Search Baron virus Mac is a nuisance that diminishes the victim’s browsing experience by redirecting the traffic to Bing, so it is subject to urgent removal.
Update: March 2020
|Name||Search Baron (SearchBaron.com) browser hijacker|
|Category||Browser hijacker, redirect virus, Mac adware|
|IP||18.104.22.168, 22.214.171.124, 126.96.36.199|
|Detection||Avast: MacOS:MaxOfferDeal-I [Adw], BitDefender: Adware.MAC.Genieo.WS, ESET: A Variant Of OSX/Adware.MaxOfferDeal.N, McAfee: RDN/Generic.osx, Microsoft: Trojan:Win32/Bitrep.A, Sophos: Generic PUA PB (PUA), Symantec: OSX.Trojan.Gen|
|Symptoms||Redirects web browser to SearchBaron.com or Bing.com, adds sponsored content to search results, causes system slowdown|
|Distribution||Freeware bundles, torrents, booby-trapped software updates, misleading popup ads, spam|
|Damage||Unwanted changes of custom browsing settings, privacy issues due to Internet activity tracking, search redirects, redundant ads|
|Removal||Scan your Mac with Combo Cleaner to detect all files related to the browser hijacker. Use the tool to remove the infection if found.|
Out of all forms of malicious activity targeting Macs, a browser hijack is one of the most annoying occurrences. It results in the web surfing preferences suddenly slipping out of the user’s control, which entails forcible forwarding of the traffic to unwanted sites. Although this kind of an attack isn’t categorized as severe, it is hugely irritating and requires some thorough cleanup. Few infections from this cluster ever reach the distribution heights that the recently discovered Search Baron virus can boast. It has infiltrated numerous Mac computers over the past few days and caused some major ripples in the security circles. The pest manifests itself by taking over the custom Internet navigation settings to redistribute the victim’s web traffic. When the plagued user tries to visit a random site, the infection first forwards them to searchbaron.com, and then redirects to bing.com.
At first blush, the logic of this attack doesn’t make much sense. Why give a Mac user’s online preferences an overhaul and then take them to Bing, a legit search engine? The motivation of this shady campaign’s operators is more subtle than it may appear, though. Every time the redirect takes place, it follows a complex path involving in-between domains, such as the known-malicious searchnewworld.com site or pages hosted at AWS (Amazon Web Services) platform. A frequently reported example of the latter is searchroute-1560352588.us-west-2.elb.amazonaws.com. By the way, the use of reputable cloud networks for parking fishy web resources is a way for the cybercriminals to evade blacklisting. These sites aren’t noticeably displayed in the browser along the way, but technically, they are visited as part of the rerouting. The malefactors are thereby driving traffic to specific pages while making it look like the only resolved site is bing.com. This trick isn’t new, but it keeps fueling the sketchy business model based on intercepting traffic for monetization purposes.
Search Baron browser hijack is so pesky that it overshadows another undesirable quirk of the underlying malicious app. When running on a Mac, the virus additionally keeps tabs on the victim’s online activities. It silently monitors what sites are visited and what search queries are entered. On top of that, the infection may zero in on sensitive credentials that the user types to log into their personal web accounts, including e-banking, email, and cloud services. By compiling all these details, the cybercriminals behind Search Baron can form a verbose profile of the unsuspecting target and abuse this information to carry out identity theft and trustworthy-looking phishing stratagems. Chances are that the data will be sold to other threat actors, such as disreputable advertisers or high-profile hacking groups.
The common entry point for the Search Baron virus incursion is bundling. This is a long-running hoax that lulls people into installing malicious programs. Some eye-catching and usually free apps promoted at various uncertified software portals are at the core of this scheme, making the users think they are lucky to get such a nifty tool at zero cost. However, the installation client may turn out to have extra items under the hood, although there are typically no mentions of this fact. As a result, the to-be prey goes ahead and clicks through the setup wizard’s panes, only to additionally install the potentially unwanted application. Mac users should finally learn the lesson: opt out of the default setup mode when installing freeware and check for unwelcome complementary objects. Reading the fine print can sometimes make one’s day, really.
When up and running inside a Mac, the Search Baron virus gets itself added to the login items for persistence. It also alters the settings of the admin’s preferred browser, making the search provider and homepage default to searchbaron.com. Incidentally, the URL has a tail that denotes a specific malvertising sub-campaign. For instance, the string can be something like searchbaron.com/v1/hostedsearch. The adversely revamped set-ups in Safari, Chrome or Firefox will be repeatedly taking effect each time the victim tries to select the right services manually, because there is a malicious plugin configured to make those undesired changes over and over. One more element of persistence is that the infection adds a new administrative profile listed under System Preferences. This dodgy entity hampers the cleanup process by enforcing specific behavior of the affected web browser, including its default settings. It means that the repair is a matter of removing the Search Baron virus proper, including its components meant for privilege escalation and obstinacy effects on the Mac, and then re-adjusting the affected web browser. The walkthroughs below cover what needs to be done.
