Physical Address

Lesya Kurbasa 7B
03194 Kyiv, Kyivska obl, Ukraine

How to Remove Bing.com Redirect: Complete Browser Hijacker Removal Guide

Browser hijackers are among the most common and frustrating types of potentially unwanted programs (PUPs) that can affect your browsing experience. While Microsoft’s Bing is a legitimate search engine, its URL is frequently used by browser hijackers to redirect your searches and modify your browser settings without permission. This comprehensive guide explains what the Bing.com redirect is, how it infiltrates systems, and provides detailed instructions to remove it from all major browsers.

Key Facts

Threat Name Bing.com browser hijacker, Bing redirect
Type Browser Hijacker, Redirect, Search Hijacker, Unwanted New Tab
Affected Browser Settings Homepage, new tab URL, default search engine
Detection Names
  • Avast: Win32:Malware-gen
  • Kaspersky: not-a-virus:AdWare.Win32.DealPly.ehqwx
  • ESET-NOD32: Win32/InstallCore.Gen.A potentially unwanted
Distribution Methods Bundled with free software, deceptive pop-up ads, fake Flash Player installers, malicious browser extensions
Symptoms Altered browser settings, redirects to Bing.com, unwanted new tab behavior, inability to change browser settings
Risk Level Medium – While not malicious itself, browser hijackers can lead to privacy issues and exposure to malware

What is the Bing.com Browser Hijacker?

The Bing.com browser hijacker is a potentially unwanted program that modifies your web browser’s settings to redirect your searches, homepage, and new tabs to Bing.com without your explicit permission. It’s important to understand that Bing itself is a legitimate search engine developed by Microsoft. However, many browser hijackers forcibly set Bing as your default search engine to generate traffic and potentially collect browsing data.

These hijackers typically target popular browsers like Google Chrome, Mozilla Firefox, Microsoft Edge, and Safari. Once installed, they can be particularly frustrating because:

  • They change your browser settings without consent
  • They reinstall themselves when you try to remove them
  • They deploy “helper objects” (browser extensions) that revert your settings if you try to change them
  • They may redirect through intermediary fake search engines before ultimately sending you to Bing

Unlike more serious threats such as trojans or ransomware, browser hijackers don’t typically damage your system or encrypt your files. However, they can significantly degrade your browsing experience and may expose you to privacy risks.

Browser Hijacker Operation Flow Initial Infection Free Software Bundle or Malicious Extension Browser Changes Homepage, Search & New Tab Settings Helper Objects Extensions That Resist Removal User Experience Constant Redirects to Bing.com Intermediate Fake Search Engines boyu.com.tr, artificius.com, chromstera.com Privacy Concerns Browsing Data Collection Unwanted Ads • Malware Exposure Bundled Adware Deceptive Pop-ups Primary Infection Vector Affected Browsers Persistence Mechanism Search Result Manipulation User Impact

Source: Analysis of browser hijacker behavior and distribution methods

How Browser Hijackers Work

Browser hijackers like the Bing redirect operate through a multi-stage process designed to maintain persistence even when users attempt to remove them:

1. Initial Infiltration

The most common distribution methods include:

  • Software Bundling: Hijackers are often bundled with free software downloads through a technique called “bundling,” where additional programs are included in the installation process but hidden in the “Advanced” or “Custom” settings
  • Deceptive Browser Extensions: Fake extensions that claim to provide useful functionality but actually modify browser settings
  • Misleading Pop-ups: Alerts that claim your browser needs updating or that a plugin is required to view content
  • Fake Flash Player Installers: Prompts to update Adobe Flash Player (which is now deprecated) that actually install unwanted software

2. Browser Modification

Once installed, the hijacker makes several changes to your browser:

  • Changes your default homepage to Bing.com or a fake search engine that redirects to Bing
  • Modifies your default search engine setting
  • Alters the “new tab” URL so that new tabs open to the hijacker’s preferred site
  • May add URL extensions to browser shortcuts to force redirects

3. Persistence Mechanisms

To maintain control of your browser, hijackers use various techniques:

  • Installing helper extensions that revert changes when you try to modify settings
  • Adding registry entries to ensure the hijacker loads at startup
  • Creating scheduled tasks to check and restore hijacker settings
  • Using multiple components that can reinstall each other if one is removed

4. Browser Redirects

Once established, the hijacker ensures all relevant browser activities lead to Bing:

  • Direct redirects when opening the browser or new tabs
  • Search redirects that send queries through intermediate sites before landing at Bing
  • Address bar searches being intercepted and redirected

The Risks of Browser Hijackers

While Bing itself is a legitimate search engine, browser hijackers pose several risks:

Privacy Concerns

  • Browser hijackers often track your browsing habits and collect personal information
  • This data may be shared with third parties without your consent
  • In some cases, this could lead to targeted advertising or even identity theft

Security Risks

  • Hijackers can display intrusive advertisements that may lead to malicious websites
  • Clicking on these ads could result in additional malware infections
  • The same distribution networks that deliver hijackers often distribute more dangerous malware

User Experience Degradation

  • Constant redirects disrupt normal browsing
  • Unwanted advertising clutters browser windows
  • System performance may decrease due to additional background processes

These issues are similar to those caused by other browser-based threats, such as those described in our guide on removing the Clarity Tab browser hijacker.

How to Remove the Bing.com Redirect

Removing a browser hijacker typically requires a multi-step approach to ensure it’s completely eliminated from your system:

Step 1: Scan with Trojan Killer

The most effective first step is to scan your system with specialized anti-malware software that can detect and remove browser hijackers and their components:

Trojan Killer scanning for browser hijacker infections
Download Trojan Killer

Download from the official website to ensure you get the authentic software

  1. Download and install Trojan Killer from the official website
  2. Run a full system scan to detect browser hijackers and associated components
  3. Allow the software to remove all detected threats
  4. Restart your computer when prompted

Step 2: Remove Suspicious Applications

After the scan, manually check for and remove suspicious applications:

For Windows:

  1. Open Control Panel > Programs > Programs and Features
  2. Look for recently installed applications you don’t recognize
  3. Pay special attention to free software downloaders, toolbars, and browser “enhancers”
  4. Uninstall any suspicious programs

For Mac:

  1. Open Finder and go to Applications
  2. Look for unfamiliar applications
  3. Drag suspicious applications to the Trash and empty it

Step 3: Remove Browser Extensions and Reset Browser Settings

Each browser requires specific steps to remove hijacker components:

Google Chrome

  1. Remove unwanted extensions:
    • Open Chrome and type chrome://extensions in the address bar
    • Remove any suspicious extensions by clicking the “Remove” button
  2. Reset homepage and search engine:
    • Go to Chrome Settings (three dots in the upper right > Settings)
    • Under “On startup,” select your preferred option
    • Under “Search engine,” select your preferred search engine
  3. Reset Chrome (if necessary):
    • Go to Chrome Settings > Advanced > Reset and clean up
    • Select “Restore settings to their original defaults”
    • Click “Reset settings” to confirm

Mozilla Firefox

  1. Remove unwanted extensions:
    • Open Firefox and click the menu button (three lines) > Add-ons and themes
    • Go to the Extensions tab and remove suspicious extensions
  2. Reset homepage and search engine:
    • Go to Firefox Settings > Home
    • Set your preferred homepage
    • Go to Search and select your preferred search engine
  3. Disable extension-controlled settings:
    • Type about:config in the address bar
    • Search for “extensionControlled”
    • Set both results to “false” by double-clicking each entry
  4. Reset Firefox (if necessary):
    • Open Firefox menu > Help > Troubleshooting Information
    • Click “Refresh Firefox” button
    • Confirm by clicking “Refresh Firefox” again

Microsoft Edge

  1. Remove unwanted extensions:
    • Click the menu button (three dots) > Extensions
    • Remove any suspicious extensions
  2. Reset homepage and search engine:
    • Go to Edge Settings > Start, home, and new tabs
    • Set your preferred options
    • Go to Privacy, search, and services > Address bar and search
    • Select your preferred search engine
  3. Reset Edge (if necessary):
    • Go to Edge Settings > Reset settings
    • Select “Restore settings to their default values”
    • Click “Reset” to confirm

Safari

  1. Remove unwanted extensions:
    • Go to Safari > Preferences > Extensions
    • Uninstall any suspicious extensions
  2. Reset homepage and search engine:
    • Go to Safari > Preferences > General
    • Set your homepage to your preferred URL
    • Go to Search tab and select your preferred search engine
  3. Clear browsing data (if necessary):
    • Go to Safari > Clear History
    • Select “all history” and click “Clear History”

Step 4: Check and Clean Browser Shortcuts

Browser hijackers often modify shortcuts to maintain redirects:

  1. Right-click on your browser shortcut (desktop, taskbar, or Start menu)
  2. Select Properties
  3. In the Target field, remove any additional text after the browser executable path
  4. For example, change "C:\Program Files\Google\Chrome\Application\chrome.exe" hxxp://bing.com to "C:\Program Files\Google\Chrome\Application\chrome.exe"
  5. Click OK to save the changes

How to Prevent Browser Hijackers

To protect your browsers from hijackers in the future, follow these preventive measures:

Software Installation Best Practices

  • Only download software from official websites and trusted sources
  • During installation, always choose “Custom” or “Advanced” installation options
  • Carefully review and uncheck offers for additional software, toolbars, or browser extensions
  • Be wary of pre-checked boxes that allow installation of “recommended” or “optional” programs

