University of Phoenix Data Breach Exposes Personal Information of ~3.5M Individuals

Related

ApolloMD Data Breach Impacts More Than 620,000

What happened A cyberattack on the Georgia-based healthcare provider ApolloMD...

Atlas Air Ransomware Breach Allegedly Exposes Boeing Technical Data

What happened Attackers claiming affiliation with the Everest ransomware gang...

Threat Actors Leveraging Employee Monitoring and SimpleHelp Tools in Attacks

What happened Security researchers have documented threat actors abusing legitimate...

Palo Alto Networks Firewall Reboot Loop Flaw Affects Next-Generation Devices

What happened A software flaw in Palo Alto Networks next-generation...

Promptware Leveraged Google Calendar Invites in Credential Harvesting Campaign

What happened Security researchers from ReversingLabs have uncovered a malicious...

Share

What happened

The University of Phoenix (UoPX) disclosed that a ransomware-linked cyberattack resulted in the theft of data belonging to approximately 3.49 million students, staff, faculty, and suppliers. The breach stemmed from threat actors exploiting a zero-day vulnerability in Oracle E-Business Suite (EBS) financial software used by the university. The breach was detected on November 21, 2025 after the Clop ransomware group added UoPX to its data leak site, and the incident was subsequently reported in an 8-K filing with the U.S. Securities and Exchange Commission. Exposed information includes names, contact details, dates of birth, Social Security numbers, and bank account and routing numbers. 

Who is affected

Nearly 3.5 million current and former University of Phoenix students, employees, faculty, and third-party suppliers are impacted by the breach. The sensitive nature of the compromised data (particularly Social Security numbers and financial details) amplifies the potential for identity theft and financial fraud. 

Why CISOs should care

This incident underscores persistent risks associated with widely deployed enterprise software and the potential for zero-day vulnerabilities to facilitate large-scale data exfiltration. The attack is part of a broader trend of threat actors targeting enterprise platforms (such as Oracle EBS) across sectors, including higher education and industry, highlighting supply chain and third-party risks. The involvement of a known ransomware group like Clop also illustrates how extortion-oriented operations are increasingly leveraging software flaws to amplify their impact.

3 Practical actions

  1. Prioritize vulnerability management and patching: Implement accelerated patch cycles and monitoring for critical enterprise applications, with particular focus on zero-day exposures and vendor alerts.
  2. Enhance third-party risk assessment: Regularly evaluate and test security controls for third-party software and services handling sensitive data, and verify contractual security requirements and attestations.
  3. Deploy comprehensive incident response planning: Validate and rehearse incident response and communications plans that include breach detection, containment, legal/regulatory notifications, and victim support services such as credit monitoring.