Browser hijackers have become one of the most common types of malware on the Mac. Whether you use Safari, Chrome, Firefox, or another browser entirely, you’re at risk of browser hijacking. Here, we’ll tell you how you can tell if your browser has been hijacked and how to remove the culprit.
These are exciting times for the Mac. The first Apple silicon chip, the M1, powers the new MacBook Air, 13-inch MacBook Pro, and Mac mini. With Apple acknowledging that this is just the start of a. The myth that Mac computers are immune to viruses and malware is simply not true. Mac computers can get viruses and need file-based antivirus protection. Additionally, they need the other layers of protection offered in a device security software suite such as Firewall, Intrusion Prevention and Anti-phishing Protection. Avery Label Templates Mac Pages / Numbers, Label Templates Mac Pages / Numbers / Avery Address Labels (Avery 18160 Template) Simple Pages template of address labels (1' x 2-5/8'), compatible with Avery 18160 template. 30 labels per page. Get standalone installers and update to the latest version of Chrome Browser. Choose this option to get the latest installer versions for Windows and Mac if you already have the latest Chrome Browser templates. Delete a page in Word. Find or replace text or formatting. Format text as superscript and subscript. Insert, delete, or change a section break. Insert or remove a page break. Insert or reply to a comment. Keyboard shortcuts. Make a checklist. Protect a document with a password. Remove tracked changes and comments. Save or convert to PDF on your Mac.
What is browser hijacking?
It’s a type of malware that once it has been downloaded and installed, takes control of your web browser. Typically, it will change your homepage to one that the hacker wants you to visit, and change your default search engine to one that allows the hacker to monitor your searches and clicks.
That information will then be used to display adverts. Some browser hijacking also involves installing toolbars that claim to find discounts or offer coupons for online shopping sites. In reality, this is adware, designed to get you to click on a link that will take you to a suspicious website in order to increase its advertising revenue.
Hijackers may also download files to your Mac that monitor your activity or steal data. For example, your Mac may get infected with a software keylogger that can record your banking and e-mail authentication information.
Well-known examples
There are a number of hijackers that have become well-known because they are so widespread. You might have heard of some of them. Many of them have names that make them sound like search or shopping extensions.
- Pitch of Case
- Search Quick
- Time Search Now
- Booking app
- Fuq.com
All of these hijackers sneak onto your Mac by bundling themselves with apparently legitimate applications or disguising themselves as updates, for example to Flash Player. And they all intercept your browser’s homepage and default search engine and change it to wherever the hacker wants you to go.
macOS’ GateKeeper feature safeguards your Mac and checks the apps you’re about to download. It approves apps that are already on the App Store or those whose code is signed by an authorized developer.
To install anything else the GateKeeper doesn’t advise, you need to confirm the download. Code-signed apps must also be notarized by Apple – that means they are checked for malware, among other things – in order to get past GateKeeper. CleanMyMac X is one such notarized app, meaning it has been approved by Apple.
How can I tell if my browser has been hijacked?
There are a number of possible symptoms:
- Has your browser’s homepage changed without you changing it?
- Have you started seeing lots of adverts you wouldn’t normally see?
- Has your default search engine changed?
- Is your browser running more slowly than usual or behaving erratically?
If the answer to any of those questions is ‘yes’, it’s likely your browser has been hijacked.
How can I avoid being hijacked?
Hijackers find their way onto your Mac using a number of different techniques. However, in each case, they are downloaded after an action initiated by the user, such as clicking a link in a phishing email or on a questionable website.
- Don’t click on any link in an email or instant message unless you are certain where it leads.
- Don’t respond to pop-up adverts that claim a component, like Flash Player, is out of date, or that your system needs to be repaired.
- Avoid downloading apps from free. software download sites that use their own proprietary download manager.
- Keep your OS and all your apps up to date – CleanMyMac X has an updater that scans apps installed on your Mac, checks for updates, and then allows you to update all those that have new versions available.
How to remove browser malware on Mac
There are two ways to remove hijackers – the manual, tiresome, way or the automatic, fast method.
To remove browser hijackers in Safari manually:
- In Safari, click on the Safari menu and choose Preferences.
