Fix Browser Settings Changed by Malware - Guide

Browser Setting Hijacking: A Common Problem
Malicious software, including malware, adware, and aggressive software installers, frequently modify browser configurations.
These alterations can result in unwanted changes to your home page, default search engine, and the addition of irritating toolbars.
Why Browser Settings Change
It’s surprisingly simple to overlook unwanted options during software installation processes.
Users often fail to notice pre-checked boxes that authorize these modifications.
Restoring Your Browser
While reversing these changes is generally achievable, it often requires manual intervention.
Simply uninstalling the offending program doesn't always guarantee a return to your previously preferred settings.
Your desired home page and default search engine may remain altered even after the program's removal.
The Process of Reversion
Typically, restoring browser settings involves navigating through the browser's options and manually resetting each affected element.
This can be a tedious process, but it’s often necessary to regain control of your browsing experience.
Important Note: Even legitimate software can sometimes introduce these unwanted changes, so vigilance during installation is key.
Search Engine Manipulation
A modification to your browser's default search settings can result in an unintended search engine being utilized when you employ the browser’s integrated search functionalities, such as the address bar or context menu options.
Reverting to your desired search engine is a straightforward process:
- Internet Explorer: Access the settings menu via the gear icon. Navigate to Manage add-ons, then select the Search Providers section. From the displayed list, choose your preferred search provider and click "Set as default" located at the bottom of the window. Consider also activating the option to "Prevent programs from suggesting changes to my default search provider."
- Mozilla Firefox: Locate and click the search engine icon within the search box, positioned in the upper-right corner of the Firefox interface. Select your desired search engine from the presented options.
- Google Chrome: Right-click within the address bar at the top of the Chrome window and choose "Edit search engines." Hover over your preferred search engine and then select "Make default."
These steps will ensure your browser utilizes the search engine you have chosen.
Home Page Customization
Unwanted software frequently modifies your browser's home page, often replacing it with one laden with advertisements. This practice allows developers to generate revenue each time you launch your web browser.
Even without visible ads, these altered home pages typically feature a search function designed to redirect your queries through their own search engine, generating profit at the expense of your preferred choice.
Reclaiming Your Browser's Home Page
Fortunately, reverting your browser's home page to its original setting is a straightforward process.
- Internet Explorer: Access the settings menu via the gear icon. Then, navigate to Internet Options and select the General tab. Modify the addresses listed within the Home page field.
- Mozilla Firefox: Initiate the process by clicking the Firefox menu button. Select Options, then navigate to the General tab. Alter the address specified in the Home Page box.
- Google Chrome: Open Chrome's menu and select Settings. Under the Appearance section, ensure the "Show Home button" option is enabled. Click the "Change" option to customize your home page.
Additionally, within Chrome's settings, locate the "On startup" section and click "Set pages." Confirm that no extraneous web pages are configured to load automatically upon browser launch.
Browser Toolbars and ExtensionsRelated: A Guide to Viewing and Disabling Installed Plug-ins Across Browsers
Browser toolbars continue to represent a persistent issue within the Windows software landscape. Even established software like Oracle's Java can attempt to install unwanted toolbars, such as the Ask toolbar, during installation. These toolbars aim to prominently display a company’s offerings within your browser, promoting their features and search engine.
It was once feasible to accumulate so many browser toolbars, particularly in Internet Explorer and similar browsers, that they would dominate the browser window’s available space.
To remove an unwanted toolbar or browser extension, consider these steps:
- Control Panel Uninstall: Begin by accessing the Programs and Features Control Panel and attempt to uninstall the toolbar as you would any conventional application. A legitimate toolbar may be listed here, allowing for standard uninstallation.
- If the toolbar isn't present in the list, proceed to disable it directly within your browser, following the instructions below.
- Internet Explorer: Access the gear menu, then select Manage add-ons. Choose the Toolbars and Extensions category. Identify the toolbar or extension you wish to remove, select it, and click the Disable button.
- If the add-on isn't immediately visible, click the Show dropdown and select All add-ons.
- Mozilla Firefox: Click the Firefox menu button and navigate to Extensions. Select the add-on you intend to disable and click the Disable button.
- Google Chrome: Open Chrome's menu button, select Settings, and then choose the Extensions category on the left side of the window. Disable an extension by unchecking the Enabled box next to its name.

Unexpected Website Redirects
The surreptitious redirection of web traffic is a more severe issue than simple homepage alterations, search engine substitutions, or the installation of unwanted toolbars, and consequently, it occurs less frequently. However, malicious browser extensions can exploit their granted permissions to divert users to unintended destinations, such as redirecting a request for google.com to scamsearchengine.com. Alternatively, malware infections may alter the Windows hosts file to achieve this outcome.
Begin by removing any browser extensions or toolbars that you do not recognize. These components integrate directly with your browser and possess the capability to redirect your online activity to different web pages.
Should removing unwanted browser add-ons prove ineffective, examining your hosts file is the next step. Malicious software frequently manipulates the Windows hosts file to cause websites to redirect.
For detailed instructions, refer to our guide on editing your hosts file. Carefully scrutinize the file for any anomalous entries. A standard Windows hosts file should contain only commented lines – those beginning with a # symbol – below the header. If extraneous entries are present, they can likely be deleted, leaving only the lines preceded by the # character.
The image below illustrates a typical Windows 7 hosts file.

Addressing Resetting Browser Settings
Related: Discovering how to scan your computer utilizing multiple antivirus solutions can be beneficial.
Should you observe your browser settings reverting to previous configurations after modification, it indicates the presence of a program on your system actively disrupting these settings. A comprehensive scan for malware is crucial, as such programs are frequently identified as malicious by standard antivirus software.
If your current antivirus solution fails to detect any threats, seeking a second assessment from an alternative program is recommended.
Historically, the installation processes of Windows programs have sometimes exploited user browser configurations. Consequently, the "Modern" Internet Explorer version introduced with Windows 8 intentionally lacks support for browser toolbars and extensions.
This design choice was implemented to enhance security and prevent unwanted modifications to the user's browsing experience.
Further Considerations
- Regularly update your antivirus software to ensure it possesses the latest threat definitions.
- Be cautious when installing new software, paying close attention to any bundled offers or requests for browser modifications.
- Consider utilizing a browser extension designed to prevent unwanted changes to your settings.
Maintaining a secure computing environment requires vigilance and proactive measures against potentially harmful software.