Eko is a an-injection malware that installs itself in Chrome either as an extension or through a stand alone service. Once installed, this malware's primary purpose is to deliver advertising to the browser in the form of banners, text-links, popups or even redirections. It is important to note that these ads and ad networks that Eko utilizes are low quality and in many cases have been compromised and deliver malware in the form of malvertising. You will notice that upon infection you see ads on web sites where ads never existed before. This is because Eko will directly modify the content of the browser and inject new ads on top of real ads or simply ad new ones in empty space on the underlying page. If there is attribution to these ads you will notice next to the banner or coupon it might say "Ads by Eko".
The most concerning part of the Eko malware is not the fact that it injects ads in your browser but more importantly that ads it shows can be infected with all sorts of malware (malvertising). Such bad adverts can infect your computer with really bad malware, viruses or Trojans simply by serving up the ad through an exploit. The exploit will then take advantage of known software flaws in Flash or Java and infect your computer. Typically the infections are for Bots and Trojans that are designed to steal sensitive information such as passwords and banking account details.
Because Eko is an advertising piece of malware it also has the unique ability to track all your behaviors when browsing the Internet using Chrome. Its tracks the sites you visit, what you do on these sites, the ads that it displays and which ads you click on as well as has the ability to read your bookmarks and personal unencrypted cookies. It then sends your history back to its command and controls server which is then shared with marketing companies and other third-parties.
Because of this behavior and the fact that it impacts your browsing experience, jeopardizes your privacy and leaves you open to Trojans and other viruses, you should remove Eko immediately.
How Do I Remove Eko?
Removing Eko from Chrome is typically pretty easy if you follow the instructions below. There are methods from removing this malware from you browser. Depending on your level of technical expertise you can opt to remove Eko automatically (recommended) or manually. While removing this manually is not the best course of action since many times the controlling malware is still installed on your computer, Google Chrome has a couple built in functions that may assist with this. However, the recommended removal procedure is to utilize a professional anti-malware removal tool such as the ones we have tested with Eko below.
Automatically Remove Eko
In this method we will show you simple steps to search for and remove this malware completely from Chrome. While we have tested a number of professional antivirus and antimalware programs the following is by far the best we have tested that was able to fully remove all traces of Eko. To get started click the button below to download the the software. We recommend using Reason Core Security as it has successfully proven itself as the most effective antimalware product and scan and removal is 100% free.
If you chose Save, double-click the installer file (reason-core-security-setup.exe) to start the installation process. You might be prompted for Administrator permission, if so click OK.
When the installer opens, click Next > to begin.
The software will walk you through a quick installation process.
You will then be asked to automatically run an initial scan.
This scan should take about 5 to 10 minutes and should find Eko.
Next, it will ask you to remove Eko as well as any other detected malware or adware. Click the Remove Checked button.
Your computer should be nice and clean within a few moments! If you keep Real-time Protection running it will prevent any other Chrome malware from infecting your computer and browser.
Note: Reason Core Security like most professional antimalware software is a commercial product. While it's free to clean any malware infections you have during the trial period some features might be disabled when the trial ends.
As you can see using the automated method for removing Eko is very simple and fast. There are a number of other antivirus and antimalware programs that we also recommend that too are successful in removing this malware. These include Malwarebytes Anti-Malware, ESET NOD32, VIPRE and Microsoft Security Essentials (or Windows Defender).
Manually Remove Eko
Should you decide to, you can also manually remove this malware from Chrome by following the steps below. It is very important to note however that since this malware might run as a stand along set of processes on your computer even manually removing them using these instructions does not 100% guarantee that its completely removed and Eko does not show up later down the road. The reason this is the case is because if you do not use a professional antimalware cleaner there is a strong possibility that the activate traces of this malware will simply re-infect Chrome over and over again. Thus, finding and eliminating the entire malware is critical.
Resetting your browser settings will reset the unwanted changes caused by installing other programs including some malware. However, your saved bookmarks and passwords will not be cleared or changed but some settings will be reset such as cookies.
To remove Eko from Chrome using the built in reset browser settings:
In the top-right corner of the browser window, click the Chrome menu
At the bottom, click Show advanced settings.
Under the section "Reset settings,” click Reset settings.
In the dialog that appears, click Reset.
Note: using the Chrome reset functions will not only remove Eko but will also clear your personal settings such as cookies, saved form data, extensions, themes and search and homepage settings.
Sabrina is a Chrome malware removal expert and author of this help page. Leave her feedback about the page.