Kaplan Data Breach Exposed SSNs and Driver's Licenses of Over 200,000 Individuals

Kaplan North America Concludes Breach Investigation, Confirms Theft of SSNs and Driver's Licenses

HIGH
February 21, 2026
4m read
Data BreachRegulatory

Impact Scope

People Affected

Over 219,000 (based on filings in TX, SC, ME)

Affected Companies

Kaplan North America, LLC

Industries Affected

Education

Geographic Impact

United States (national)

Related Entities

Full Report

Executive Summary

Kaplan North America, LLC, a major provider of educational services, has completed its investigation into a significant data breach that occurred in late 2025. The company confirmed on February 21, 2026, that an unauthorized actor had accessed its servers and exfiltrated files containing sensitive Personally Identifiable Information (PII). The stolen data includes names, Social Security numbers (SSNs), and driver's license numbers. While the full number of victims is not yet public, state-level disclosures indicate a massive scale, with over 200,000 individuals confirmed affected in just three states (Texas, South Carolina, and Maine). The company is now in the process of notifying victims and is facing potential class-action lawsuits.


Threat Overview

The security incident occurred over a three-week period, from October 30, 2025, to November 18, 2025. During this window, an unauthorized third party gained access to Kaplan's computer servers. The initial access vector has not been disclosed. The attackers were able to navigate the network and exfiltrate specific files containing highly sensitive PII of what are likely current and former students or employees.

The compromised data includes a toxic combination of information highly sought after for identity theft:

  • Full Names
  • Social Security Numbers
  • Driver's License Numbers

Kaplan engaged external IT security specialists to secure its network and investigate the scope of the breach. The investigation concluded on February 21, 2026, and the company began sending notification letters to victims on March 17, 2026, offering one year of complimentary identity protection services through Experian.

Technical Analysis

This incident appears to be a classic 'smash and grab' data theft operation. The likely TTPs involved would be:

  • Initial Access: Could have been achieved through an unpatched vulnerability in an external server (T1190 - Exploit Public-Facing Application) or a successful phishing campaign against an employee (T1566 - Phishing).
  • Discovery: Once on the network, the attacker would have searched for file shares and servers known to store sensitive data (T1083 - File and Directory Discovery). They likely looked for files with names indicating student records or HR information.
  • Collection: The attacker staged the target files in a temporary directory before exfiltration (T1074 - Data Staged).
  • Exfiltration: The attacker then exfiltrated the collected files to an external server, likely compressing and encrypting them to avoid detection (T1048 - Exfiltration Over Alternative Protocol). The extended three-week dwell time gave the attacker ample opportunity to locate and steal data.

Impact Assessment

  • Severe Risk of Identity Theft: The stolen data (Name, SSN, Driver's License) is a complete kit for committing identity fraud. Victims are at a high, long-term risk of having fraudulent accounts opened in their names.
  • Significant Legal and Financial Liability: Kaplan is facing multiple class-action lawsuit investigations. The company will also incur substantial costs for forensic investigation, legal fees, notification, and providing identity protection services.
  • Regulatory Fines: The breach will be subject to investigation by state attorneys general and potentially federal regulators, which could result in significant fines.
  • Reputational Damage: The breach damages Kaplan's reputation and the trust of its students and partners.

Detection & Response

The lengthy dwell time suggests potential gaps in detection capabilities. Organizations should focus on:

  1. File Integrity Monitoring (FIM): Deploy FIM on critical file servers to alert on unusual access patterns to sensitive files, especially by service accounts or from unexpected sources.
  2. Data Loss Prevention (DLP): Implement endpoint and network DLP solutions to detect and block the unauthorized movement or exfiltration of files containing sensitive data patterns like SSNs.
  3. Behavioral Analytics: Use UEBA to detect anomalous user or system behavior, such as an account accessing a large number of files it doesn't normally interact with, or large data transfers occurring outside of business hours.

Mitigation

  1. Data Minimization and Governance: The most effective mitigation is to not store sensitive data if it is not absolutely necessary. Organizations should implement data governance policies to identify where sensitive data (like SSNs) is stored, justify its business need, and securely delete it when it is no longer required.
  2. Encryption and Access Control: All files containing sensitive PII must be encrypted at rest. Access to these files should be strictly controlled based on the principle of least privilege, and all access should be logged and audited.
  3. Network Segmentation: Segment the network to prevent attackers who gain an initial foothold from easily moving laterally to access sensitive file servers. Critical data repositories should be in a highly restricted network zone.

Timeline of Events

1
October 30, 2025
Unauthorized access to Kaplan's servers begins.
2
November 18, 2025
Unauthorized access to Kaplan's servers ends.
3
February 21, 2026
Kaplan's internal investigation into the breach concludes.
4
February 21, 2026
This article was published
5
March 17, 2026
Kaplan begins mailing notification letters to affected individuals.

MITRE ATT&CK Mitigations

Encrypt files containing sensitive PII at rest to make them unreadable even if they are stolen.

Mapped D3FEND Techniques:

Apply the principle of least privilege to file shares, ensuring only authorized personnel can access folders containing SSNs and other PII.

Mapped D3FEND Techniques:

Audit

M1047enterprise

Implement file integrity monitoring and logging on critical file servers to detect and alert on unauthorized access to sensitive data.

Mapped D3FEND Techniques:

D3FEND Defensive Countermeasures

To detect and prevent a large-scale data theft like the one at Kaplan, implementing User Data Transfer Analysis through a Data Loss Prevention (DLP) solution is critical. A network and endpoint DLP system should be configured with policies to identify sensitive data patterns, such as Social Security numbers and driver's license numbers. The system would then monitor for this data in motion. For example, if an attacker tries to exfiltrate a large file containing thousands of SSNs over an outbound channel like HTTPS or FTP, the DLP system would detect the pattern, block the transfer, and generate a high-priority alert for the security team. This acts as a last line of defense, preventing the data from leaving the network even if the attacker has already gained access to the file server.

A foundational preventative control for Kaplan is the rigorous application of Local File Permissions based on the principle of least privilege. Sensitive data, especially files containing SSNs, should not be stored in broadly accessible network shares. This data should be moved to a secure, access-controlled repository or file server. Access Control Lists (ACLs) on these files and directories must be configured to allow access only to a small, explicitly defined group of users (e.g., specific HR or finance personnel) who have a legitimate business need. All other access, including from general user accounts and service accounts, should be denied. Regularly auditing these permissions ensures that 'privilege creep' does not occur. This simple but effective measure dramatically reduces the attack surface, as a compromise of a standard employee account would not grant access to the organization's most sensitive data.

Sources & References

Kaplan Data Breach: Lawsuit Investigation
ClassAction.org (classaction.org) March 18, 2026

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

KaplanData BreachPIISSNIdentity TheftEducation

📢 Share This Article

Help others stay informed about cybersecurity threats