First Malicious Outlook Add-In Found Stealing 4,000+ Microsoft Credentials
Cybersecurity researchers have discovered what they said is the first known malicious Microsoft Outlook add-in detected in the wild. In this unusual supply chain attack detailed by Koi Security, an unknown attacker claimed the domain associated with a now-abandoned legitimate add-in to serve a fake Microsoft login page, stealing over 4,000 credentials in the process. The activity has been
AI Analysis
Technical Summary
Researchers have identified the first known malicious Microsoft Outlook add-in detected in the wild, named AgreeTo, which was originally a legitimate calendar integration tool last updated in December 2022. The attacker exploited the abandonment of the add-in by claiming the domain associated with its manifest URL, which is fetched live each time the add-in runs inside Outlook. This domain, hosted on Vercel, now serves a phishing kit presenting a fake Microsoft login page to steal credentials, having already compromised over 4,000 accounts. The add-in requests "ReadWriteItem" permissions, allowing it to read and modify emails, which could enable attackers to siphon mailbox contents covertly. The attack represents a new supply chain vector where dynamic content served by add-ins can be maliciously changed post-approval, circumventing Microsoft's initial manifest review process. The attacker exfiltrated credentials via the Telegram Bot API and redirected victims to the legitimate Microsoft login page to avoid suspicion. This incident underscores the risks of marketplaces approving add-ins based on static manifests without continuous monitoring of the live content they serve. Recommendations include implementing domain ownership verification, re-review triggers when content changes, delisting inactive add-ins, and displaying installation metrics to assess impact. The problem is systemic across platforms hosting remote dynamic dependencies, emphasizing the need for ongoing scrutiny beyond initial approval.
Potential Impact
European organizations using Microsoft Outlook with add-ins from the Microsoft Store face significant risks from this attack. Credential theft can lead to unauthorized access to corporate email accounts, enabling further phishing, data exfiltration, and lateral movement within networks. The ability of the add-in to read and modify emails threatens confidentiality and integrity of sensitive communications, potentially exposing personal data, intellectual property, and strategic information. This can result in regulatory non-compliance under GDPR, financial losses, reputational damage, and operational disruption. Organizations relying heavily on Outlook for internal and external communications, especially in sectors like finance, government, and critical infrastructure, are particularly vulnerable. The stealthy nature of the attack, which does not require user interaction beyond normal add-in use, increases the likelihood of widespread compromise before detection. The supply chain aspect complicates trust assumptions, as the add-in was originally legitimate and approved by Microsoft, highlighting systemic risks in software supply chains.
Mitigation Recommendations
European organizations should audit installed Outlook add-ins and remove any that are abandoned or from untrusted sources. Employ endpoint detection solutions capable of monitoring unusual add-in behavior, especially those with elevated permissions like ReadWriteItem. Implement multi-factor authentication (MFA) for Microsoft accounts to reduce the impact of credential theft. Monitor network traffic for suspicious connections to known malicious domains or unusual data exfiltration patterns. Advocate for Microsoft to enhance its marketplace security by enforcing domain ownership verification, continuous content scanning of add-in URLs, and automatic delisting of inactive or abandoned add-ins. Organizations should also educate users about phishing risks associated with add-ins and encourage reporting of suspicious login prompts. Deploy email security gateways with advanced phishing detection capabilities. Finally, maintain an inventory of all third-party add-ins and integrate this into vulnerability management and incident response processes to rapidly address emerging threats.
Affected Countries
United Kingdom, Germany, France, Netherlands, Italy, Spain, Sweden, Belgium, Poland, Ireland
First Malicious Outlook Add-In Found Stealing 4,000+ Microsoft Credentials
Description
Cybersecurity researchers have discovered what they said is the first known malicious Microsoft Outlook add-in detected in the wild. In this unusual supply chain attack detailed by Koi Security, an unknown attacker claimed the domain associated with a now-abandoned legitimate add-in to serve a fake Microsoft login page, stealing over 4,000 credentials in the process. The activity has been
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
Researchers have identified the first known malicious Microsoft Outlook add-in detected in the wild, named AgreeTo, which was originally a legitimate calendar integration tool last updated in December 2022. The attacker exploited the abandonment of the add-in by claiming the domain associated with its manifest URL, which is fetched live each time the add-in runs inside Outlook. This domain, hosted on Vercel, now serves a phishing kit presenting a fake Microsoft login page to steal credentials, having already compromised over 4,000 accounts. The add-in requests "ReadWriteItem" permissions, allowing it to read and modify emails, which could enable attackers to siphon mailbox contents covertly. The attack represents a new supply chain vector where dynamic content served by add-ins can be maliciously changed post-approval, circumventing Microsoft's initial manifest review process. The attacker exfiltrated credentials via the Telegram Bot API and redirected victims to the legitimate Microsoft login page to avoid suspicion. This incident underscores the risks of marketplaces approving add-ins based on static manifests without continuous monitoring of the live content they serve. Recommendations include implementing domain ownership verification, re-review triggers when content changes, delisting inactive add-ins, and displaying installation metrics to assess impact. The problem is systemic across platforms hosting remote dynamic dependencies, emphasizing the need for ongoing scrutiny beyond initial approval.
Potential Impact
European organizations using Microsoft Outlook with add-ins from the Microsoft Store face significant risks from this attack. Credential theft can lead to unauthorized access to corporate email accounts, enabling further phishing, data exfiltration, and lateral movement within networks. The ability of the add-in to read and modify emails threatens confidentiality and integrity of sensitive communications, potentially exposing personal data, intellectual property, and strategic information. This can result in regulatory non-compliance under GDPR, financial losses, reputational damage, and operational disruption. Organizations relying heavily on Outlook for internal and external communications, especially in sectors like finance, government, and critical infrastructure, are particularly vulnerable. The stealthy nature of the attack, which does not require user interaction beyond normal add-in use, increases the likelihood of widespread compromise before detection. The supply chain aspect complicates trust assumptions, as the add-in was originally legitimate and approved by Microsoft, highlighting systemic risks in software supply chains.
Mitigation Recommendations
European organizations should audit installed Outlook add-ins and remove any that are abandoned or from untrusted sources. Employ endpoint detection solutions capable of monitoring unusual add-in behavior, especially those with elevated permissions like ReadWriteItem. Implement multi-factor authentication (MFA) for Microsoft accounts to reduce the impact of credential theft. Monitor network traffic for suspicious connections to known malicious domains or unusual data exfiltration patterns. Advocate for Microsoft to enhance its marketplace security by enforcing domain ownership verification, continuous content scanning of add-in URLs, and automatic delisting of inactive or abandoned add-ins. Organizations should also educate users about phishing risks associated with add-ins and encourage reporting of suspicious login prompts. Deploy email security gateways with advanced phishing detection capabilities. Finally, maintain an inventory of all third-party add-ins and integrate this into vulnerability management and incident response processes to rapidly address emerging threats.
Technical Details
- Article Source
- {"url":"https://thehackernews.com/2026/02/first-malicious-outlook-add-in-found.html","fetched":true,"fetchedAt":"2026-02-12T07:45:45.377Z","wordCount":1438}
Threat ID: 698d852bc9e1ff5ad8a52189
Added to database: 2/12/2026, 7:45:47 AM
Last enriched: 2/12/2026, 7:46:24 AM
Last updated: 3/29/2026, 11:37:11 AM
Views: 485
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.