Hijack.

Short bio

Malwarebytes uses “Hijack” as the detection name for a category of system changes that are typically made by malware.

Type and source of infection

The system changes detected as “Hijack” can be made in the Windows registry, but also in browser configuration files. Hijack detections are typically made by malware with the objective to run malware-related files or redirect the users browser to sites of the threat actors choosing.

Protection

Malwarebytes protects against items detected as Hijacks by stopping the malware trying to make the changes and using real-time protection to block these threats.

Remediation

Malwarebytes can detect and remove Hijack. detections without further user interaction.

  1. Please download Malwarebytes to your desktop.
  2. Double-click mb3-setup-consumer-{version}.exe and follow the prompts to install the program.
  3. Then click Finish.
  4. Once the program has fully updated, select Scan Now on the Dashboard. Or select the Threat Scan from the Scan menu.
  5. If another update of the definitions is available, it will be implemented before the rest of the scanning procedure.
  6. When the scan is complete, make sure that All Threats are selected, and click Remove Selected.
  7. Restart your computer when prompted to do so.

Cybersecurity info you can’t do without

Want to stay informed on the latest news in cybersecurity? Sign up for our newsletter and learn how to protect your computer from threats.

Select your language