Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

First Malicious Outlook Add-In Found Stealing 4,000+ Microsoft Credentials

0
Medium
Vulnerability
Published: Wed Feb 11 2026 (02/11/2026, 17:45:00 UTC)
Source: The Hacker News

Description

A novel supply chain attack involving a malicious Microsoft Outlook add-in named AgreeTo has been discovered. The attacker took control of the domain linked to an abandoned legitimate add-in to serve a fake Microsoft login page, stealing over 4,000 credentials. The add-in, approved and listed in the Microsoft Store, fetches live content from a URL that the attacker now controls, enabling phishing and potential mailbox data theft. This attack exploits the lack of ongoing content monitoring post-approval and the ability of add-ins to request extensive permissions, including reading and modifying emails. The incident highlights a critical gap in the security model of Office add-ins, where dynamic content served from developer-controlled URLs can be maliciously altered after initial vetting. European organizations using Outlook and relying on Microsoft add-ins are at risk, especially those with high dependency on email communications. Mitigations include enhanced domain ownership verification, continuous content monitoring, and stricter marketplace policies for abandoned or inactive add-ins. Countries with significant Microsoft product usage and strategic targets for credential theft are most vulnerable. The threat severity is assessed as high due to the potential for credential compromise and email data exfiltration without user interaction.

AI-Powered Analysis

AILast updated: 02/12/2026, 07:46:24 UTC

Technical Analysis

Researchers have identified the first known malicious Microsoft Outlook add-in detected in the wild, named AgreeTo, which was originally a legitimate calendar integration tool last updated in December 2022. The attacker exploited the abandonment of the add-in by claiming the domain associated with its manifest URL, which is fetched live each time the add-in runs inside Outlook. This domain, hosted on Vercel, now serves a phishing kit presenting a fake Microsoft login page to steal credentials, having already compromised over 4,000 accounts. The add-in requests "ReadWriteItem" permissions, allowing it to read and modify emails, which could enable attackers to siphon mailbox contents covertly. The attack represents a new supply chain vector where dynamic content served by add-ins can be maliciously changed post-approval, circumventing Microsoft's initial manifest review process. The attacker exfiltrated credentials via the Telegram Bot API and redirected victims to the legitimate Microsoft login page to avoid suspicion. This incident underscores the risks of marketplaces approving add-ins based on static manifests without continuous monitoring of the live content they serve. Recommendations include implementing domain ownership verification, re-review triggers when content changes, delisting inactive add-ins, and displaying installation metrics to assess impact. The problem is systemic across platforms hosting remote dynamic dependencies, emphasizing the need for ongoing scrutiny beyond initial approval.

Potential Impact

European organizations using Microsoft Outlook with add-ins from the Microsoft Store face significant risks from this attack. Credential theft can lead to unauthorized access to corporate email accounts, enabling further phishing, data exfiltration, and lateral movement within networks. The ability of the add-in to read and modify emails threatens confidentiality and integrity of sensitive communications, potentially exposing personal data, intellectual property, and strategic information. This can result in regulatory non-compliance under GDPR, financial losses, reputational damage, and operational disruption. Organizations relying heavily on Outlook for internal and external communications, especially in sectors like finance, government, and critical infrastructure, are particularly vulnerable. The stealthy nature of the attack, which does not require user interaction beyond normal add-in use, increases the likelihood of widespread compromise before detection. The supply chain aspect complicates trust assumptions, as the add-in was originally legitimate and approved by Microsoft, highlighting systemic risks in software supply chains.

Mitigation Recommendations

European organizations should audit installed Outlook add-ins and remove any that are abandoned or from untrusted sources. Employ endpoint detection solutions capable of monitoring unusual add-in behavior, especially those with elevated permissions like ReadWriteItem. Implement multi-factor authentication (MFA) for Microsoft accounts to reduce the impact of credential theft. Monitor network traffic for suspicious connections to known malicious domains or unusual data exfiltration patterns. Advocate for Microsoft to enhance its marketplace security by enforcing domain ownership verification, continuous content scanning of add-in URLs, and automatic delisting of inactive or abandoned add-ins. Organizations should also educate users about phishing risks associated with add-ins and encourage reporting of suspicious login prompts. Deploy email security gateways with advanced phishing detection capabilities. Finally, maintain an inventory of all third-party add-ins and integrate this into vulnerability management and incident response processes to rapidly address emerging threats.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Article Source
{"url":"https://thehackernews.com/2026/02/first-malicious-outlook-add-in-found.html","fetched":true,"fetchedAt":"2026-02-12T07:45:45.377Z","wordCount":1438}

Threat ID: 698d852bc9e1ff5ad8a52189

Added to database: 2/12/2026, 7:45:47 AM

Last enriched: 2/12/2026, 7:46:24 AM

Last updated: 2/12/2026, 10:14:22 AM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats