Microsoft Store Outlook add-in hijacked to steal 4,000 Microsoft accounts

Published: (February 11, 2026 at 04:53 PM EST)
3 min read

Source: Bleeping Computer

The AgreeTo add‑in for Outlook was hijacked and turned into a phishing kit that stole more than 4,000 Microsoft account credentials.

Originally a legitimate meeting‑scheduling tool developed by an independent publisher, AgreeTo had been available in the Microsoft Office Add‑in Store since December 2022. Office add‑ins are essentially URLs that load content from the developer’s server into Microsoft products. In AgreeTo’s case, the developer used a Vercel‑hosted URL (outlook‑one.vercel.app) but later abandoned the project.

How the add‑in was compromised

  • The add‑in remained listed in Microsoft’s store after the original developer stopped maintaining it.
  • A threat actor claimed the orphaned URL and replaced the original content with a phishing kit.
  • The malicious version served a fake Microsoft sign‑in page, a password‑collection page, an exfiltration script, and a redirect to the legitimate login page.

Note: Once an add‑in is approved and published in the Microsoft Store, Microsoft does not perform further verification. The manifest file is reviewed and signed at submission, after which all UI elements are loaded from the developer’s server.


AgreeTo add‑in on Microsoft Marketplace (Source: Koi Security)

The compromised add‑in retained ReadWriteItem permissions, which could allow it to read and modify user emails, although no such activity was confirmed.

Impact

Koi Security researchers discovered the compromise and accessed the attacker’s exfiltration channel. Their investigation revealed:

  • Over 4,000 stolen Microsoft account credentials.
  • Additional data such as credit‑card numbers and banking security answers.
  • The attacker used a Telegram Bot API to receive the harvested credentials and then redirected victims to the real Microsoft login page to avoid suspicion.


Phishing page (left) and exfiltration logic (right) (Source: Koi Security)

The add‑in remained in the store until Microsoft removed it after the findings were reported. The threat actor was observed testing stolen credentials during the investigation.

Mitigation

If you have the AgreeTo add‑in installed in Outlook:

  1. Remove the add‑in immediately from Outlook’s add‑in manager.
  2. Reset passwords for any Microsoft accounts that may have been used with Outlook.
  3. Review your account activity for unauthorized sign‑ins and enable multi‑factor authentication (MFA) where possible.

Koi Security researcher Oren Yomtov told BleepingComputer that this is the first malware found on the official Microsoft Marketplace and the first malicious Outlook add‑in detected in the wild.


References

0 views
Back to Blog

Related posts

Read more »

Upcoming Speaking Engagements

Upcoming Speaking Engagements - Ontario Tech University, Oshawa, Ontario, Canada – 2 PM ET, Thursday, February 26 2026. - Personal AI Summit, Los Angeles, Cali...