Search Baron redirect virus manual removal for Mac
The steps listed below will walk you through the removal of this malicious application. Be sure to follow the instructions in the order specified.
- Open up the Utilities folder as shown below
- Locate the Activity Monitor icon on the screen and double-click on it
- Under Activity Monitor,find a process named SearchBaron or Search Baron, select it and click Quit Process
- A dialog should pop up, asking if you are sure you would like to quit the troublemaking process. Select the Force Quit option
- Click the Go button again, but this time select Applications on the list. Find SearchBaron (Search Baron) entry on the interface, right-click on it and select Move to Trash. If user password is required, go ahead and enter it
- Now go to Apple Menu and pick the System Preferences option
- Select Accounts and click the Login Items button. The system will come up with the list of the items that launch when the computer is started up. Locate the potentially unwanted app there and click on the “-“ button
Get rid of searchbaron.com redirect virus in web browser on Mac
To begin with, settings for the web browser that got hit by Search Baron should be restored to their default values. The overview of steps for this procedure is as follows:
- Reset Safari
- Open the browser and go to Safari menu. Select Preferences in the drop-down list
- Once the Preferences screen appears, hit the Privacy tab at the top. Find the option that says Remove All Website Data and click on it
- The system will display a confirmation dialog that also includes a brief description of what the reset does. Specifically, you may be logged out of some services and encounter other changes of website behavior after the procedure. If you’re okay with that, go ahead and click the Remove Now button
- In order to selectively clear data generated by certain websites only, not all of them, hit the Details button under the Privacy section of Safari Preferences
- This feature will list all websites that have stored potentially sensitive data, including cache and cookies. Select the one, or ones, that might be causing trouble and click the appropriate button at the bottom (Remove or Remove All). Click the Done button to exit.
- Open the browser and go to Safari menu. Select Preferences in the drop-down list
- Reset Google Chrome
- Open Chrome, click the Customize and control Google Chrome (⁝) icon in the top right-hand part of the window, and select Settings in the drop-down
- When on the Settings pane, select Advanced
- Scroll down to the Reset settings section. Under the Restore settings to their original defaults option, click the Reset settings button
- Confirm the Chrome reset on a dialog that will pop up. When the procedure is completed, relaunch the browser and check it for malware activity.
- Reset Mozilla Firefox
- Open Firefox and select Help – Troubleshooting Information
- On the page that opened, click the Reset Firefox button
Get rid of Search Baron malware using Combo Cleaner removal tool
The Mac maintenance and security app called Combo Cleaner is a one-stop tool to detect and remove Search Baron virus. This technique has substantial benefits over manual cleanup, because the utility gets hourly virus definition updates and can accurately spot even the newest Mac infections.
Furthermore, the automatic solution will find the core files of the malware deep down the system structure, which might otherwise be a challenge to locate. Here’s a walkthrough to sort out the Search Baron issue using Combo Cleaner:
- Download Combo Cleaner installer . When done, double-click the combocleaner.dmg file and follow the prompts to install the tool onto your Mac.
- Open the app from your Launchpad and let it run the update of malware signature database to make sure it can identify the latest threats.
- Click the Start Combo Scan button to check your Mac for malicious activity as well as performance issues.
- Examine the scan results. If the report says “No Threats”, then you are on the right track with the manual cleaning and can safely proceed to tidy up the web browser that may continue to act up due to the after-effects of the malware attack (see instructions above).
- In case Combo Cleaner has detected malicious code, click the Remove Selected Items button and have the utility remove Search Baron threat along with any other viruses, PUPs (potentially unwanted programs), or junk files that don’t belong on your Mac.
- Once you have made doubly sure that the malicious app is uninstalled, the browser-level troubleshooting might still be on your to-do list. If your preferred browser is affected, resort to the previous section of this tutorial to revert to hassle-free web surfing.
The crucial prerequisite of stopping Search Baron redirects in a web browser is to get rid of the malicious app that makes this activity happen in the first place. Otherwise, even if you thoroughly clean up Safari, Chrome, or Firefox (depending on which one is affected), the hijack will keep occurring because the adware is still on board triggering its sketchy commands to re-install the rogue browser plugin.
Since this infection is preassigned to thwart regular uninstall attempts, the first thing on your to-do list is to terminate its process in the Activity Monitor. It’s not necessarily manifested as Search Baron proper, so you should look for a suspicious executable with an unknown User ID next to it. Also, high CPU consumption is a common red flag.
