How to Delete Malware From Your Mac
Macs have a strong reputation for security, but they're not immune to malware. Adware, browser hijackers, spyware, and even ransomware have all been found targeting macOS. If your Mac is behaving strangely — running slower than usual, showing unexpected pop-ups, or opening apps you didn't install — there's a reasonable chance something unwanted has made its way onto your system.
Here's how to identify, remove, and protect against malware on a Mac, along with what factors determine how straightforward that process will be for you.
How Mac Malware Actually Gets In 🔍
Unlike Windows, macOS uses several built-in layers of protection: Gatekeeper (which blocks unverified apps), XProtect (Apple's signature-based malware scanner), and System Integrity Protection (SIP) (which locks down core system files). These make it harder for malware to install itself silently.
Despite this, malware still reaches Macs — typically through:
- Fake software downloads (cracked apps, pirated tools)
- Malicious browser extensions
- Phishing emails or links
- Bundled installers that include adware alongside legitimate software
The vast majority of Mac malware is adware or browser-based, rather than the destructive system-level malware more common on Windows. That distinction matters when deciding how aggressively you need to respond.
Signs Your Mac May Be Infected
Not every slowdown means malware. But patterns worth investigating include:
- Browser homepage or search engine changed without your input
- Pop-up ads appearing outside of any browser window
- Unfamiliar apps or login items you didn't install
- Sudden, significant performance drops with no clear cause
- Network activity spiking when the machine should be idle
Step-by-Step: How to Remove Malware From a Mac
1. Check and Remove Suspicious Login Items
Go to System Settings → General → Login Items. Any unfamiliar entry that launches at startup is worth investigating. Select it and click the minus button to remove it.
2. Review Recently Installed Applications
Open Finder → Applications and sort by date added. If you see apps you don't recognize — especially ones with generic names like "Mac Cleaner," "Search Baron," or "Safe Finder" — drag them to the Trash and empty it.
3. Remove Malicious Browser Extensions
In Safari: Preferences → Extensions. In Chrome: Settings → Extensions. In Firefox: Add-ons Manager. Disable or remove any extension you didn't deliberately install or no longer recognize.
4. Check for Persistent Background Processes
Open Activity Monitor (found in Applications → Utilities) and look at the CPU and Network tabs. Processes consuming unusual resources with unfamiliar names can sometimes indicate malware. Searching the process name online usually reveals whether it's legitimate.
5. Inspect Launch Agents and Daemons
Persistent malware often installs itself as a Launch Agent or Launch Daemon — background processes that survive restarts. These live in:
~/Library/LaunchAgents/Library/LaunchAgents/Library/LaunchDaemons
Navigate there via Finder → Go → Go to Folder. Files with randomized names or names referencing unknown software are red flags. Removing them requires care — deleting legitimate system files can cause problems — so research any file name before acting.
6. Use a Dedicated Malware Scanner 🛡️
Manual removal works for many common infections, but purpose-built tools are more thorough. Several reputable macOS security applications can scan for and remove known malware strains automatically. These tools vary in:
- Depth of scan (quick vs. full system)
- Real-time protection (active monitoring vs. on-demand scanning only)
- Detection library updates (how frequently new threats are added)
- Free vs. paid tiers (most offer basic scanning free, with real-time protection behind a subscription)
A one-time manual scan with a free tool is often sufficient for a known, isolated infection. Ongoing real-time protection is a different decision — one that depends on your usage habits.
7. Reset Affected Browsers
If your browser is still misbehaving after removing extensions, a full reset restores default settings. In Chrome, go to Settings → Reset and clean up. Safari users can use Develop → Empty Caches and manually remove website data under Privacy settings.
What Affects How Difficult Removal Will Be
| Factor | Lower Complexity | Higher Complexity |
|---|---|---|
| Malware type | Adware, browser hijacker | Rootkit, persistent daemon |
| macOS version | Up to date | Older, unpatched versions |
| SIP status | Enabled | Disabled (e.g., for developer tools) |
| Infection duration | Recent | Long-standing, deeply embedded |
| Technical comfort | Comfortable in Terminal | Prefer GUI-only tools |
Older versions of macOS receive fewer XProtect updates, which means newer malware strains may not be caught automatically. Macs running recent versions of macOS with SIP intact are meaningfully harder to infect deeply — and easier to clean when something does slip through.
When Manual Removal Isn't Enough
If you've gone through the steps above and the problem persists, the infection may be deeper than typical adware. In these cases:
- Booting into Safe Mode (hold Shift at startup on Intel Macs; hold the power button on Apple Silicon) prevents most third-party processes from loading, which can help isolate and remove stubborn malware
- Reinstalling macOS via Recovery Mode wipes system files clean while preserving your data (if you use the "Reinstall macOS" option rather than erasing the drive)
- Full erase and restore from a clean backup is the nuclear option — necessary if you believe the system is compromised at a level that normal removal won't address
The Variables That Shape Your Situation 🧩
How involved your malware removal process needs to be depends on factors that differ for every user: which macOS version you're running, whether your system protections are intact, how technically comfortable you are navigating system folders, and whether you're dealing with a surface-level browser hijacker or something more deeply embedded.
A Mac that's fully up to date, used cautiously, and hit with common adware is a very different scenario from an older machine that's been running suspicious software for months. The steps above cover the full range — where you land on that spectrum determines which ones actually apply to you.