Outlook add-in goes rogue and steals 4,000 credentials and payment data
嗯,用户让我总结一下这篇文章的内容,控制在100字以内,而且不需要用“文章内容总结”之类的开头。首先,我得通读整篇文章,抓住主要信息。 文章讲的是研究人员发现了一个恶意的Microsoft Outlook插件,叫AgreeTo。这个插件被用来窃取4000多个微软账户的凭证、信用卡号和银行安全答案。攻击者是怎么做到的呢?原来,这个插件是由一个开发者开发的开源工具,后来被遗弃了。攻击者接管了该插件的URL,并利用它加载钓鱼工具包。 插件加载后,用户会被引导到一个假的微软登录页面,输入的信息会被发送给攻击者的Telegram机器人。研究人员甚至能访问到这些数据,发现了大量被盗信息。攻击者还运营了其他品牌的钓鱼套件,说明这是一个专业且多品牌的钓鱼活动。 最后,文章还给了用户一些应对措施,比如删除插件、更改密码、检查账户安全等。 现在要把这些信息浓缩到100字以内。需要包括恶意插件、窃取的数据类型、攻击手段(如接管URL)、钓鱼页面的工作原理以及攻击范围(多品牌)。同时保持简洁明了。 </think> 研究人员发现恶意Microsoft Outlook插件AgreeTo被滥用,窃取4,000个微软账户凭证及支付数据。攻击者接管失效URL,在Outlook中加载钓鱼页面窃取信息。该插件滥用ReadWriteItem权限,在用户不知情下收集数据并转至Telegram。此为大型多品牌钓鱼活动的一部分,涉及银行、ISP等品牌仿冒。建议受影响用户删除插件、更改密码并检查账户安全。 2026-2-12 14:35:13 Author: www.malwarebytes.com(查看原文) 阅读量:3 收藏

Researchers found a malicious Microsoft Outlook add-in which was able to steal 4,000 stolen Microsoft account credentials, credit card numbers, and banking security answers. 

How is it possible that the Microsoft Office Add-in Store ended listing an add-in that silently loaded a phishing kit inside Outlook’s sidebar?

A developer launched an add-in called AgreeTo, an open-source meeting scheduling tool with a Chrome extension. It was a popular tool, but at some point, it was abandoned by its developer, its backend URL on Vercel expired, and an attacker later claimed that same URL.

That requires some explanation. Office add-ins are essentially XML manifests that tell Outlook to load a specific URL in an iframe. Microsoft reviews and signs the manifest once but does not continuously monitor what that URL serves later.

So, when the outlook-one.vercel.app subdomain became free to claim, a cybercriminal jumped at the opportunity to scoop it up and abuse the powerful ReadWriteItem permissions requested and approved in 2022. These permissions meant the add-in could read and modify a user’s email when loaded. The permissions were appropriate for a meeting scheduler, but they served a different purpose for the criminal.

While Google removed the dead Chrome extension in February 2025, the Outlook add-in stayed listed in Microsoft’s Office Store, still pointing to a Vercel URL that no longer belonged to the original developer.

An attacker registered that Vercel subdomain and deployed a simple four-page phishing kit consisting of fake Microsoft login, password collection, Telegram-based data exfiltration, and a redirect to the real login.microsoftonline.com.

What make this work was simple and effective. When users opened the add-in, they saw what looked like a normal Microsoft sign-in inside Outlook. They entered credentials, which were sent via a JavaScript function to the attacker’s Telegram bot along with IP data, then were bounced to the real Microsoft login so nothing seemed suspicious.

The researchers were able to access the attacker’s poorly secured Telegram-based exfiltration channel and recovered more than 4,000 sets of stolen Microsoft account credentials, plus payment and banking data, indicating the campaign was active and part of a larger multi-brand phishing operation.

“The same attacker operates at least 12 distinct phishing kits, each impersonating a different brand – Canadian ISPs, banks, webmail providers. The stolen data included not just email credentials but credit card numbers, CVVs, PINs, and banking security answers used to intercept Interac e-Transfer payments. This is a professional, multi-brand phishing operation. The Outlook add-in was just one of its distribution channels.”

What to do

If you are or ever have used the AgreeTo add-in after May 2023:

  • Make sure it’s removed. If not, uninstall the add-in.
  • Change the password for your Microsoft account.
  • If that password (or close variants) was reused on other services (email, banking, SaaS, social), change those as well and make each one unique.
  • Review recent sign‑ins and security activity on your Microsoft account, looking for logins from unknown locations or devices, or unusual times.
  • Review other sensitive information you may have shared via email.
  • Scan your mailbox for signs of abuse: messages you did not send, auto‑forwarding rules you did not create, or password‑reset emails for other services you did not request.
  • Watch payment statements closely for at least the next few months, especially small “test” charges and unexpected e‑transfer or card‑not‑present transactions, and dispute anything suspicious immediately.

We don’t just report on threats—we help safeguard your entire digital identity

Cybersecurity risks should never spread beyond a headline. Protect your, and your family’s, personal information by using identity protection.

About the author

Was a Microsoft MVP in consumer security for 12 years running. Can speak four languages. Smells of rich mahogany and leather-bound books.


文章来源: https://www.malwarebytes.com/blog/news/2026/02/outlook-add-in-goes-rogue-and-steals-4000-credentials-and-payment-data
如有侵权请联系:admin#unsafe.sh