related ...

  • 1place.org March 10th, 2014 | No Comments
    1place.org is an unfair search engine, which may be related to browser hijackers and other questionable progra...

  • 1startpage.com September 2nd, 2014 | No Comments
    1startpage.com is a very unreliable search engine that may appear on your screen right after your system has b...

  • 205acbc0.any.gs May 19th, 2014 | No Comments
    205acbc0.any.gs redirects, annoying pop-up ads and similar issues should make you worried and think about scan...

  • 22Apple.com redirect February 26th, 2013 | 1 Comments
    22Apple.com redirect is a serious problem, which is mostly revealed when user starts suffering from annoying r...

  • 22find virus February 26th, 2015 | 3 Comments
    What is 22find? 22find virus is a potentially unwanted program, which can also be categorized as a brows...

  • 22find.com September 17th, 2014 | No Comments
    What is 22find.com? 22find.com is a browser hijacker that may change browser's settings and disrupt your brow...

  • 2nd thought December 5th, 2011 | 20 Comments
    2nd thought is a Browser hijacker which resets your home page redirect your searches to porn sites. Its comp...

  • 321oyun.com May 25th, 2015 | No Comments
    What is 321oyun.com? 321oyun.com is an untrustworthy search site that can easily replace your start page, sea...

  • 4-you.net November 12th, 2013 | No Comments
    4-you.net is not a virus or malware that poses a risk of harm to computer. It's just an annoying search engine...

  • 555.in.th redirect September 1st, 2014 | No Comments
    What is 555.in.th? 555.in.th is mostly recognized as a browser hijacker because it can easily change your bro...

  • 6malwarescan.com September 18th, 2009 | No Comments
    6malwarescan.com is the browser hijacker, which aggressively promotes the rogue anti-spyware called Personal A...

  • 7000n July 9th, 2005 | No Comments
    It is a relatively harmless browser hijacker that changes the default Internet Explorer start page to www.7000...

  • 7search.com Virus June 6th, 2012 | No Comments
    7search.com is a pay-per-click search engine which is an affiliate advertising network. It is focused on helpi...

  • Aartemis April 7th, 2015 | 6 Comments
    What is Aartemis? Aartemis (you can also find it named as Aartemis.com, Aartemis virus, etc.) ...

  • ActionClassicGames Toolbar June 22nd, 2015 | No Comments
    What is ActionClassicGames Toolbar? ActionClassicGames Toolbar by Mindspark Interactive Network Inc is a dece...

  • Active-scanner.com October 28th, 2008 | No Comments
    Active-scanner.com is pesky browser hijacker. It keeps redirecting web browser to the same fraudulent website....

  • ActualNames September 1st, 2005 | 1 Comments
    ActualNames is an address bar search hijacker which targets IE, Netscape and AOL browsers. ActualNames seems t...

  • Ad.xertive.com redirect virus September 15th, 2012 | No Comments
    Ad.xertive.com is mostly classified as a browser hijacker that affects Windows systems and takes over all popu...

1 | | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22 | 23 | 24 | 25 | 26 | 27 | 28 | 29 | 30 | 31 | 32 | 33 | 34 | 35 | 36 | 37 | 38 | 39 | 40 | 41 | 42 | 43 | NEXT


Browser hijackers differ from regular viruses. They do not spread by themselves and usually must be installed as any other software with or without user content. There are three major ways unsolicited parasites can get into the system.

1. Usually browser hijackers are installed by unsafe freeware, shareware or advertising-supported programs such as various browser add-ons or toolbars. Even reputable AOL products like AOL Instant Messenger can change default web browser settings. Uninstalling the host application in most cases doesn’t remove bundled parasite.
2. Lots of spyware and adware parasites have integrated browser hijackers that get silently installed during the host parasite’s installation process. Removing a particular spyware or adware doesn’t affect a browser hijacker.
3. Some widely spread browser hijackers get into the system using Internet Explorer ActiveX controls or exploiting certain web browser vulnerabilities. Their authors run insecure web sites (mostly with pornographic or illegal advertising content) filled with malicious code or distribute unsafe advertising pop-ups. Whenever a user visits such a site or clicks on such a pop-up, harmful scripts instantly install a parasite. A user cannot notice anything suspicious, as browser hijackers do not display any setup wizards, dialogs or warnings.

It is known that some browser hijackers are dropped by specific viruses, worms or trojans.

Parasites affect mostly Microsoft Internet Explorer web browser. Some less prevalent threats are designed to compromise other popular browsers.


