First Malicious Outlook Add-In Found Stealing 4,000+ Microsoft Credentials
嗯,用户让我帮忙总结这篇文章,控制在一百个字以内,而且不需要用“文章内容总结”这样的开头。首先,我得仔细阅读这篇文章,理解它的主要内容。 文章讲的是网络安全研究人员发现了一个恶意的微软Outlook插件,这是第一次在野外检测到的。攻击者利用了一个已经被放弃的合法插件的域名,用来展示一个假的微软登录页面,窃取了超过4000个凭证。这个活动被命名为AgreeToSteal。 插件本身叫做AgreeTo,原本是用于连接不同日历和共享可用性的工具。攻击者利用了开发者放弃项目和平台注意到之间的时间差。这种供应链攻击的问题在于,一旦插件被批准后,内容可能会被篡改。 文章还提到微软的审查机制只在初始提交时检查manifest文件,并没有持续监控URL的内容变化。因此,建议微软采取一些措施,比如重新审核URL内容变化、验证域名所有权、下架未更新的插件等。 总结一下,我需要把这些关键点浓缩到100字以内。要包括恶意插件、供应链攻击、窃取凭证、微软审查机制的问题以及建议措施。 </think> 研究人员发现首个恶意Microsoft Outlook插件AgreeToSteal,攻击者利用已废弃合法插件域名展示假登录页面窃取4000多凭证。该攻击暴露供应链安全漏洞:批准后信任机制缺乏持续监控。建议加强URL内容审核和域名管理以提升安全性。 2026-2-11 17:45:0 Author: thehackernews.com(查看原文) 阅读量:0 收藏

Cloud Security / Identity Security

Cybersecurity researchers have discovered what they said is the first known malicious Microsoft Outlook add-in detected in the wild.

In this unusual supply chain attack detailed by Koi Security, an unknown attacker claimed the domain associated with a now-abandoned legitimate add-in to serve a fake Microsoft login page, stealing over 4,000 credentials in the process. The activity has been codenamed AgreeToSteal by the cybersecurity company.

The Outlook add-in in question is AgreeTo, which is advertised by its developer as a way for users to connect different calendars in a single place and share their availability through email. The add-in was last updated in December 2022.

Idan Dardikman, co-founder and CTO of Koi, told The Hacker News that the incident represents a broadening of supply chain attack vectors.

"This is the same class of attack we've seen in browser extensions, npm packages, and IDE plugins: a trusted distribution channel where the content can change after approval," Dardikman said. "What makes Office add-ins particularly concerning is the combination of factors: they run inside Outlook, where users handle their most sensitive communications, they can request permissions to read and modify emails, and they're distributed through Microsoft's own store, which carries implicit trust."

"The AgreeTo case adds another dimension: the original developer did nothing wrong. They built a legitimate product and moved on. The attack exploited the gap between when a developer abandons a project and when the platform notices. Every marketplace that hosts remote dynamic dependencies is susceptible to this."

At its core, the attack exploits how Office add-ins work and the lack of periodic content monitoring of add-ins published to the Marketplace. According to Microsoft's documentation, add-in developers are required to create an account and submit their solution to the Partner Center, following which it is subjected to an approval process.

What's more, Office add-ins make use of a manifest file that declares a URL, the contents of which are fetched and served in real-time from the developer's server every time it's opened within an iframe element inside the application. However, there is nothing stopping a bad actor from taking control of an expired domain.

In the case of AgreeTo, the manifest file pointed to a URL hosted on Vercel ("outlook-one.vercel[.]app"), which became claimable after the developer's Vercel deployment was deleted due to it essentially becoming abandonware sometime around 2023. The infrastructure is still live as of writing.

The attacker took advantage of this behavior to stage a phishing kit on that URL that displayed a fake Microsoft sign-in page, capturing entered passwords, exfiltrating the details via the Telegram Bot API, and eventually redirecting the victim to the actual Microsoft login page.

But Koi warns that the incident could have been worse. Given that the add-in is configured with "ReadWriteItem" permissions – which allows it to read and modify the user's emails – a threat actor could have abused this blind spot to deploy JavaScript that can covertly siphon a victim's mailbox contents.

The findings once again bring to fore the need for rescanning packaged and tools uploaded to marketplaces and repositories to flag malicious/suspicious activity.

Dardikman said while Microsoft reviews the manifest during the initial submission phase, there is no control over the actual content that is retrieved live from the developer's server every time the add-in is opened, once it's signed and approved. As a result, the absence of continued monitoring of what the URL serves opens the door to unintended security risks.

"Office add-ins are fundamentally different from traditional software," Dardikman added. "They don't ship a static code bundle. The manifest simply declares a URL, and whatever that URL serves at any given moment is what runs inside Outlook. In AgreeTo's case, Microsoft signed the manifest in December 2022, pointing to outlook-one.vercel.app. That same URL is now serving a phishing kit, and the add-in is still listed in the store."

To counter the security issues posed by the threat, Koi recommends a number of steps that Microsoft can take -

  • Trigger a re-review when an add-in's URL starts returning different content from what it was during review.
  • Verify ownership of the domain to ensure that it's managed by the add-in developer, and flag add-ins where the domain infrastructure has changed hands.
  • Implement a mechanism for delisting or flagging add-ins that have not been updated beyond a certain time period.
  • Display installation counts as a way to assess impact.

The Hacker News has reached out to Microsoft for comment, and we will update the story if we hear back.

It bears noting that the problem is not limited to Microsoft Marketplace or the Office Store alone. Last month, Open VSX announced plans to enforce security checks before Microsoft Visual Studio Code (VS Code) extensions are published to the open-source repository. Microsoft's VS Code Marketplace, similarly, does periodic bulk rescanning of all packages in the registry.

"The structural problem is the same across all marketplaces that host remote dynamic dependencies: approve once, trust forever," Dardikman said. "The specifics vary by platform, but the fundamental gap that enabled AgreeTo exists anywhere a marketplace reviews a manifest at submission without monitoring what the referenced URLs actually serve afterward."

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/02/first-malicious-outlook-add-in-found.html
如有侵权请联系:admin#unsafe.sh