Thursday, January 22, 2026
HomeGuest BlogsHow to Remove Yahoo! Redirect From Chrome in 2026 by Marlene Baiton

How to Remove Yahoo! Redirect From Chrome in 2026 by Marlene Baiton


Marlene Baiton

Updated on: January 6, 2026
Former Editor


Fact-checked by Hazel Shaw

Short on time? Here’s how to remove Yahoo! Redirect from Chrome:

  • 1. Preliminary Step. Check for malicious browser extensions and restore Chrome’s default settings.
  • 2. Scan Your Device. Use a trusted antivirus like Norton to detect and remove threats.
  • 3. Remove Yahoo! Redirect. Once the scan is complete, let your antivirus delete all instances of the Yahoo! redirect browser hijacker.
  • 4. Stay Safe. Use a premium internet security suite to block future infections — Norton is my top choice.

If Chrome keeps redirecting your searches to Yahoo!, you’re likely dealing with a browser hijacker. These unwanted programs change your browser settings to drive traffic to specific sites — often to spread malware or steal personal information. You may notice fake Yahoo! search pages, irrelevant results, or even frequent browser crashes.

The most reliable way to remove the Yahoo! redirect virus (and prevent it from coming back) is by running a comprehensive antivirus scan. A quality antivirus tool will locate every trace of the hijacker, eliminate it safely, and repair any related system damage.

Norton is one of the best tools for this job — it’s powerful, affordable (starting at just £19.99 / year), and comes with a 60-day money-back guarantee, so you can try it risk-free.

Threat name Chrome Yahoo redirect
Threat type Browser hijacker
Devices affected Any device with Google Chrome installed on it
Sources Malicious websites, fake Flash Player downloads, infected browser extensions, bundled software
Symptoms Search engine changes to Yahoo, unwanted redirects, new tabs or windows opening with Yahoo search, slow browser performance
Damage Privacy risks, security vulnerabilities, performance issues, degraded user experience
October 2025 update: We’ve improved the guide by updating the Mac and Chromebook troubleshooting steps to tackle common user pain points reported in recent forums. The FAQ section has also been optimized.

Preliminary Step: Check Chrome for Suspicious Browser Extensions and Restore Chrome’s Default Settings

Browser hijackers often sneak into Chrome as malicious or unwanted extensions that alter your browser’s behavior. You might not even remember installing them — they’re frequently bundled with free software or downloaded through deceptive ads and websites. Either way, it’s a good idea to try fixing the Yahoo! redirect issue by removing any suspicious browser extensions.

To remove suspicious browser extensions from Chrome, follow these steps:

  1. Click on the 3 vertical dots () in the top right corner of Chrome. Norton
  2. Click Extensions. Then select Manage Extensions from the submenu that appears.
Norton
  1. Check for any extensions that you don’t recognize (or that have appeared all of a sudden). Norton
  2. Click Remove to delete them. Norton

Next, you should reset your browser’s search settings to their default options. To do this:

  1. Click on the 3 vertical dots () in the top-right corner of Chrome again.
  2. Click Settings, then Reset settings. Norton
  3. Start typing “restore” in the search box and click on Restore settings to their original defaults when the option appears. Confirm your choice when prompted. Norton

Google Chrome should now be back to normal. However, running a virus scan is still a good idea. If you have a browser hijacker installed on your system, when you next close Chrome or restart your computer, it will hijack your browser again and reconfigure your settings to redirect through the fake Yahoo! Page once more. You can also try the additional steps below.

If the Yahoo Redirect Issue Persists — Additional Steps to Try

If removing suspicious extensions and resetting Chrome didn’t solve the problem, try the following additional steps to eliminate any lingering traces of the Yahoo redirect hijacker.

1. Check Chrome Shortcut Properties

Some browser hijackers modify Chrome shortcuts to include malicious redirect URLs. This step ensures your shortcut launches a clean version of Chrome.

  1. Right-click your Chrome shortcut (on your desktop or taskbar).
  2. Select Properties.
  3. In the Shortcut tab, look at the Target field. It should look something like this:
    “C:\Program Files\Google\Chrome\Application\chrome.exe”Preliminary Step: Check Chrome for Suspicious Browser Extensions and Restore Chrome’s Default Settings
  4. If you see anything added after chrome.exe (for example, a URL like usearch.net), delete that extra part. Do not modify the original path.
  5. Click Apply, then OK.

2. Delete Suspicious Entries in Search Engines

Browser hijackers often change Chrome’s search engine settings or add fake search engines. Clean these settings as follows:

  1. Open Chrome and click the 3 vertical dots (⋮) in the top-right corner.
  2. Go to Settings > Search engine > Manage search engines and site search.Preliminary Step: Check Chrome for Suspicious Browser Extensions and Restore Chrome’s Default Settings
  3. In the Search engines section, make sure your preferred search engine (for example, Google) is set as the default.
    • If Yahoo or another unwanted engine is set as the default, click the three vertical dots (⋮) next to your preferred engine and select Make default.
  4. Review the list of search engines and delete any suspicious or unfamiliar ones, including Yahoo, if you don’t use it.Preliminary Step: Check Chrome for Suspicious Browser Extensions and Restore Chrome’s Default Settings
  5. Scroll down to the Site Search section.
  • Delete all entries except legitimate ones, such as Google, by clicking the 3 vertical dots (⋮) next to each suspicious entry and selecting Delete.
  • For Google, click the pencil icon and ensure the URL field contains this correct value: {google:baseURL}search?q=%s&{google:RLZ}{google:originalQueryForSuggestion}{google:assistedQueryStats}{google:searchFieldtrialParameter}{google:language}{google:prefetchSource}{google:searchClient}{google:sourceId}{google:contextualSearchVersion}ie={inputEncoding}Preliminary Step: Check Chrome for Suspicious Browser Extensions and Restore Chrome’s Default Settings

3. Clear the DNS Cache

Malicious DNS entries can cause redirects even after browser settings are fixed. Clearing your DNS cache ensures Chrome connects directly to legitimate websites.

On Windows:

  1. Press Win + R, type cmd, and press Enter to open the Command Prompt.Preliminary Step: Check Chrome for Suspicious Browser Extensions and Restore Chrome’s Default Settings
  2. Type the following command and press Enter:
    ipconfig/flushdns
    Preliminary Step: Check Chrome for Suspicious Browser Extensions and Restore Chrome’s Default Settings
  3. You should see a confirmation that the DNS Resolver Cache has been flushed.

On macOS:

  1. Open Launchpad and search for Terminal. Preliminary Step: Check Chrome for Suspicious Browser Extensions and Restore Chrome’s Default Settings
  2. Open the Terminal app and type the following command:
    sudo dscacheutil -flushcache; sudo killall -HUP mDNSResponder and press Return.
  3. Enter your Mac’s password when prompted, then press Return again. (Note: Your password won’t appear as you type.)
  4. Quit Terminal.

In Chrome:

  1. Type chrome://net-internals/#dns into the address bar and press Enter.Preliminary Step: Check Chrome for Suspicious Browser Extensions and Restore Chrome’s Default Settings
  2. Click Clear host cache.

4. Delete Temporary Files

Hijackers sometimes leave behind temporary files that can continue to affect browser performance. Deleting these files helps ensure a complete cleanup.

On Windows:

  1. Press Win + R to open the Run dialog.
  2. Type %temp% and press Enter to open the Temp folder.Preliminary Step: Check Chrome for Suspicious Browser Extensions and Restore Chrome’s Default Settings
  3. Press Ctrl + A to select all files and folders, then press Delete.
  4. Skip any files that can’t be deleted.Preliminary Step: Check Chrome for Suspicious Browser Extensions and Restore Chrome’s Default Settings

On macOS:

  1. Open Finder > Applications > Utilities.Preliminary Step: Check Chrome for Suspicious Browser Extensions and Restore Chrome’s Default Settings
  2. Launch Disk Utility.Preliminary Step: Check Chrome for Suspicious Browser Extensions and Restore Chrome’s Default Settings
  3. In Disk Utility, you will see a list of disks on the left side.
  4. Select your Mac’s main drive (usually named “Macintosh HD”).
  5. Click the First Aid button at the top of the window.Preliminary Step: Check Chrome for Suspicious Browser Extensions and Restore Chrome’s Default Settings
  6. Click Run to start the process. This will check and repair disk errors, including issues related to cache and temporary files.

Preliminary Step: Check Chrome for Suspicious Browser Extensions and Restore Chrome’s Default Settings

Alternatively, you can clear cache files on a Mac using a third-party cleaner like Intego:

  1. Click the Reclaim button in the top-left corner of the Intego window. Preliminary Step: Check Chrome for Suspicious Browser Extensions and Restore Chrome’s Default Settings
  2. Choose Caches. Preliminary Step: Check Chrome for Suspicious Browser Extensions and Restore Chrome’s Default Settings
  3. Click Clean to remove the cache files.

Once you’ve completed these steps, proceed to scan your device for malware using a trusted antivirus program like Norton. This will ensure every trace of the Yahoo redirect hijacker is permanently removed.

Step 1. Identify the Browser Hijacker With Your Antivirus (And Don’t Make the Problem Worse!)

Before you begin, disconnect any phones, tablets, or removable storage devices from your PC. If your system is infected, malware can copy itself to external drives and reinstall later.

