Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Malicious Outlook Add-In Exploits Supply Chain Flaws

Malicious Outlook Add-In Exploits Supply Chain Flaws

Posted on February 12, 2026 By CWS

Cybersecurity experts have identified what is believed to be the first malicious add-in for Microsoft Outlook, raising concerns over supply chain vulnerabilities. According to Koi Security, an unidentified attacker took control of a domain linked to a discontinued legitimate add-in, using it to orchestrate a phishing operation that compromised over 4,000 user credentials. This incident has been labeled AgreeToSteal by the security firm.

Details of the AgreeTo Add-In Exploit

The add-in implicated in this attack is known as AgreeTo, designed to integrate various calendars into a single platform for users. Despite being last updated in December 2022, the add-in became the target of a sophisticated phishing campaign. Idan Dardikman, co-founder and CTO of Koi Security, explained that this event marks an evolution in supply chain attack strategies.

This attack mirrors previous vulnerabilities seen in browser extensions and npm packages, where trusted distribution channels are exploited. Office add-ins, however, present unique challenges due to their integration with Outlook, where sensitive data is often handled. Such add-ins are distributed through Microsoft’s marketplace, which implies a certain level of trust from users.

Mechanics of the Attack

The attack capitalizes on the operational framework of Office add-ins and the lack of ongoing monitoring for content changes. Microsoft requires add-in developers to submit their solutions for approval through the Partner Center. However, there is no mechanism to check the dynamic content served by the add-in post-approval.

In the AgreeTo case, the attacker exploited an expired domain link within the add-in’s manifest file, directing it to a Vercel-hosted URL that was no longer managed by the original developer. This oversight allowed the attacker to deploy a phishing kit that mimicked Microsoft’s sign-in page, capturing users’ login details and transmitting them via the Telegram Bot API.

Security Implications and Recommendations

The AgreeTo incident underscores the potential for even greater threats, given that the add-in was configured with permissions that could allow email access and modification. Such vulnerabilities stress the need for robust security checks and ongoing monitoring of add-in content.

Koi Security suggests several measures Microsoft could implement to mitigate these risks, including re-evaluating add-ins when their linked URLs change, verifying domain ownership, and flagging add-ins with prolonged inactivity. Additionally, displaying installation counts could help assess the impact of such tools.

This issue is not isolated to Microsoft’s platforms. Other marketplaces, such as the VS Code Marketplace, are also reevaluating their security protocols to prevent similar vulnerabilities. The fundamental problem lies in the approval process that does not account for subsequent content changes, a challenge that extends across various platforms hosting dynamic dependencies.

The Hacker News Tags:add-in, AgreeTo, Attack, Credentials, Cybersecurity, Koi Security, Malware, Microsoft, Office 365, Outlook, Phishing, Security, supply chain

Post navigation

Previous Post: Alarming Surge in Exploits Targeting Ivanti 0-Day Vulnerability
Next Post: Severe Fiber v2 Vulnerability in Go Risks Security Breaches

Related Posts

Cisco Warns of New Firewall Attack Exploiting CVE-2025-20333 and CVE-2025-20362 Cisco Warns of New Firewall Attack Exploiting CVE-2025-20333 and CVE-2025-20362 The Hacker News
Malicious PyPI Package Masquerades as Chimera Module to Steal AWS, CI/CD, and macOS Data Malicious PyPI Package Masquerades as Chimera Module to Steal AWS, CI/CD, and macOS Data The Hacker News
Two Distinct Botnets Exploit Wazuh Server Vulnerability to Launch Mirai-Based Attacks Two Distinct Botnets Exploit Wazuh Server Vulnerability to Launch Mirai-Based Attacks The Hacker News
UNC6384 Deploys PlugX via Captive Portal Hijacks and Valid Certificates Targeting Diplomats UNC6384 Deploys PlugX via Captive Portal Hijacks and Valid Certificates Targeting Diplomats The Hacker News
Fortinet Confirms Active FortiCloud SSO Bypass on Fully Patched FortiGate Firewalls Fortinet Confirms Active FortiCloud SSO Bypass on Fully Patched FortiGate Firewalls The Hacker News
New TokenBreak Attack Bypasses AI Moderation with Single-Character Text Changes New TokenBreak Attack Bypasses AI Moderation with Single-Character Text Changes The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News