Google Translate Extension For Edge

1 view
Skip to first unread message
Message has been deleted

Evagret Homestead

unread,
Jul 12, 2024, 5:04:17 AM7/12/24
to warphiwoobe

I'm currently expanding the type of data my nonprofit collects via Google Analytics/Tag Manager relating to website visitors accessing automatically translated versions of our website. I have a some javascript that detects when people using Google Chrome have our website auto-translated (there's a class and "lang" attribute added to the element in the DOM).

google translate extension for edge


Descargar archivo https://gohhs.com/2yPsWm



I am trying to do something similar for Edge because I know that it has a similar auto-translation extension called Translator. Does anyone know if Edge's auto-translation causes any mutations or changes to the DOM when it translates a webpage?

Mate's Edge extension translates instantly, wherever, and then gets out of your way. It's extraordinarily accurate and works smoothly on-page. Make words, sentences, or entire pages readable in a fraction of a second.

Description of the issue:
Translate is too slow or doesnt work for most of the time and websites. Also even if we set the default language of websites to english it just pops up in Local language
Steps to Reproduce
Just use translate any foreign webpages to english.
Try sim.de
Actual Result
Would take at least 30 secs to translate every single word. Other competitor browsers does the whole page in like 2 to 3 secs.
Expected result:
Translate better than the current situation. I tried all the fix on the previous blogs regarding the same issue but none of them were actual fixes or any one got any kind of fix
Reproduces how often:
All the time. I have tried with a lot of websites
Operating System and Brave Version(See the About Brave page in the main menu):
Facing this in all platforms windows, android, linux (debian)
all are on latest when I am posting this.
1.66.110 Chromium: 125.0.6422.60 (Official Build) (64-bit)
Additional Information:
I expect this to be fixed soon. It has been really annoying since i moved abroad and websites arent getting translated properly and fast and its very slow in comparison to chrome, edge, firefox etc

Potentially unwanted applications (PUAs) are commonly distributed using installers for other apps of this type. In other words, this software is often bundled with additional unwanted and/or malicious applications.

Hence, in some cases, a deceptive installer (e.g., fake Adobe Flash Player updater/installer) carrying software like the fake Google Translate extension - also installs multiple browser hijackers, adware, trojans, ransomware, etc.

This fake Google Translate extension is also promoted using deceptive installers. It can operate as adware, spy on users' browsing activity, and even steal Facebook log-in credentials. Users who have this extension installed on browsers should remove it immediately.

This fake Google Translate extension is probably also an adware-type app, and thus will generate various advertisements that, if clicked, open potentially malicious pages or cause download and installation of other rogue applications (some deceptive ads distribute unwanted software by running certain scripts).

Some examples of ads that adware-type apps display are coupons, banners, surveys, and pop-up. Furthermore, it is possible that this app will function as a browser hijacker and promote a fake search engine.

Typically, browser hijackers promote fake search engines by changing browser settings, such as the address of the default search engine, homepage, and new tab. They force users to visit a specific address when they open a browser, new tab, or enter search queries. Not all browser hijackers modify browser settings - in some cases, they detect when users enter search queries and then open a specific address.

Unwanted/Malicious software typically has data-tracking abilities. The fake Google Translate extension we researched specifically targets Facebook account log-in credentials (usernames/passwords). Cyber criminals can use stolen social networking platforms to assume the victim's identity and ask their contacts for loans/donations or spread malware by sharing malicious files/links.

Note that this fake Google Translate extension might also gather IP addresses, entered search queries, geolocations, addresses of visited websites and other browsing data, and sensitive information such as usernames, passwords, credit card details, and other personal details. Developers behind deceptive monetize the data, selling it to third-parties or misusing it to generate revenue in other ways.

It is mentioned in the description that this app is not from Chrome Web Store, which makes it even more dubious. Even if this app was available on Chrome Web Store, it would not necessarily mean that it is a truly legitimate app.

To summarize, this application has nothing to do with the official Google Translate app, which is available on both Google Play and Chrome Web Store. Another example of a fake app that is named after legitimate software is "Google Docs Extension".