Once you force quit the harmful process, go to the Applications folder and find Search Baron (or SearchBaron) in there. Send it to the Trash without a second thought. Then, access your Login Items screen under System Preferences and minus out the rogue entry to prevent it from being launched at boot time.
Now that you have removed the adware, proceed to fixing the browser that’s acting up. The most dependable approach is to restore its settings to their factory state (see instructions in the guide above). The disadvantage of this technique is that you will have to go through a somewhat tedious process of customizing the browser afterwards. To save yourself the trouble of applying all the personalized settings from scratch after the reset, consider disabling the Search Baron extension first and see if this fixes the problem. If it does, you’re good to go. If the redirects are still occurring, then the reset is your only option.
It depends on the type of malware that has infected your MacBook. In adware scenarios like the Search Baron attack, a combo of force-uninstalling the harmful app and resetting the affected web browser will do the trick. Keep in mind that unlike regular software, such PUAs (potentially unwanted applications) tend to be stubborn and therefore removing them from the Applications folder alone might not be enough.
To get around this persistence, quitting the unwanted process in the Activity Monitor should be your first move. Then, delete the bad entry from Applications and Login items. Finally, trash the respective browser extension. However, in many cases this is futile and you need to reset the browser to its original defaults.
Sometimes you should additionally examine the following directories for hidden malware files: /Library/LaunchAgents, ~/Library/LaunchAgents, /Library/LaunchDaemons, and /Library/Application Support. The malicious objects will look like com.MCP.agent.plist or similar, with the name of the infection (or its acronym) being part of the entry. This extra step is often required in situations where a scareware program hits a computer and displays phony alerts to convince you to buy its license.
If you are experiencing malware symptoms on your MacBook but cannot find all components of the offending program, then it could be a good idea to use a reputable security tool that will automatically identify and root out the threat.
In order to remedy Safari browser affected by the Search Baron virus, try to hunt down and delete the associated extension for a start. Click the Safari menu icon and select ‘Preferences’ in the drop-down menu. Hit the ‘Extensions’ tab on the resulting screen and find a rogue helper object called Search Baron. Be advised that the name may be different, so you should look for an item you don’t remember adding to Safari. Once found, go ahead and remove the culprit. Restart the browser and check it for symptoms of the hijack.
If redirects to searchbaron.com, and then to bing.com, are still the case, you should take your efforts up a notch and reset the browser. Here is the walkthrough you need to follow:
- Go to Safari’s ‘Preferences’ and select the ‘Advanced’ tab. Turn on the following option: ‘Show Develop menu in menu bar’
- A new item called ‘Develop’ will appear in the Safari menu bar. Click it and select ‘Empty Caches’
- Check if the Search Baron problem has been fixed. If it hasn’t, go to History in the Safari menu bar and click ‘Clear History’
- Select ‘all history’ in the follow-up dialog box and hit the ‘Clear History’ button again
- If the issue is still there, go to ‘Preferences’ again and click the ‘Privacy’ tab. Proceed to an option that says ‘Manage Website Data’. Click ‘Remove All’ and then the ‘Done’ button
- Restart Safari.
Bear in mind that these will only address the Search Baron hijacker attack if you have removed the potentially unwanted application beforehand. See the tutorial above and previous answers to learn all the relevant how-to’s.
If Google Chrome is repeatedly forwarding your traffic to SearchBaron.com, it means a dodgy extension has been surreptitiously added to the browser. Therefore, the logic of the fix is to find and eliminate this entity. Before you proceed, be sure to address the root cause of the hijack by removing the actual adware from your Mac, otherwise the perpetrating extension will be reinstalled shortly.
To sort out the problem in Chrome, try to get rid of the SearchBaron extension first. Here is the procedure:
- Click the ‘Customize and control Google Chrome’ (⁝) icon and select ‘More Tools’ – ‘Extensions’
- On the ‘Extensions’ screen, look for SearchBaron or another dubious-looking entry that doesn’t belong there
- Toggle it off and click ‘Remove’
- Restart Chrome.
Check if the redirect problem has been fixed. If it’s not, you will have to reset Chrome to its original defaults. This will delete your personalized settings, but compared to the SearchBaron frenzy, it’s the lesser of two evils. Adhere to the following steps to do it:
- Click the ‘Customize and control Google Chrome’ (⁝) icon and select ‘Settings’
- Pick the ‘Advanced’ option and scroll down to the ‘Reset settings’ subsection
- Select ‘Restore settings to their original defaults’
- On a dialog that will appear, click the ‘Reset Settings’ button
- Restart your Chrome browser. The problem shouldn’t be making itself felt anymore.