Browser Security Settings

  • Keep your browsers updated to the latest version
  • Use built-in security features like Chrome’s Safe Browsing or Firefox’s Enhanced Tracking Protection
  • Set your browser to block pop-ups and unwanted redirects
  • Consider using a content blocker extension from a reputable developer

General Security Practices

  • Maintain updated antivirus and anti-malware protection
  • Be skeptical of browser notifications, pop-ups, and alerts claiming you need to update software
  • Avoid clicking on advertisements promising free software or browser updates
  • Regularly scan your system for potentially unwanted programs

For more comprehensive protection strategies, see our guide on comprehensive malware protection.

Related Security Topics

To better understand and protect against browser-based threats, explore these related resources:

Frequently Asked Questions

Is Bing.com itself malicious?

No, Bing.com is Microsoft’s legitimate search engine and is not malicious. The problem lies with browser hijackers that force redirects to Bing without user consent. These hijackers modify browser settings, install unwanted extensions, and can be difficult to remove. While Bing itself is safe to use, the browser hijackers that redirect to it can compromise your privacy, track your browsing habits, display intrusive advertisements, and potentially expose you to additional malware through malicious ads. The goal of removing the Bing redirect is not to avoid Bing itself, but to restore control over your browser settings and eliminate the potentially unwanted programs causing the redirects.

Why do browser hijackers redirect to legitimate search engines like Bing?

Browser hijackers redirect to legitimate search engines like Bing for several reasons. First, by directing traffic to established search engines, they avoid immediate suspicion that might arise from redirecting to unknown sites. Second, many hijackers earn revenue through affiliate or pay-per-click programs where they receive compensation for directing traffic to certain sites, including legitimate search engines. Third, some hijackers use intermediate fake search engines that look legitimate but actually pass queries through to Bing while inserting additional tracking parameters or advertisements. Finally, using a well-known destination like Bing provides a cover of legitimacy that helps the hijacker remain installed longer, as users might not recognize the redirection as problematic compared to redirects to obviously suspicious websites.

Will resetting my browser remove the Bing redirect permanently?

Resetting your browser alone may not permanently remove the Bing redirect, especially if the hijacker has installed components outside the browser environment. While browser resets will clear extensions and modified settings, sophisticated hijackers often employ multiple persistence mechanisms across your system, such as startup items, scheduled tasks, registry entries, and helper applications that can re-infect your browser after a reset. For permanent removal, you should combine browser resets with a comprehensive system scan using reliable anti-malware software that can detect and remove all components of the hijacker. Additionally, check for and uninstall any suspicious applications through your operating system’s application management tools before resetting your browsers to ensure the hijacker doesn’t simply reinstall itself.

How can I tell if my browser has been hijacked?

You can identify a browser hijack through several key signs: your homepage, default search engine, or new tab page have changed without your permission; you experience unexpected redirects when searching or visiting websites; new toolbars, extensions, or plugins have appeared in your browser that you don’t remember installing; browser settings revert after you try to change them; you see an unusual increase in pop-up advertisements; your browser performance has noticeably decreased; or you’re unable to access browser settings or security websites. If you notice one or more of these symptoms, your browser has likely been hijacked. The most definitive sign of the Bing redirect specifically is when your searches consistently redirect to Bing regardless of your configured search engine preferences, especially when accompanied by other suspicious browser behavior.

Conclusion

The Bing.com browser hijacker represents a common but frustrating type of potentially unwanted program that can significantly disrupt your browsing experience. While Bing itself is a legitimate search engine, the hijacker’s unauthorized modifications to your browser settings and its persistence mechanisms make it a nuisance that should be properly removed.

Browser hijackers not only cause annoying redirects but can also compromise your privacy through tracking and data collection. Additionally, they may expose you to security risks through intrusive advertisements that could lead to more dangerous malware infections.

By following the comprehensive removal steps outlined in this guide and implementing the preventive measures, you can regain control of your browsers and protect yourself from future hijacking attempts. Remember that careful attention during software installation and maintaining updated security software are your best defenses against browser hijackers and similar threats.

For ongoing protection against browser hijackers and other potentially unwanted programs, consider using a comprehensive security solution like Trojan Killer, which can detect and remove these threats before they impact your browsing experience.

Gridinsoft Team
Gridinsoft Team

Founded in 2003, GridinSoft LLC is a Kyiv, Ukraine-based cybersecurity company committed to safeguarding users from the ever-growing threats in the digital landscape. With over two decades of experience, we have earned a reputation as a trusted provider of innovative security solutions, protecting millions of users worldwide.

Articles: 139

Leave a Reply

Your email address will not be published. Required fields are marked *