The invasive Otter

Today I was in a meeting and my name showed up as Amy Otter Pilot. This was alarming to me because I was not aware of having an Otter subscription. Apparently, I had a free account because of my curiosity when I was sent a meeting recap from another person. I clicked to see what this was all about. But in today’s meeting, a person I met with was sent a meeting recap from “me”. Otter had joined a meeting that I was invited to and then emailed them that person a recap of our meeting. I was very disturbed by this event.

I don’t have an Otter app installed on my computer, nor is it a browser extension, nor is it an add-in for Outlook. So how is it doing this? OAuth.

What a great follow up to my recent blog post, How to secure your network from OAuth permissions ( As an administrator, I was left subject to OAuth installation, but you should block your users from setting up OAuth accidentally or intentionally. OAuth permissions are permanent, so they deserve careful control.

How to Remove Otter

There are two parts to removing your Otter account. Part one happens on the website and the second part happens in Defender for Cloud Apps.

Part 1: Visit, when I did, I was not asked to authenticate it simply opened into my account, the account I was not aware of setting up.

Delete your Otter account

Follow the red balls above. Click on your account and select Account Settings. Look to the bottom on the main panel to find the Delete account option. Once you click to delete your account, you are asked to authenticate. Do that and then your account will be deleted from the Otter account page.

Part 2: Unfortunately, deleting your account from Otter does not revoke its permission to your mailbox. Otter installs itself as an OAuth app in your network but does not remove itself. Below you see the permissions that it has been granted.

To block the Otter OAuth, visit and scroll down into Cloud Apps and select OAuth Apps. In the main screen, look for Otter and select Block.

How to block the Otter OAuth

Once you’ve blocked Otter, users that have the permissions assigned will get an email letting them know that Otter has been blocked.

Users receive a notice that Otter has been blocked

Recommendation: Take special care with these meeting services. There are many important issues to consider including compliance, privacy and permissions creep.

All we do is support IT professionals. Security communityMSP Legislation communityEndPoint, Defender and Lighthouse communityPeer groupscoursespapersBusiness consulting and more.

Leave a comment

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

One thought on “The invasive Otter”