Original Article Text

Click to Toggle View

Microsoft Store Outlook add-in hijacked to steal 4,000 Microsoft accounts. The AgreeTo add-in for Outlook has been hijacked and turned into a phishing kit that stole more than 4,000 Microsoft account credentials. Originally a legitimate meeting scheduling tool for Outlook users, the module was developed by an independent publisher and has been on the Microsoft Office Add-in Store since December 2022. Office add-ins are just URLs pointing to content loaded into Microsoft products from the developer's server. In the case of AgreeTo, the developer used a Vercel-hosted URL (outlook-one.vercel.app) but abandoned the project, despite the userbase it formed. However, the add-in continued to be listed on Microsoft's store, and a threat actor claimed its orphaned URL to plant a phishing kit. According to researchers at supply-chain security company Koi say that the threat actor taking over the project deployed a fake Microsoft sign-in page, a password collection page, an exfiltration script, and a redirect. It is worth noting that once an add-in is in the Microsoft store, there is no further verification process. When submitting a module, Microsoft reviews the manifest file and signs it for approval. AgreeTo had already been reviewed and approved, and loaded all the resources - user interface and everything the user interacts with, from the developer's server, now under the control of the threat actor. Koi researchers discovered the compromise and accessed the attacker's exfiltration channel. They found that over 4,000 Microsoft account credentials had been stolen, along with credit card numbers and banking security answers. The add-in was present in the store until today, when Microsoft removed it. Koi researchers say that the threat actor was actively testing stolen credentials during their examination. When users opened the  malicious AgreeTo add-in in Outlook, instead of the scheduling interface, they would see a fake Microsoft login page in the program’s sidebar, which can easily be mistaken for a legitimate login prompt. Any account credentials entered there are exfiltrated via a Telegram bot API to the attackers, while victims are then redirected to the real Microsoft login page to reduce suspicion. It is noted that the add-in retained ReadWriteItem permissions, enabling it to read and modify user emails, though no such activity was confirmed. Koi Security found that the operator behind this attack runs at least a dozen additional phishing kits targeting internet service providers, banks, and webmail providers. While malicious add-ins aren’t new, we have previously seen such tools promoted via spam forum comments, phishing emails, and malvertising. The case of AgreeTo stands out, though, as it is likely the first to be hosted on Microsoft’s Marketplace. Koi Security researcher Oren Yomtov told BleepingComputer that this is the first malware found on the official Microsoft Marketplace and the first malicious Outlook add-in detected in the wild. If you still have AgreeTo installed on Outlook, you are recommended to remove it immediately and reset your passwords. BleepingComputer has contacted Microsoft for a comment on Koi researchers’ findings, but we are still waiting for a response. The future of IT infrastructure is here Modern IT infrastructure moves faster than manual workflows can handle. In this new Tines guide, learn how your team can reduce hidden manual delays, improve reliability through automated response, and build and scale intelligent workflows on top of tools you already use.

Daily Brief Summary

DATA BREACH // Hijacked Outlook Add-in Compromises 4,000 Microsoft Accounts

The AgreeTo add-in for Outlook was hijacked, leading to the theft of over 4,000 Microsoft account credentials, including sensitive financial information.

Originally a legitimate scheduling tool, the add-in's URL was abandoned by its developer, allowing a threat actor to repurpose it for phishing.

The attacker deployed a fake Microsoft sign-in page and exfiltration script, capturing credentials via a Telegram bot API.

Microsoft removed the compromised add-in from its store after the breach was discovered by Koi Security researchers.

This incident marks the first known case of a malicious Outlook add-in hosted on Microsoft's Marketplace, raising concerns about add-in verification processes.

The attacker is linked to multiple phishing kits targeting various sectors, indicating a broader threat landscape.

Users with the AgreeTo add-in are advised to uninstall it immediately and reset their passwords to mitigate potential risks.

Microsoft has yet to comment on the situation, highlighting the need for enhanced security measures in app marketplaces.