Categories: Cyber Security News

Malicious Microsoft Outlook Add-in Stole 4,000 Account Credentials and Credit Card Details

Attackers have revived a forgotten Microsoft Outlook add-in to phish thousands of users, grabbing Microsoft account logins, passwords, and even credit card details.

Security firm Koi AI uncovered this “zombie” attack, the first known malicious Office add-in spotted in the wild.

It exposes a key flaw: Microsoft doesn’t recheck add-in content after approval, letting hackers hijack dormant tools.

Koidex report for AgreeTo add-in

The Dormant “AgreeTo” Add-in Awakens

Back in 2022, a developer released “AgreeTo,” a legit meeting scheduler, on the Microsoft Office Add-in Store. Users sideloaded it into Outlook for easy calendar booking.

The dev abandoned it, letting the hosting domain (outlook-one.vercel.app on Vercel) expire.

AgreeTo page on the Office Add-ins marketplace

Office add-ins aren’t downloadable apps. They’re web pages loaded in an iframe inside Outlook. They point to live URLs, which anyone can claim if abandoned.

An attacker grabbed the subdomain, instantly controlling what users saw in their sidebar no new approval needed.

Microsoft vets the add-in’s “manifest” file (XML settings) only at submission. AgreeTo’s 2022 manifest passed, granting “ReadWriteItem” permissions to read/modify emails. When hijacked, it swapped the scheduler for a fake Microsoft login page.

Users opening the add-in faced a prompt: “Sign in to continue.” Entering credentials fed data to a script that scraped emails, passwords, IPs, credit cards, and bank security questions. Stolen info routed straight to the attacker’s Telegram bot for exfiltration.

Koi AI infiltrated the bot channel, recovering data from 4,000+ victims. Attackers were testing logins live when caught. Microsoft yanked the add-in from its store, but phishing sites lingered.

No CVE yet, but this is a supply chain risk in dynamic dependencies. Add-ins evolve remotely without oversight.

This “zombie” model hits modern apps hard. Unlike static downloads, add-ins update silently. Attackers could have read inboxes or spoofed emails, but stuck to phishing.

Microsoft should add runtime URL checks, manifest re-reviews, or sandboxing. Users: Vet add-ins, use MFA, scan sidebars. Orgs: Block untrusted add-ins via admin policies.

Koi AI warns of copycats. Scan your Outlook now. This underscores supply chain hygiene: Validate dependencies forever, not just once.

Follow us on Google News , LinkedIn and X to Get More Instant UpdatesSet Cyberpress as a Preferred Source in Google.

The post Malicious Microsoft Outlook Add-in Stole 4,000 Account Credentials and Credit Card Details appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

Roxit.com leads all domain name sales at Sedo for the week

Roxit.com sold for $58,000 to lead all domain sales at Sedo. XX.eu was second at…

7 minutes ago

Microsoft Releases Cumulative Update for Windows 11, Version 25H2 and 24H2

Microsoft pushed out a significant cumulative update for Windows 11 on May 12, 2026, covering…

11 minutes ago

Top 10 Best Data Loss Prevention Software in 2026

In 2026, data is the undisputed lifeblood of the modern enterprise. As organizations shift completely…

12 minutes ago

City Crews to Start Street Line Painting in Fort Wayne

FORT WAYNE, IND. (WOWO) The City of Fort Wayne will begin its annual street line…

22 minutes ago

Proposed Medical Marijuana Legislation Would Include Regulation, Taxes

INDIANAPOLIS, IND. (WOWO) Indiana lawmakers could revisit medical marijuana legalization after Republican Sen. Mike Bohacek…

22 minutes ago

These Seven AI Rings Translate Sign Language in Real Time

The wireless rings read 100 common signs from two sign languages and “autocomplete” sentences. At…

26 minutes ago

This website uses cookies.