Cybersecurity News and Headlines
  • All Technology
  • AI
  • Autonomy
  • B2B Growth
  • Big Data
  • BioTech
  • ClimateTech
  • Consumer Tech
  • Crypto
  • Cybersecurity
  • DevOps
  • Digital Marketing
  • Ecommerce
  • EdTech
  • Enterprise
  • FinTech
  • GovTech
  • Hardware
  • HealthTech
  • HRTech
  • LegalTech
  • Nanotech
  • PropTech
  • Quantum
  • Robotics
  • SaaS
  • SpaceTech
AllNewsDealsSocialBlogsVideosPodcastsDigests

Cybersecurity Pulse

EMAIL DIGESTS

Daily

Every morning

Weekly

Sunday recap

NewsDealsSocialBlogsVideosPodcasts
CybersecurityNewsAttackers Weaponize Microsoft 365 Outlook Add-Ins to Quietly Exfiltrate Email Data
Attackers Weaponize Microsoft 365 Outlook Add-Ins to Quietly Exfiltrate Email Data
Cybersecurity

Attackers Weaponize Microsoft 365 Outlook Add-Ins to Quietly Exfiltrate Email Data

•January 30, 2026
0
GBHackers On Security
GBHackers On Security•Jan 30, 2026

Companies Mentioned

Microsoft

Microsoft

MSFT

Varonis

Varonis

VRNS

GBHackers

GBHackers

Why It Matters

The flaw enables mass exfiltration of corporate communications without detection, exposing enterprises to data leakage and espionage risks. It highlights a critical blind spot in Microsoft 365’s audit and governance controls.

Key Takeaways

  • •Outlook web add‑ins bypass Unified Audit Log.
  • •Malicious add‑in can read and exfiltrate outgoing emails.
  • •Admins can deploy tenant‑wide, making removal impossible for users.
  • •No consent prompt needed for minimal permission manifest.
  • •Mitigation requires manifest upload restrictions and network traffic monitoring.

Pulse Analysis

Outlook add‑ins are designed as lightweight web applications that extend Office functionality. Administrators can distribute them tenant‑wide through the Microsoft 365 admin center, while users may install them from the Store. The underlying model trusts the manifest’s declared permissions, and OWA historically records only mailbox‑level actions, not the add‑in lifecycle. This architectural choice creates a blind spot: when a custom add‑in is uploaded via the web interface, the Unified Audit Log—Microsoft’s primary forensic source—does not capture the installation or subsequent execution events, leaving security teams unaware of potentially malicious activity.

The Exfil Out&Look proof‑of‑concept demonstrates how an attacker can weaponize this gap. By crafting a manifest that requests access to the currently active item, the add‑in avoids consent prompts while still harvesting subject lines, bodies, recipients, and timestamps. Hooked to the OnMessageSend event, it automatically triggers on every outbound message, packaging the data into a simple fetch() request to an external server. Because the add‑in operates within Outlook’s native framework, its network traffic can blend with legitimate API calls, and the lack of audit entries means traditional Microsoft 365 monitoring tools cannot flag the exfiltration, enabling stealthy, large‑scale data theft.

Mitigating this risk requires a shift from reliance on built‑in audit logs to proactive governance. Organizations should restrict custom manifest uploads to a limited set of privileged administrators, regularly audit deployed add‑ins and associated service principals, and implement network‑level detection for anomalous outbound traffic from Outlook clients. Additionally, employing third‑party CASB solutions that inspect API calls and enforce least‑privilege policies can close the visibility gap. As Microsoft evaluates longer‑term remediation, firms that adopt these controls now can reduce exposure to this emerging vector and safeguard sensitive communications against silent exfiltration.

Attackers Weaponize Microsoft 365 Outlook Add-ins to Quietly Exfiltrate Email Data

Read Original Article
0

Comments

Want to join the conversation?

Loading comments...