It's almost charming, the thought that you can trust the app store. Click a button, add a new bit of code to your workflow, and shave minutes off your day. That's how "AgreeTo" sold itself to Microsoft Outlook users. And, no question, that's what thousands of people believed—until an abandoned, forgotten add-in ended up stealing at least 4,000 Microsoft account credentials right out from under them.
Now, if you thought risk lived only in obvious malware and shady email attachments, this news should jolt you out of that fantasy. The "AgreeToSteal" campaign is a flagrant, almost cynical example of how fragile trust in digital tooling can be—and if vendors and users don't wake up, this won't be the last credential heist we see from inside the so-called "trusted" corners of productivity software.
From Calendar Helper to Credential Siphon
The life cycle of AgreeTo is a case study in neglect, both from its original developers and, frankly, Microsoft itself. Launched in December 2022 as a legitimate calendar scheduling aid, the tool quickly found fans. But developers get bored, startups run out of money, founders move on—call it what you want. AgreeTo was left to rot, unmaintained and orphaned.
Guess who loves digital orphans? Cybercriminals. They scooped up the lapsed domain attached to the add-in, threw up a convincing Microsoft login clone, and waited for the sheep to wander in. Users—seeing no warning from their trusted store—entered their credentials with confidence. Over 4,000 people, mostly folks who thought they knew better, handed their company keys to criminals in one fell swoop.
Why This Attack Actually Works
You might think it's a fluke, but the playbook here is more than familiar. Cybersecurity researchers at Koi Security found the attackers exfiltrating juicy credentials, credit card numbers, and those "secret" security answers we all recycle for convenience. The data route of choice? Telegram’s Bot API, because why bother building your own infrastructure when you can piggyback off global cloud messaging apps with zero friction and even less oversight.
What makes this so sharp edged is how the attack side-stepped classic red flags. AgreeTo was already blessed by the Microsoft Add-In Store. The malicious payload was wrapped in the context of a trusted brand, running right inside Outlook—a tool millions use without a hint of suspicion. You probably wouldn't even blink twice at a permissions request, even when it asked for "ReadWriteItem" power. It practically screamed "I'm legitimate," which should worry you a lot more than a sketchy email.
No Scrutiny After Approval—A Gaping Blind Spot
Here’s where it gets embarrassing. Microsoft's app store approves an add-in, but doesn't actually keep tabs on what happens next. Content can change after a tool is listed, and there's no meaningful oversight or review cycle to catch "upgrades" that swap out legitimate scheduling features for phishing kits. Once you’re in the store, you’re in—period. That’s basically a green light for anyone patient (or lucky) enough to inherit a neglected add-in.
The reality many businesses ignore is that these little widgets and browser extensions, handed out like lollipops to anyone with a work email, don’t just streamline your day. When left unmonitored, they become ticking time bombs embedded inside your IT stack.
What the AgreeToSteal Campaign Tells Us About Supply Chain Security
We love talking about supply chain risk in terms of beef recalls and tainted lettuce. But here’s the thing—you’re far more likely to get bled dry by compromised software components than by your lunch. The AgreeToSteal incident is a warning, loud and clear: the software you rely on isn’t safe just because it’s got a sticker from the storefront.
- Any abandoned software can be repurposed—sometimes years after its so-called retirement.
- Once hackers get in, they don't just steal email logins. They go for everything—credit cards, password reset answers, company secrets.
- Traditional security controls, like virus scans and basic spam filters, don’t catch attacks launched from inside authorized software.
The botched oversight in post-publication monitoring is a symptom of a lazy supply chain philosophy. If "set and forget" is your model, absolutely nobody should be surprised when criminal actors exploit the cracks. There’s plenty of precedent for it—and not just with Microsoft. npm packages, browser extensions, even mobile apps run the same risks when vigilance turns into apathy.
What Now: Aggressive Vigilance, or Just More Damage?
Microsoft, sensing PR doom, yanked the malicious AgreeTo add-in from its store. That's only after damage had already landed. Users are told—like always—to change passwords, uninstall the rogue add-in, and "monitor for suspicious activity." It’s the cybersecurity equivalent of shrugging and sweeping up broken glass after the break-in. Sure, it’s something. But with 4,000+ sets of credentials already gone, it rings more like damage control than real security advice.
If you install any third-party add-in, plug-in, or extension, it’s a roll of the dice—no matter what the portal or vendor says. That doesn’t mean you should give up, but it does mean you can’t afford to sleepwalk through permissions screens, and you should absolutely use multi-factor authentication, even if you’re "too busy." When’s the last time you reviewed what you’ve installed lately, or what permissions you’ve given away?
This isn’t just a Microsoft issue. It’s endemic to software distribution models where review stops at the front door. The lack of ongoing scrutiny enables breaches that look boring—maintenance headaches and orphaned domains—but quickly spiral into wide-reaching credential dumps and fraud campaigns. The bad guys don’t care if the exploit is elegant, so long as it pays.
The Future Isn't Pretty—Unless the Model Changes
If software vendors want users to actually trust add-in ecosystems, then continuous, automated, invasive—even "paranoid"—oversight has to be the new norm, not an afterthought. Assume every bit of code is a liability after launch, especially when it comes to access controls and permissions. And don’t kid yourself thinking this will be the last time some abandoned project turns into a credential fire sale. It’s not.
For users, skepticism pays. Don’t expect Microsoft, Google, or anyone else to keep you safe out of goodwill or nostalgia for the glory days of walled gardens. Trust, in this age, is always earned—and, with every incident like AgreeToSteal, it’s spent faster than you’d like to believe.