- Select the Extensions tab and look for any extensions you don’t recognize.
- If you find one, click on it and press Uninstall.
- Now, choose the General tab and set your homepage to your preferred start page.
- Finally, select the Search tab and choose the search engine you want to use.
To delete browser hijackers in Chrome:
- Launch Chrome and type the following in the address bar:
chrome://extensions
- Look for any extensions you don’t recognize.
- If you see one, press Remove next to it.
- Now, paste this in the address bar:
chrome://settings
- Scroll down to “On startup” and decide what page do you want to see at the start of your browser.
- In the “Search engine” section, choose a default search engine.
Firefox:
- Launch Firefox and enter this command in the address bar:
about:addons
- Choose “Extensions”.
- Look for any extensions that seem suspicious.
- If you find one, click the ellipsis (3-dot) next to an extension and click Remove.
- Then, go to
about:preferences
- In the Home section, set your homepage.
- In Search, set your default search engine.
Browser hijacker removal the easy way
The easiest method and the one we recommend is to use CleanMyMac X, which has a tool for deleting Extensions.
- Download, install and launch CleanMyMac X.
- Choose Extensions in the sidebar.
- Click on a browser, and check the box next to the extensions you want to delete.
- Press Remove.
CleanMyMac X also has a tool that allows you to clear browser caches. You should certainly do that if you have had malware in your browser.
- In CleanMyMac X, choose the Privacy module.
- Press Scan.
- When it’s finished, check the box next to your browser in the main window.
- Press Remove.
The browser hijacker is a common type of malware that typically comes bundled with apps downloaded in download managers from free software sites. Once installed, they change the homepage and default search engine for your browser in order to direct you to pages that display adverts. They may also steal data. Fortunately, with the help of CleanMyMac X, they are fairly easy to remove.
NOTE:
Between mid October 2019 and mid February 2020 everyone in the Army was migrated to use their PIV Authentication certificate for Email access. You no longer use the Email certificate for Enterprise Email or any CAC enabled websites
Mac users who choose to upgrade (or already have upgraded) to Mac OS Catalina (10.15.x) or Big Sur (11.xx.x) will need to uninstall all 3rd Party CAC enablers per https://militarycac.com/macuninstall.htm AND reenable the native smart card ability (very bottom of macuninstall link above)
If you purchased your Mac with OS Catalina (10.15.x) or Big Sur (11.xx.x) already installed, you can skip the uninstall part above and follow the instructions below.
6 'high level' steps needed, follow down the page to make this a painless systematic process
1. | Is your CAC reader 'Mac friendly'? |
2. | Can your Mac 'see' the reader? |
3. | Verify which version of Mac OS you have |
4. | Figure out which CAC (ID card) you have |
5. | Install the DoD certificates |
5a. | Additional DoD certificate installation instructions for Firefox users |
6. | Decide which CAC enabler you want to use (except for 10.12-.15 & 11) |
Step 1: Is your CAC reader Mac friendly?
Visit the USB Readers page to verify the CAC reader you have is Mac friendly.
Visit the USB-C Readers page to verify the CAC reader you have is Mac friendly.
'Some, not all' CAC readers may need to have a driver installed to make it work.
NOTE: Readers such as: SCR-331 & SCR-3500A may need a firmware update (NO OTHER Readers need firmware updates).
Information about these specific readers are in Step 2
Step 2: Can your Mac 'see' the reader?
Plug the CAC reader into an open USB port before proceeding, give it a few moments to install
Step 2a: Click the Apple Icon in the upper left corner of the desktop, select 'About This Mac'
Step 2b: Click 'System Report...' (button)
Step 2c: Verify the CAC reader shows in Hardware, USB, under USB Device Tree. Different readers will show differently, most readers have no problem in this step. See Step 2c1 for specific reader issues.
Step 2c1: Verify firmware version on your SCR-331, SCR-3310 v.20, GSR-202, 202V, 203, or SCR-3500a reader. If you have a reader other than these 6, Proceed directly to step 3
Step 2c1a-SCR-331 reader
If your reader does not look like this, go to the next step.
