230,941
Kaplan North America, a leading provider of educational and corporate training services, has disclosed a significant data breach that compromised the personally identifiable information (PII) of at least 230,941 individuals. The breach occurred over a three-week period in late 2025, from October 30 to November 18. Unauthorized actors gained access to Kaplan's servers and exfiltrated a trove of sensitive data, including names, Social Security numbers (SSNs), and driver's license numbers. The incident has impacted residents across at least seven U.S. states and has already triggered multiple class-action lawsuits, placing the company under intense legal and regulatory scrutiny. Victims of this breach are at a high risk of identity theft and financial fraud.
Attack Type: Data Breach Victim: Kaplan North America Timeline: October 30, 2025 – November 18, 2025 Impact: 230,941+ individuals affected Data Stolen: Names, Social Security Numbers, Driver's License Numbers
The identity of the threat actor behind the attack has not been disclosed. The method of intrusion is also unknown, but typically involves exploiting an unpatched vulnerability, a successful phishing campaign leading to credential theft, or an insecure server configuration. The exfiltrated data is highly valuable on the dark web, as it contains all the necessary elements for identity theft, loan fraud, and other malicious activities. The breach notification process has begun, with regulatory filings in states like Texas, South Carolina, Maine, and New Hampshire revealing the scale of the impact.
While specific details of the intrusion are not public, we can infer potential attack vectors based on similar incidents:
T1190 - Exploit Public-Facing Application).T1566 - Phishing).T1560.001 - Archive via Utility) before exfiltrating it over an encrypted channel to avoid detection. (T1048 - Exfiltration Over Alternative Protocol).The long dwell time of over three weeks suggests the attackers had persistent access and were able to move laterally within the network undetected to locate and steal the target data.
Detecting such breaches requires a defense-in-depth approach to monitoring.
Organizations handling large volumes of PII must implement robust security controls.
Encrypting sensitive PII like SSNs at rest makes the data unusable to attackers even if they manage to exfiltrate it.
Apply the principle of least privilege to file systems and databases to ensure only authorized users and services can access sensitive data.
Mapped D3FEND Techniques:
Isolate servers containing PII in a secure network segment to prevent lateral movement from less secure parts of the network.
Mapped D3FEND Techniques:
Maintain a robust patch management program to close vulnerabilities that could be used for initial access.
Mapped D3FEND Techniques:
The most effective mitigation to protect the confidentiality of the data stolen in the Kaplan breach would have been strong encryption at rest. Organizations handling highly sensitive PII, especially SSNs and driver's license numbers, must go beyond basic disk encryption. Implementing application-level or transparent database encryption (TDE) ensures that the data within the database files themselves is encrypted. This means that even if an attacker bypasses network and server controls to exfiltrate the raw database files, the sensitive data remains protected and unreadable without the corresponding decryption keys. These keys must be managed separately and securely, for example in a hardware security module (HSM) or a dedicated key management service (KMS). This control directly addresses the impact of data exfiltration, rendering the stolen data useless to the attackers.
To prevent attackers from reaching sensitive data stores, robust network segmentation is crucial. The servers and databases containing the PII of over 230,000 individuals should have been located in a highly restricted network zone. Access to this zone should be governed by a 'default deny' firewall policy, only permitting connections from specific, authorized application servers on designated ports. No direct access from user workstations, development environments, or the internet should be allowed. This micro-segmentation approach contains the breach, so even if an attacker compromises a user's laptop or a web server, they cannot pivot directly to the sensitive data repository. The long dwell time in the Kaplan breach suggests the attackers were able to move laterally; proper network isolation would have severely hindered or blocked this movement.
Detecting the breach as it happened requires analyzing how data is accessed. A Resource Access Pattern Analysis system, often part of a UEBA or DAM solution, would baseline the normal behavior of applications and service accounts that interact with the PII database. For example, it would learn that the student portal application typically queries one record at a time. The system would then generate a high-severity alert if a service account, or any account, suddenly performs a bulk export of all 230,000+ records. This is a massive deviation from normal behavior and a strong indicator of data theft in progress. Monitoring these access patterns provides a critical detection layer that can catch an attacker during the collection phase, before data is exfiltrated from the network.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats