Kaplan, the test preparation and educational services company owned by Graham Holdings, confirmed in filings with state regulators that a breach affecting 1.4 million people exposed Social Security numbers and driver's license numbers, making it one of the largest educational sector data exposures of the past year. The breach, which Kaplan reported to Oregon regulators on , expanded from an earlier estimate of 230,000 affected individuals, meaning the disclosed scope grew by roughly six times between initial filings and the updated count. Hackers had access to Kaplan's servers for 19 days between and , before the company detected and terminated the intrusion. The public disclosure came more than four months after the breach was contained.

The incident places Kaplan in the company of other organizations wrestling with the tension between legal notification timelines and the logistical reality of forensic investigations that take months to characterize the full scope of what was taken. For the 1.4 million people whose most sensitive identity documents were sitting in files that an unauthorized third party accessed for nearly three weeks, the gap between October 2025 and the notifications arriving in March 2026 represents a period of unacknowledged exposure.

What Was Taken and Who Was Affected

According to Kaplan's regulatory filings, the files accessed by the unauthorized third party contained three categories of information: full names, Social Security numbers, and driver's license numbers. This combination represents the core identity theft toolkit. Names and Social Security numbers together are sufficient to file fraudulent tax returns, open new credit accounts, apply for government benefits, and commit medical identity fraud. Driver's license numbers add a second government-issued identifier that is used in identity verification processes across financial services, employment, and healthcare contexts.

The geographic breakdown of confirmed affected individuals reveals the national scope of the breach. State-level regulatory filings, which require companies to report the number of state residents affected, have confirmed specific counts: 19,075 residents in Maine, approximately 26,600 in South Carolina, 173,676 in Texas, and more than 11,600 in New Hampshire. These state-specific numbers represent the subset of the 1.4 million total for whom state-by-state filings have been completed or reported. The full geographic distribution spans Kaplan's national footprint as a company with operations across all 50 states.

Kaplan has stated that it is "in the process of sending notice to all individuals whose information was potentially contained in the involved files." That process, which involves mailing breach notification letters to each affected person and in some states placing newspaper advertisements when addresses are unavailable, is the legal mechanism through which individuals learn that their data was compromised. For many of the 1.4 million affected people, these letters may be their first notification that their Social Security number was accessible to an unauthorized actor for 19 days in fall 2025.

The 19-Day Access Window: How Long Is Long Enough?

The 19-day period during which hackers had access to Kaplan's servers, from to , is a particularly consequential detail in the breach timeline. In the context of how data breaches unfold technically, 19 days is an extended dwell time that almost certainly allowed the attackers to comprehensively survey and copy whatever files they were targeting.

Modern breach forensics distinguish between the initial compromise (when an attacker first gains access), lateral movement (when the attacker moves through a network to locate valuable data), data staging (when files are copied to a location for eventual exfiltration), and exfiltration (when data actually leaves the network). With 19 days of access, a methodical attacker would have had time to complete all of those phases without the time pressure that limits the damage in breaches detected quickly. They could have identified exactly which file stores contained Social Security numbers, copied those files, verified the copy was complete, and exfiltrated the data well before Kaplan's security team detected the intrusion on November 18.

The 19-day dwell time also raises a question about detection capability that Kaplan has not publicly addressed: how was the intrusion discovered on November 18, and what triggered the detection? Understanding the detection mechanism is relevant not just for Kaplan but for the broader question of whether similar access patterns were present in other Kaplan systems that were not ultimately found to contain sensitive data, and whether the attacker had achieved persistence in any form that survived the initial containment.

The Four-Month Disclosure Gap

The breach was contained in November 2025. Public disclosures were filed with state regulators beginning in early 2026, with the updated 1.4 million figure reaching Oregon regulators on . The gap between breach containment and public notification is more than four months.

State breach notification laws across the United States specify timelines for notifying affected individuals, ranging from 30 days (California, Florida) to 60 days (many other states) to 90 days (a smaller number of states), with some states using a more flexible "expedient" or "reasonable" standard. The critical legal question for Kaplan is not when it completed the forensic investigation but when it had sufficient information to determine that a breach of personal data had occurred and who was likely affected. Most state laws start the notification clock at that determination, not at the completion of a comprehensive investigation that characterizes every affected individual.

For a breach detected on November 18, 2025, state 30-day notification requirements would have required individual notification by mid-December 2025 in California and Florida. 60-day requirements would have required notification by mid-January 2026 in many other states. The Texas count of 173,676 affected residents is particularly notable given that Texas has a 30-day notification requirement for breaches involving Social Security numbers. Whether the notifications that Kaplan sent to Texas residents arrived within 30 days of the company's determination that their data was affected is a question that the Texas Attorney General's office is positioned to examine.

"It was determined that an unauthorized third party accessed certain information contained within our network. We are in the process of sending notice to all individuals whose information was potentially contained in the involved files."

Kaplan, official breach notification statement

The gap between breach containment and public disclosure is not unique to Kaplan. It reflects a structural tension in breach response: companies want to complete forensic investigations before disclosing, both to provide accurate information and to avoid triggering notification obligations before they understand what they are notifying about. Regulators and plaintiffs' attorneys argue that this calculus improperly prioritizes corporate interests over the interests of affected individuals who need timely notice to take protective action. That argument has more force when the data involved is Social Security numbers, where the protective window matters: a Social Security number placed on a credit freeze cannot be used to open fraudulent accounts, but only if the freeze is in place before the fraudulent application is submitted.

The Expansion From 230,000 to 1.4 Million

One of the most legally significant aspects of the Kaplan breach is the revision of the affected population count from an initial figure of approximately 230,000 people to the updated figure of 1.4 million. That six-fold expansion requires an explanation, and neither Kaplan's public statements nor its regulatory filings have provided one in detail.

Breaches are often initially assessed conservatively, based on the most readily identifiable affected data. A forensic team entering a compromised environment will first characterize the most clearly accessed systems and files, and the initial count reflects what can be confirmed quickly. Subsequent investigation frequently reveals that the breach scope extends further than the initial assessment, either because the attacker accessed systems that were not immediately obvious or because the same files turned out to contain more records than initially known.

In Kaplan's case, the expansion from 230,000 to 1.4 million is large enough that it suggests either a significant undercount in the initial assessment or a substantial delay in analyzing the full scope of the compromised files. If Kaplan filed state notifications with the 230,000 figure and then determined that 1.4 million people were affected, it may have re-triggered notification obligations under state laws that require updated notices when the known scope of a breach expands. The Oregon filing on March 24 that established the 1.4 million figure appears to be such an update, but whether all required state notifications have been updated to reflect the full scope is a compliance question that the state-by-state disclosure process is slowly making public.

State Confirmed Affected Residents Notification Timeline
Texas 173,676 30-day requirement (SSNs)
South Carolina ~26,600 90-day requirement
Maine 19,075 30-day requirement
New Hampshire 11,600+ 30-day requirement
All states (total) 1,400,000 Notifications in progress
State-level breakdown of confirmed Kaplan breach victims from regulatory filings as of March 2026, with applicable state notification timeline requirements.

No Hacking Group Has Claimed Credit

A notable aspect of the Kaplan breach that distinguishes it from some other high-profile incidents is that no hacking group has publicly claimed responsibility. This absence of a named threat actor has two practical consequences: it makes attribution analysis more difficult for cybersecurity researchers trying to understand whether this was a financially motivated criminal operation, a state-sponsored espionage campaign, or something else, and it removes the public pressure dynamic that sometimes leads to faster disclosures when known ransomware groups publicize their operations on leak sites.

Ransomware groups and data theft actors that operate leak sites create a different disclosure dynamic from "silent" breaches. When a group like ALPHV or LockBit lists a victim on its leak site, journalists, security researchers, and the public become aware of the breach independently of the victim organization's disclosure. The victimized company faces pressure to confirm and disclose faster than it might otherwise choose to. In Kaplan's case, the absence of any such external pressure may have contributed to the longer timeline between containment and public notification.

The motivation for the Kaplan breach, given the data that was taken (names, Social Security numbers, driver's license numbers), is consistent with either financial fraud (selling the data for identity theft purposes), ransomware (using data as leverage for a payment demand), or potentially academic fraud (accessing test preparation company records for competitive intelligence or student data). However, Kaplan's breach disclosures have not reported any ransom demand, suggesting the attackers may have been primarily focused on data acquisition rather than extortion, or that any ransom negotiation was handled privately.

