AgreeToSteal is the first documented case of a malicious Microsoft Outlook add-in operating in the wild. The campaign originated from a legitimate meeting scheduling add-in (“AgreeTo”) that was abandoned by its developer. After the associated hosting subdomain became unclaimed, a threat actor hijacked it and deployed a phishing kit. The attack leveraged Microsoft’s own Office Add-in infrastructure to deliver credential harvesting pages inside Outlook, resulting in more than 4,000 stolen Microsoft account credentials.
Office Add-ins are not static binaries. They load a live URL in an iframe inside Outlook. Microsoft reviews and signs the manifest at submission but does not continuously validate the hosted content.
When development stopped and the Vercel deployment was deleted, the subdomain became available for registration.
The attacker claimed the abandoned Vercel subdomain and deployed a four-page phishing kit:
No modification to the Microsoft store listing was required. The signed add-in manifest continued to direct Outlook clients to the now attacker-controlled domain.
No dedicated C2 server was used. The attacker relied solely on Telegram infrastructure for exfiltration.
Researchers gained access to the poorly secured Telegram bot infrastructure and recovered:
The campaign is ongoing and part of a broader phishing ecosystem involving at least 12 distinct brand impersonation kits targeting banks, ISPs, and webmail providers.
Enjoyed reading this Threat Intelligence Advisory? Stay updated with our latest exclusive content by following us on Twitter and LinkedIn
No related posts found.
This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.
Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.
This website uses Google Analytics to collect anonymous information such as the number of visitors to the site, and the most popular pages.
Keeping this cookie enabled helps us to improve our website.
This website uses the following additional cookies:
(List the cookies that you are using on the website here.)
More information about our Cookie Policy