How to Identify a Browser Hijacker on Mac
Safari, Chrome or Firefox redirecting to strange search engines? Here is how to confirm a hijacker on macOS.
6 min read · Beginner friendly
Browser hijackers on Mac usually arrive bundled with a fake Flash update, a cracked app, or a misleading download from a search ad. They change your default search engine, install rogue extensions, and may add a Configuration Profile that locks the new homepage in place.
Symptoms worth checking
- Safari, Chrome or Firefox opens to a search page you did not choose
- Search results redirect through unfamiliar domains before reaching Google or Bing
- Pop-up ads appear even on sites that normally have none
- A new toolbar or extension appears that you did not install
- Your Mac shows 'Managed by your organization' in Chrome or a profile you did not add
Step 1: Audit Safari
- Open Safari → menu bar → Settings (or ⌘ ,)
- On the General tab, check the Homepage field
- On Search, confirm the search engine is one you chose (Google, DuckDuckGo, Bing, Yahoo or Ecosia)
- Open the Extensions tab and uncheck or remove anything unfamiliar
- Open Websites → Notifications and remove sites pushing alerts
Step 2: Audit Chrome and Firefox
- In Chrome: ⋮ menu → Settings → Search engine and On startup
- If Chrome shows Managed by your organization at the bottom, a hijacker has installed a policy
- Open Extensions (chrome://extensions) and remove anything you do not recognise
- In Firefox: about:preferences → Home and Search; also about:addons
Step 3: Check for a malicious Configuration Profile
- Open System Settings → General → Device Management (or Profiles on older macOS)
- If you see any profile you did not knowingly install (especially anything mentioning AdminPrefs, Chromium, or a search keyword), select it
- Click the − button to remove it and authenticate when prompted
Configuration Profiles are the most common way Mac browser hijackers persist. If you do not work for an MDM-managed company or school, you should have zero profiles installed.