Squeaky Flotilla

6 object(s)
 

Plala

ACTIVE CAMPAIGN

Plala, a major Japanese Internet service provider, is currently the target of an extensive phishing campaign. The phishing sites typically serve a fraudulent Plala login portal to the prospective victim, prompting them to enter a username and password:

Indicators of Phishing

The structure of nearly every Plala phishing page is almost identical, despite them spanning over a range of disparate domains.

The following are common attributes between all the pages:

Mapping Out the Campaign

The phishing campaign appears to rely on both compromising vulnerable websites and purchasing domains as a means of facilitating the campaign’s infrastructure.

To determine the extent of the campaign, we used PhishTank’s (PT) regularly-updated list of submitted phishing domains. Scanning purely for domains with the keyword “plala”, we can observe the following list of malicious/compromised domains:

with the earliest recorded instance of a campaign domain appearing in the PT database on June 6th of 2025.

If we expand our definition of a campaign site to include the frequently used /Sites/index.html filepath, we see an even greater list of malicious/compromised domains:

Here, the earliest known Plala campaign domain appears in the PT database on May 21st of 2025.

Still yet, domains such as

target Plala employees without adhering to either of the previously mentioned patterns.

On 8/31/25 and 9/1/25 alone, nearly a dozen new Plala domains were submitted to the PT database:

Plala campaign sites continue to roll out on a regular basis; employees likely face exhaustion from having to constantly check where they are logging in, and the likelihood of a succesful attack grows with every new compromised website or registered domain. This page will continue to be updated with new links. If you encounter a Plala campaign phishing page that is not present here, please contact us at cybersecurenotif@proton.me.