These apps can generate ads, promote fake search engines, gather data, and also promote various scam pages such as "Spin The Wheel" and "WARNING CRITICAL MESSAGE", and download sites for other unwanted, potentially malicious websites, and so on.

If a fake Google Translate extension or any other unwanted app is installed on the browser or operating system, remove it immediately. It is worth noting that if you find a fake Google Translate extension added to your browser, your computer may be infected with Rilide, an information-stealing malware.

Rilide is a dangerous extension that specifically targets Chromium-based browsers like Google Chrome, Opera, Brave, and Microsoft Edge. It operates by disguising itself as a Google Translate Extension, allowing threat actors to execute various malicious activities.

These include monitoring users' browsing history, capturing login credentials, and even bypassing two-factor authentication (2FA) to withdraw cryptocurrency funds through script injections. Also, the extension focuses on intercepting Facebook cookies to gather sensitive information. To evade detection, the threat actor employs obfuscation techniques to conceal the extension's true purpose.

Additionally, the malware employs deceptive tactics by presenting itself as an AI software installer, redirecting users to the official webpage of an impersonated AI image generator. Meanwhile, in the background, the extension is silently loaded onto the victim's browsers, ready to carry out its malicious operations undetected.

Browser hijackers, adware-type apps, and other types of PUAs are commonly distributed by integrating them into the download and/or installation set-ups of other programs, so that a proportion of users inadvertently download and install them together with their chosen software. This distribution method is known as "bundling".

Offers to download and install additionally-included apps usually appear in "Advanced", "Custom" and other settings of the set-ups (where they can usually be declined). Many users fail to check and change these settings, thereby granting permission for PUAs to be downloaded and installed by default.

Download software and files from official websites and via direct links. It is not safe to use torrent clients, eMule (or other Peer-to-Peer networks), third party downloaders, unofficial websites or other sources of this kind.

Avoid third party installers. Check "Advanced", "Custom" and other settings, and decline offers to download or install unwanted software. Do not click ads that are displayed on dubious websites, since they can open other untrusted websites or even cause unwanted downloads and installations.

Remove any unwanted, suspicious applications (extensions, add-ons, and plug-ins) that are installed on the browser. The same should be applied to programs of this kind that are installed on the operating system.

Right-click on the Start icon, select Apps and Features. In the opened window search for the application you want to uninstall, after locating it, click on the three vertical dots and select Uninstall.

After uninstalling the potentially unwanted application that causes Fake Google Translate redirects, scan your computer for any remaining unwanted components or possible malware infections. To scan your computer, use recommended malware removal software.

Click the Edge menu icon (at the upper-right corner of Microsoft Edge), select "Extensions". Locate all recently-installed suspicious browser add-ons and click "Remove" below their names.

If you continue to have problems with removal of the ads by fake google translate, reset your Microsoft Edge browser settings. Click the Edge menu icon (at the top right corner of Microsoft Edge) and select Settings.

Select Restore settings to their default values. In the opened window, confirm that you wish to reset Microsoft Edge settings to default by clicking the Reset button.

I am passionate about computer security and technology. I have an experience of over 10 years working in various companies related to computer technical issue solving and Internet security. I have been working as an author and editor for pcrisk.com since 2010. Follow me on Twitter and LinkedIn to stay informed about the latest online security threats. Contact Tomas Meskauskas.

PCrisk security portal is brought by a company RCS LT. Joined forces of security researchers help educate computer users about the latest online security threats. More information about the company RCS LT.

PCrisk is a cyber security portal, informing Internet users about the latest digital threats. Our content is provided by security experts and professional malware researchers. Read more about us.

If you visit the Microsoft Translator page on the Microsoft Edge Add-Ons website, you may notice that you cannot install the extension in the new Microsoft Edge. If you open the page in any browser but the new Edge, you will notice that the "get" button is enabled. If you do the same with the new Microsoft Edge, you will notice that it is not enabled.

d3342ee215
Reply all
Reply to author
Forward
0 new messages