Legal Exposure: Class Actions and Regulatory Scrutiny

Multiple law firms have announced investigations into the Kaplan breach with the apparent intention of pursuing class action litigation on behalf of affected individuals. Class action data breach cases in the United States follow a well-established template: law firms aggregate plaintiffs from the affected population, allege that the defendant organization failed to implement adequate security measures, and seek damages for the harm caused by the exposure of sensitive personal data.

Courts have reached different conclusions about what constitutes cognizable harm in data breach cases, with some jurisdictions requiring evidence of actual fraud or misuse before allowing claims to proceed and others accepting the elevated risk of future harm as sufficient standing. The nature of the data in the Kaplan breach (Social Security numbers and driver's license numbers, both of which are used in identity verification and both of which are valuable on underground markets) strengthens plaintiffs' arguments that the exposure created meaningful elevated risk, regardless of whether fraud has yet occurred.

Regulatory scrutiny is also building. Jonathan Greig at The Record from Recorded Future News, which broke the story of the updated 1.4 million figure, noted that state attorneys general offices in Texas, California, and other states with large affected populations are positioned to review whether Kaplan's notification timeline complied with applicable state requirements. The FTC also has authority to investigate the adequacy of Kaplan's data security practices under Section 5 of the FTC Act, which prohibits unfair or deceptive acts or practices in commerce, including inadequate data security.

Graham Holdings, Kaplan's parent company, reported $4.9 billion in annual revenue in its most recent disclosure. The financial exposure from class action settlements and regulatory penalties is therefore calibrated against a parent company with significant resources, which in practice means that plaintiffs and regulators will have a meaningful defendant to pursue. In some respects, the most consequential outcome of the Kaplan breach may not be the litigation itself but the precedent it sets for how courts and regulators assess four-month notification delays in future cases involving sensitive government identifiers.

The Kaplan breach joins the CareCloud healthcare data breach in illustrating the ongoing difficulty organizations face in managing both the technical reality of breach investigation timelines and the legal obligations that state and federal law impose on disclosure. For the 1.4 million people whose Social Security numbers were in Kaplan's compromised files, the question of whether the notification they receive arrives in time to take meaningful protective action is the most immediate and practical measure of whether the system is working as it is supposed to.

Frequently Asked Questions

What data was exposed in the Kaplan breach?

The files accessed during the breach contained full names, Social Security numbers, and driver's license numbers. These three categories combined represent the core identity theft toolkit used for fraud, new account openings, fraudulent tax filings, and medical identity theft.

How do I know if I was affected by the Kaplan data breach?

Kaplan states it is sending breach notification letters to all affected individuals. Anyone who has used Kaplan's test preparation services, worked for a company that contracted with Kaplan for employee training, or interacted with Kaplan's educational programs may potentially have been included in the affected files. Individuals who receive a notification letter should follow the remediation steps described in that letter, which typically include credit monitoring enrollment and potentially placing a credit freeze with the three major credit bureaus.

Why did it take four months for Kaplan to notify affected people?

Kaplan has not provided a detailed public explanation for the notification timeline. The company states it needed to complete a forensic investigation to determine which files were accessed and who was affected before sending notifications. State breach notification laws impose specific timelines that begin when a company determines a breach has occurred, and whether Kaplan complied with those timelines is a question that state regulators and class action attorneys are examining.

Why did the breach count expand from 230,000 to 1.4 million?

Kaplan has not explained the expansion in detail. Initial breach assessments often undercount affected individuals as forensic investigators work through the scope of what was accessed. The six-fold expansion suggests either a significant initial undercount or a delay in analyzing the full set of compromised files. State regulators who received the initial 230,000 figure have since received updated filings reflecting the 1.4 million total.

Can I sue Kaplan over the data breach?

Multiple law firms have announced class action investigations targeting Kaplan over the breach. Individuals affected by the breach may be eligible to join such class actions. Data breach litigation outcomes depend on the specific facts, the jurisdiction, and courts' evolving standards for what constitutes sufficient harm from data exposure. Anyone who has received a Kaplan breach notification letter may want to consult the law firm announcements to understand their options.

Sources

  1. Kaplan data breach expands to 1.4 million people — The Record from Recorded Future News
  2. Maine Data Breach Notifications — Maine Attorney General
  3. South Carolina Data Breach Notifications — SC Attorney General
  4. FTC Data Security Requirements for Businesses — Federal Trade Commission