In the 'Hardware' drop down, click 'USB.' On the right side of the screen under 'USB Device Tree' the window will display all hardware plugged into the USB ports on your Mac. Look for “SCRx31 USB Smart Card Reader.” If the Smart Card reader is present, look at 'Version' in the lower right corner of this box: If you have a number below 5.25, you need to update your firmware to 5.25. If you are already at 5.25, your reader is installed on your system, and no further hardware changes are required. You can now Quit System Profiler and continue to Step 3.
Step 2c1b-SCR-3310 v2.0 reader
If your reader does not look like this, go to the next step.
In the 'Hardware' drop down, click 'USB.' On the right side of the screen under 'USB Device Tree' the window will display all hardware plugged into the USB ports on your Mac. Look for “SCR3310 v2.0 USB Smart Card Reader.” If the Smart Card reader is present, look at 'Version' in the lower right corner of this box: If you have a number below 6.02, it will not read the 'G+D FIPS 201 SCE 7.0' CAC on Mac OS 11.xx.x or 10.15.7. I contacted HID (the company that makes these readers) on 14 DEC 2020 to find a way to update the firmware to 6.02. They said there is not firmware update for the reader. If your reader is older, you may need a new one. Please look at: https://militarycac.com/usbreaders.htm to find a compatible one. If you are already at version 6.02, your reader should work fine on your Mac and no further hardware changes are required. You can now Quit System Profiler and continue to Step 3.
Step 2c1c-SCR-3500A reader
If you have the SCR3500A P/N:905430-1 CAC reader,you may need to install this driver, as the one that installs automatically will not work on most Macs. Hold the control key [on your keyboard] when clicking the .pkg file [with your mouse], select [the word] Open
Step 3: Verify which version of MacOS you have?
(You need to know this information for step 6)
Step 3a: Click the Apple Icon in the upper left corner of your desktop and select 'About This Mac'
Step 3b: Look below Mac OS X for: Example: Version 10.X.X, or 11.X
Step 4: Figure out which CAC (ID Card) you have
(You need to know this information for step 6)
Look at the top back of your ID card for these card types. If you have any version other than the six shown below, you need to visit an ID card office and have it replaced. All CACs [other than these six] were supposed to be replaced prior to 1 October 2012.
Find out how to flip card over video
Step 5: Install the DoD certificates (for Safari and Chrome Users)
Go to Keychain Access
Click: Go (top of screen), Utilities, double click Keychain Access.app
(You can also type: keychain access using Spotlight (this is my preferred method))
Select login (under Keychains),and All Items (under Category).
Download the 5 files via links below (you may need to <ctrl> click, select Download Linked File As... on each link) Save to your downloads folder
Please know... IF You have any DoD certificates already located in your keychain access, you will need to delete them prior to running the AllCerts.p7b file below.
https://militarycac.com/maccerts/AllCerts.p7b,
https://militarycac.com/maccerts/RootCert2.cer,
https://militarycac.com/maccerts/RootCert3.cer,
https://militarycac.com/maccerts/RootCert4.cer, and
Double click each of the files to install certificates into the login section of keychain
Select the Kind column, verify the arrow is pointing up, scroll down to certificate, look for all of the following certificates:
DOD EMAIL CA-33 through DOD EMAIL CA-34,
DOD EMAIL CA-39 through DOD EMAIL CA-44,
DOD EMAIL CA-49 through DOD EMAIL CA-52,
DOD EMAIL CA-59,
DOD ID CA-33 through DOD ID CA-34,
DOD ID CA-39 through DOD ID CA-44,
DOD ID CA-49 through DOD ID CA-52,
Get Ready Mr. Mac's Page Sign In
DOD ID CA-59
DOD ID SW CA-35 through DOD ID SW CA-38,
DOD ID SW CA-45 through DOD ID SW CA-48,
DoD Root CA 2 through DoD Root CA 5,
DOD SW CA-53 through DOD SW CA-58, and
DOD SW CA-60 through DOD SW CA-61
NOTE: If you are missing any of the above certificates, you have 2 choices,
1. Delete all of them, and re-run the 5 files above, or
2. Download the allcerts.zip file and install each of the certificates you are missing individually.
Errors:
Error 100001 Solution
Error 100013 Solution
You may notice some of the certificates will have a red circle with a white X . This means your computer does not trust those certificates
You need to manually trust the DoD Root CA 2, 3, 4, & 5 certificates
Double click each of the DoD Root CA certificates, select the triangle next to Trust, in the When using this certificate: select Always Trust, repeat until all 4 do not have the red circle with a white X.