Next, choose a reliable antivirus. I recommend Norton 360, which achieved a 100% malware detection rate in my tests, offers strong real-time protection, and is easy to use. Norton also provides a free tool called Power Eraser for removing malware, but it’s quite limited — for full protection, a Norton 360 plan is a much better option.

After installing your antivirus, run a full disk scan. Do this even if you’ve already removed suspicious extensions or followed the additional cleanup steps above. Malware often replicates itself, so there’s no telling how many hidden copies are on your PC.

Norton

Let the scan run to completion — don’t stop it early, even if you recognize some of the infected files. A full scan may take several hours because every file and background process must be checked. Your PC may slow down during this time, so it’s best to run the scan overnight or when you’re not using your computer.

Once the scan is complete, your antivirus will quarantine all detected threats. You’re now ready to move on to Step 2.

Get Norton 360 Deluxe for £29.99! *First-year pricing. Renews at £89.99/year.
You can save 66% if you act right now.

Step 2. Remove the Browser Hijacker and Delete Any Other Infected Files

After the scan, open your antivirus’s quarantine folder. You’ll see a list of all flagged files.

  • If you’re an advanced user, you can review and allowlist any safe files.
  • If not, it’s safer to trust your antivirus and delete everything in quarantine.
Norton

When finished, restart your computer and run a second full disk scan. This ensures all traces of the hijacker are gone. The second scan should take less time since most antiviruses skip files that haven’t changed.

If no new infections appear, your system is clean. However, if additional threats are still detected, repeat Steps 1 and 2 until your antivirus reports zero infections.

Once your PC is fully clean, check Chrome to ensure it’s working normally. If redirects persist, repeat the Preliminary step to restore Chrome’s default settings.

If Chrome functions correctly, proceed to Step 3.

Step 3. Keep Your Device Protected From Other Unwanted Programs

You’ve now witnessed how easy it is to get infected by malware on your PC. Cybercriminals release new malware daily, and without protection, you’re constantly at risk of data harvesting, identity theft, and more. Here’s what you need to do avoid getting re-infected with a browser hijacker or a similar piece of malware:

  • Avoid Freeware From Untrusted Sources: Everybody likes free stuff, but many free programs bundle adware or unwanted software. Using freeware is fine, but always stick to reputable websites. If you’re unsure about a site, you can always check its URL using an online URL and virus scanner.
  • Avoid Downloading Suspicious Files: Stay away from suspicious links and don’t download attachments from unfamiliar senders. Even when you recognize the sender, double-check their full email address before opening any attachments. Always ensure you have an antivirus with real-time protection running, too, so that files, websites, and emails are actively scanned for harmful content and unsafe downloads are blocked.
  • Keep Your Software, OS, and Drivers Up-To-Date: Outdated software exposes your system to vulnerabilities, making it easier for cybercriminals to exploit them and infect your device with malware. Enable automatic updates whenever possible and use this free scanner to check for vulnerabilities on your device. Some top antivirus programs even offer vulnerability scanners that automatically ensure your computer runs the latest software versions.
  • Limit Administrator Privileges: Use a standard user account and avoid logging in with administrator privileges for everyday tasks. This limits the damage if malware tries to install itself, as admin access is often required for significant changes.
  • Install an Ad Blocker: Many unwanted programs spread through malicious ads (malvertising) on websites. An ad blocker like any from this list will reduce the chance of interacting with these ads.
  • Practice Good Password Hygiene: Weak or reused passwords can lead to data breaches and identity theft. Use a password manager like 1Password to create and store strong, unique passwords for all your accounts. 1Password also offers features like monitoring for compromised logins and secure vaults to keep your sensitive data protected.

Quick Summary of the Best Antiviruses for Removing Yahoo! Redirect From Chrome

Editor’s Choice
Norton
Best antivirus for solving Yahoo! redirect problems in 2026 with great extra features.
Most of our readers choose Norton
Bitdefender
Lightweight cloud-based protection to stop redirects without slowing down your system.
McAfee
Reliable malware protection with excellent web security (prevents reinfections).

Frequently Asked Questions

Best Antiviruses for Removing Yahoo! Redirect from Chrome — Final Score:

Rank
Overall Score
Best Deal
1
9.8
save 66%
2
9.6
save 50%
3
9.4
save 66%
RELATED ARTICLES

Most Popular

Dominic
32475 POSTS0 COMMENTS
Milvus
119 POSTS0 COMMENTS
Nango Kala
6847 POSTS0 COMMENTS
Nicole Veronica
11977 POSTS0 COMMENTS
Nokonwaba Nkukhwana
12064 POSTS0 COMMENTS
Shaida Kate Naidoo
6986 POSTS0 COMMENTS
Ted Musemwa
7220 POSTS0 COMMENTS
Thapelo Manthata
6933 POSTS0 COMMENTS
Umr Jansen
6912 POSTS0 COMMENTS