- Changes web browser’s default home page to a particular web site without asking for user permission.
- Changes web browser’s default search page to a predetermined web site without user consent.
- Sets own error page instead of web browser’s default one, which is displayed when the entered web site address is not valid.
- Redirects a web browser to a predefined site whenever the user enters invalid address or performs an Internet search.
- Modifies essential web browser settings, decreases default security level and adds undesirable or insecure resources to the Trusted sites list.
- Creates numerous links to advertising pages, places desktop shortcuts to marketing sites, adds multiple bookmarks to the web browser’s Favorites list.
- Tracks user’s web browsing habits, records addresses of visited sites and sends collected data to a remote server.
- Complicates usual web surfing, blocks some reputable Internet resources, opens different web sites instead of requested ones.
- Degrades overall web browser stability and performance. Some parasites are badly programmed, they waste too much computer resources and conflict with installed applications.
- Provides no uninstall feature and hides from the user in order to obstruct its removal as much as possible.


There are plenty of different browser hijacker parasites. The following examples illustrate their typical behavior.

SafeSearch, the widely spread pest, redirects Internet Explorer to predetermined web sites and displays undesirable advertisements from a pornographic web site. It also blocks access to popular Internet resources like MSN or VeriSign. Most browser hijackers are quite similar to SafeSearch and therefore are not very dangerous.

IBIS WebSearch is a way more functional and harmful browser hijacker. It is a third-party toolbar for Internet Explorer that provides a web search service, pop-up blocker and browser skins. However, it also changes default home and search pages and modifies essential Internet Explorer settings. IBIS WebSearch creates links to various resources, silently updates itself, downloads and installs unsolicited and potentially insecure arbitrary software without user knowledge and permission. Moreover, the parasite collects information about the user, logs keywords from searches and sends gathered data to a predetermined web server.

CoolWebSearch is an even more dangerous and traitorous threat. It is the entire family of browser hijackers that all attempt to redirect a web browser to the coolwebsearch.com domain. Most of them display large amount of undesirable commercial advertisements, change web browser's default start and search pages and modify browser’s essential security settings. Some CoolWebSearch variants are able to steal user passwords, bank account details and other user identity data. These parasites are virtually impossible to get rid of.


Most browser hijackers turn user’s usual web surfing into a real nightmare. Popular and often visited sites are blocked, web browser’s security is on the minimum level, Internet searches do not go through powerful search engines, required information cannot be accessed. All these problems are common consequences of a browser hijack. A typical parasite severely complicates user’s work and decreases his productivity.

Browser hijackers also affect the system and installed software. Parasites cause web browser instability issues, frequent errors and overall performance problems. Some reputable applications and browser plug-ins may be also affected by browser hijacker activity.

Some parasites violate user privacy. They disclose user’s personal information to advertisers and even hackers. Malicious persons use browser hijackers to track user activity in the Internet, find out their victim’s name, contact information and even steal priceless identity data, which then can be used for unclear purposes.

Browser hijackers that are associated with pornographic resources set adult web sites as home or search pages. Such behavior not only shocks a user, but also may cause some serious troubles. There are real examples of people who have lost their jobs because of explicit content found on their computers at work.


As it was said above most browser hijackers are quite similar to spyware and adware threats and therefore cannot be removed with the help of popular antivirus products. To remove them special anti-spyware tools (spyware removers) should be used. These programs scan the system in similar way as antivirus software does. However, they have special parasite signature databases, which allow them to detect and eliminate most privacy risks. Powerful spyware removers include real-time monitors that prevent the installation of known risks and unauthorized system modification. The most effective and popular anti-spyware programs are Microsoft AntiSpyware Beta, Spyware Doctor, Spybot - Search & Destroy, Ad-Aware SE, SpyHunter, eTrust PestPatrol. Several products such as HijackThis or CWShredder are designed especially to detect and remove browser hijackers.

In some cases even a spyware remover can fail to get rid of a particular parasite. That is why there are Internet resources such as 2-Spyware.com, which provide manual malware removal instructions. These instructions allow the user to manually delete all the files, directories, registry entries and other objects that belong to a parasite. However, manual removal requires fair system knowledge and therefore can be a quite difficult task for novices.

Additional resources related to Browser Hijackers:

Attention: If you know or you have a website or page about Browser Hijackers removal, feel free to add a link to this list: add url

more resources
Like us on Facebook
Recent Malware
Ask us
What's your antispyware?
Top rated software
add text box
rss feed
help other
Spreading the knowledge: It is very hard to fight against computer parasites on the Internet alone. If you have a website, we would be more than happy if you would like to cooperate and help us spread the information about latest threats. Remember, knowledge is the most powerful weapon. Help your visitors protect their computers!