Kaplan Data Breach Exposes SSNs and Driver's Licenses of Over 230,000 People

Educational Firm Kaplan North America Discloses Data Breach Affecting Over 230,000 Individuals

HIGH
March 24, 2026
5m read
Data BreachRegulatory

Impact Scope

People Affected

230,941

Industries Affected

Education

Geographic Impact

United States (national)

Related Entities

Other

Kaplan North America Wolf Haldenstein Adler Freeman & Herz LLP

Full Report

Executive Summary

Kaplan North America, a leading provider of educational and corporate training services, has disclosed a significant data breach that compromised the personally identifiable information (PII) of at least 230,941 individuals. The breach occurred over a three-week period in late 2025, from October 30 to November 18. Unauthorized actors gained access to Kaplan's servers and exfiltrated a trove of sensitive data, including names, Social Security numbers (SSNs), and driver's license numbers. The incident has impacted residents across at least seven U.S. states and has already triggered multiple class-action lawsuits, placing the company under intense legal and regulatory scrutiny. Victims of this breach are at a high risk of identity theft and financial fraud.


Threat Overview

Attack Type: Data Breach Victim: Kaplan North America Timeline: October 30, 2025 – November 18, 2025 Impact: 230,941+ individuals affected Data Stolen: Names, Social Security Numbers, Driver's License Numbers

The identity of the threat actor behind the attack has not been disclosed. The method of intrusion is also unknown, but typically involves exploiting an unpatched vulnerability, a successful phishing campaign leading to credential theft, or an insecure server configuration. The exfiltrated data is highly valuable on the dark web, as it contains all the necessary elements for identity theft, loan fraud, and other malicious activities. The breach notification process has begun, with regulatory filings in states like Texas, South Carolina, Maine, and New Hampshire revealing the scale of the impact.

Technical Analysis

While specific details of the intrusion are not public, we can infer potential attack vectors based on similar incidents:

  1. Vulnerability Exploitation: The attackers may have exploited a known or zero-day vulnerability in one of Kaplan's internet-facing systems (e.g., web servers, VPNs, remote desktop services) to gain initial access. (T1190 - Exploit Public-Facing Application).
  2. Credential Theft: A successful phishing campaign targeting Kaplan employees could have yielded credentials that provided access to the internal network and the servers containing the sensitive PII. (T1566 - Phishing).
  3. Data Staging and Exfiltration: Once inside the network, the attackers would have located the databases or file servers storing the PII. They likely aggregated this data into archives (T1560.001 - Archive via Utility) before exfiltrating it over an encrypted channel to avoid detection. (T1048 - Exfiltration Over Alternative Protocol).

The long dwell time of over three weeks suggests the attackers had persistent access and were able to move laterally within the network undetected to locate and steal the target data.

Impact Assessment

  • For Individuals: The 230,000+ affected individuals face a significant and long-term risk of identity theft. With their names, SSNs, and driver's license numbers, criminals can open new lines of credit, file fraudulent tax returns, and commit other forms of fraud. This necessitates credit monitoring and identity theft protection services for all victims.
  • For Kaplan: The company faces severe consequences, including:
    • Financial Costs: Significant expenses related to incident response, forensic investigation, credit monitoring services for victims, and potential regulatory fines.
    • Legal Liability: Multiple class-action lawsuits have already been filed, which could result in substantial legal fees and settlement costs.
    • Reputational Damage: The breach erodes trust among students, corporate clients, and the public, potentially impacting future business.
    • Regulatory Scrutiny: Kaplan will be subject to investigations by state attorneys general and potentially federal regulators.

Detection & Response

Detecting such breaches requires a defense-in-depth approach to monitoring.

  1. File Integrity Monitoring (FIM): Deploy FIM on servers storing sensitive PII. This would alert security teams to unauthorized access or modification of critical data files.
  2. Database Activity Monitoring (DAM): Use DAM tools to monitor for unusual queries, such as a single user account exporting a large number of records from a customer database.
  3. Egress Traffic Analysis: Monitor all outbound network traffic for large data transfers, especially to unknown or suspicious destinations. Data Loss Prevention (DLP) solutions can inspect traffic for patterns matching sensitive data like SSNs.
  4. Log Analysis: Correlate logs from various sources (servers, firewalls, authentication systems) in a SIEM to detect the stages of an attack, from initial access to lateral movement and exfiltration.