You may be prompted to enter computer password when you close the window
Once you select Always Trust, your icon will have a light blue circle with a white + on it.
Get Ready Mr. Mac's Page Search
The 'bad certs' that have caused problems for Windows users may show up in the keychain access section on some Macs. These need to be deleted / moved to trash.
The DoD Root CA 2 & 3 you are removing has a light blue frame, leave the yellow frame version. The icons may or may not have a red circle with the white x
or | DoD Interoperability Root CA 1 or CA 2 | certificate | |
DoD Root CA 2 or 3 (light blue frame ONLY) | certificate | ||
or | Federal Bridge CA 2016 or 2013 | certificate | |
or | Federal Common Policy CA | certificate | |
or | or | SHA-1 Federal Root CA G2 | certificate |
or | US DoD CCEB Interoperability Root CA 1 | certificate |
If you have tried accessing CAC enabled sites prior to following these instructions, please go through this page before proceeding
Clearing the keychain (opens a new page)
Please come back to this page to continue installation instructions.
Step 5a: DoD certificate installation instructions for Firefox users
NOTE: Firefox will not work on Catalina (10.15.x), or last 4 versions of Mac OS if using the native Apple smartcard ability
Download AllCerts.zip, [remember where you save it].
double click the allcerts.zip file (it'll automatically extract into a new folder)
Option 1 to install the certificates (semi automated):
From inside the AllCerts extracted folder, select all of the certificates
<control> click (or Right click) the selected certificates, select Open With, Other...
In the Enable (selection box), change to All Applications
Select Firefox, then Open
You will see several dozen browser tabs open up, let it open as many as it wants..
You will eventually start seeing either of the 2 messages shown next
If the certificate is not already in Firefox, a window will pop up stating 'You have been asked to trust a new Certificate Authority (CA).'
Check all three boxes to allow the certificate to: identify websites, identify email users, and identify software developers
or
Get Ready Mr. Mac's Page Store
'Alert This certificate is already installed as a certificate authority.' Click OK
Once you've added all of the certificates...
• Click Firefox (word) (upper left of your screen)
• Preferences
• Advanced (tab)
• Press Network under the Advanced Tab
• In the Cached Web Content section, click Clear Now (button).
• Quit Firefox and restart it
Option 2 to install the certificates (very tedious manual):
Click Firefox (word) (upper left of your screen)
Preferences
Advanced (tab on left side of screen)
Certificates (tab)
View Certificates (button)
Authorities (tab)
Import (button)
Browse to the DoD certificates (AllCerts) extracted folder you downloaded and extracted above.
Note: You have to do this step for every single certificate
Note2: If the certificate is already in Firefox, a window will pop up stating: 'Alert This certificate is already installed as a certificate authority (CA).' Click OK
Note3: If the certificate is not already in Firefox, a window will pop up stating 'You have been asked to trust a new Certificate Authority (CA).'
Check all three boxes to allow the certificate to: identify websites, identify email users, and identify software developers
Once you've added all of the certificates...
• Click Firefox (word) (upper left of your screen)
• Preferences
• Advanced (tab)
• Press Network under the Advanced Tab
• In the Cached Web Content section, click Clear Now (button).
• Quit Firefox and restart it
Step 6: Decide which CAC enabler you can / want to use
Only for Mac El Capitan (10.11.x or older)
After installing the CAC enabler, restart the computer and go to a CAC enabled website
NOTE: Mac OS Sierra (10.12.x), High Sierra (10.13.x), Mojave (10.14.x), Catalina (10.15.x), and Big Sur (11.1) computers no longer need a CAC Enabler.
Try to access the CAC enabled site you need to access now
Mac support provided by: Michael Danberry