
Cybersecurity researchers have found what they mentioned is the primary identified malicious Microsoft Outlook add-in detected within the wild.
On this uncommon provide chain assault detailed by Koi Safety, an unknown attacker claimed the area related to a now-abandoned legit add-in to serve a faux Microsoft login web page, stealing over 4,000 credentials within the course of. The exercise has been codenamed AgreeToSteal by the cybersecurity firm.
The Outlook add-in in query is AgreeTo, which is marketed by its developer as a approach for customers to attach totally different calendars in a single place and share their availability by means of e-mail. The add-in was final up to date in December 2022.
Idan Dardikman, co-founder and CTO of Koi, advised The Hacker Information that the incident represents a broadening of provide chain assault vectors.
“This is similar class of assault we have seen in browser extensions, npm packages, and IDE plugins: a trusted distribution channel the place the content material can change after approval,” Dardikman mentioned. “What makes Workplace add-ins significantly regarding is the mix of things: they run inside Outlook, the place customers deal with their most delicate communications, they’ll request permissions to learn and modify emails, and so they’re distributed by means of Microsoft’s personal retailer, which carries implicit belief.”
“The AgreeTo case provides one other dimension: the unique developer did nothing fallacious. They constructed a legit product and moved on. The assault exploited the hole between when a developer abandons a mission and when the platform notices. Each market that hosts distant dynamic dependencies is inclined to this.”
At its core, the assault exploits how Workplace add-ins work and the shortage of periodic content material monitoring of add-ins printed to the Market. In accordance with Microsoft’s documentation, add-in builders are required to create an account and submit their answer to the Companion Middle, following which it’s subjected to an approval course of.
What’s extra, Workplace add-ins make use of a manifest file that declares a URL, the contents of that are fetched and served in real-time from the developer’s server each time it is opened inside an iframe factor inside the appliance. Nevertheless, there’s nothing stopping a nasty actor from taking management of an expired area.
Within the case of AgreeTo, the manifest file pointed to a URL hosted on Vercel (“outlook-one.vercel[.]app”), which grew to become claimable after the developer’s Vercel deployment was deleted resulting from it primarily turning into abandonware someday round 2023. The infrastructure remains to be reside as of writing.

The attacker took benefit of this conduct to stage a phishing package on that URL that displayed a faux Microsoft sign-in web page, capturing entered passwords, exfiltrating the main points through the Telegram Bot API, and ultimately redirecting the sufferer to the precise Microsoft login web page.
However Koi warns that the incident may have been worse. On condition that the add-in is configured with “ReadWriteItem” permissions – which permits it to learn and modify the person’s emails – a risk actor may have abused this blind spot to deploy JavaScript that may covertly siphon a sufferer’s mailbox contents.
The findings as soon as once more deliver to fore the necessity for rescanning packaged and instruments uploaded to marketplaces and repositories to flag malicious/suspicious exercise.
Dardikman mentioned whereas Microsoft critiques the manifest in the course of the preliminary submission part, there isn’t any management over the precise content material that’s retrieved reside from the developer’s server each time the add-in is opened, as soon as it is signed and accepted. In consequence, the absence of continued monitoring of what the URL serves opens the door to unintended safety dangers.
“Workplace add-ins are basically totally different from conventional software program,” Dardikman added. “They do not ship a static code bundle. The manifest merely declares a URL, and no matter that URL serves at any given second is what runs inside Outlook. In AgreeTo’s case, Microsoft signed the manifest in December 2022, pointing to outlook-one.vercel.app. That very same URL is now serving a phishing package, and the add-in remains to be listed within the retailer.”
To counter the safety points posed by the risk, Koi recommends plenty of steps that Microsoft can take –
- Set off a re-review when an add-in’s URL begins returning totally different content material from what it was throughout evaluation.
- Confirm possession of the area to make sure that it is managed by the add-in developer, and flag add-ins the place the area infrastructure has modified fingers.
- Implement a mechanism for delisting or flagging add-ins that haven’t been up to date past a sure time interval.
- Show set up counts as a approach to assess impression.
The Hacker Information has reached out to Microsoft for remark, and we are going to replace the story if we hear again.
It bears noting that the issue shouldn’t be restricted to Microsoft Market or the Workplace Retailer alone. Final month, Open VSX introduced plans to implement safety checks earlier than Microsoft Visible Studio Code (VS Code) extensions are printed to the open-source repository. Microsoft’s VS Code Market, equally, does periodic bulk rescanning of all packages within the registry.
“The structural drawback is similar throughout all marketplaces that host distant dynamic dependencies: approve as soon as, belief endlessly,” Dardikman mentioned. “The specifics fluctuate by platform, however the elementary hole that enabled AgreeTo exists wherever a market critiques a manifest at submission with out monitoring what the referenced URLs truly serve afterward.”