Mitigation

Organizations handling large volumes of PII must implement robust security controls.

  1. Data Encryption: All sensitive data, such as SSNs and driver's license numbers, must be encrypted both at rest (in databases and file systems) and in transit (over the network). This is a fundamental control that can render stolen data useless.
  2. Access Control: Implement the principle of least privilege. Employees should only have access to the data absolutely necessary for their job functions. Access to servers containing mass PII should be tightly restricted and monitored.
  3. Vulnerability and Patch Management: Maintain a rigorous patch management program to ensure all systems, especially those facing the internet, are promptly updated to fix known vulnerabilities.
  4. Network Segmentation: Segment the network to isolate servers containing sensitive data. This makes it more difficult for an attacker who gains a foothold in one part of the network to move laterally and access critical data stores.
  5. Security Awareness Training: Regularly train employees to recognize and report phishing attempts, which remain a primary initial access vector for data breaches.

Timeline of Events

1
October 30, 2025
Unauthorized actors first gain access to Kaplan's network.
2
November 18, 2025
The period of unauthorized access to Kaplan's network ends.
3
March 24, 2026
Kaplan's data breach and the number of affected individuals are publicly reported, and law firms announce investigations.
4
March 24, 2026
This article was published

MITRE ATT&CK Mitigations

Encrypting sensitive PII like SSNs at rest makes the data unusable to attackers even if they manage to exfiltrate it.

Mapped D3FEND Techniques:

Apply the principle of least privilege to file systems and databases to ensure only authorized users and services can access sensitive data.

Mapped D3FEND Techniques:

Isolate servers containing PII in a secure network segment to prevent lateral movement from less secure parts of the network.

Mapped D3FEND Techniques:

Maintain a robust patch management program to close vulnerabilities that could be used for initial access.

Mapped D3FEND Techniques:

D3FEND Defensive Countermeasures

The most effective mitigation to protect the confidentiality of the data stolen in the Kaplan breach would have been strong encryption at rest. Organizations handling highly sensitive PII, especially SSNs and driver's license numbers, must go beyond basic disk encryption. Implementing application-level or transparent database encryption (TDE) ensures that the data within the database files themselves is encrypted. This means that even if an attacker bypasses network and server controls to exfiltrate the raw database files, the sensitive data remains protected and unreadable without the corresponding decryption keys. These keys must be managed separately and securely, for example in a hardware security module (HSM) or a dedicated key management service (KMS). This control directly addresses the impact of data exfiltration, rendering the stolen data useless to the attackers.

To prevent attackers from reaching sensitive data stores, robust network segmentation is crucial. The servers and databases containing the PII of over 230,000 individuals should have been located in a highly restricted network zone. Access to this zone should be governed by a 'default deny' firewall policy, only permitting connections from specific, authorized application servers on designated ports. No direct access from user workstations, development environments, or the internet should be allowed. This micro-segmentation approach contains the breach, so even if an attacker compromises a user's laptop or a web server, they cannot pivot directly to the sensitive data repository. The long dwell time in the Kaplan breach suggests the attackers were able to move laterally; proper network isolation would have severely hindered or blocked this movement.

Detecting the breach as it happened requires analyzing how data is accessed. A Resource Access Pattern Analysis system, often part of a UEBA or DAM solution, would baseline the normal behavior of applications and service accounts that interact with the PII database. For example, it would learn that the student portal application typically queries one record at a time. The system would then generate a high-severity alert if a service account, or any account, suddenly performs a bulk export of all 230,000+ records. This is a massive deviation from normal behavior and a strong indicator of data theft in progress. Monitoring these access patterns provides a critical detection layer that can catch an attacker during the collection phase, before data is exfiltrated from the network.

Sources & References

Toll of Kaplan data breach surpasses 230K | brief
SC Magazine (scmagazine.com) March 24, 2026
Kaplan North America Data Breach Alert Issued By Wolf Haldenstein
Morningstar (morningstar.com) March 24, 2026

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

Data BreachKaplanPIISSNIdentity TheftClass ActionEducation

📢 Share This Article

Help others stay informed about cybersecurity threats