University of Phoenix Data Breach Highlights Major ERP Vulnerability Risk for CISOs

Related

Pentagon CIO Kirsten Davies Announces New Team Appointments

What happened Pentagon Chief Information Officer Kirsten Davies announced several...

Carnival Corporation Probes Data Breach After Claims of 8.7 Million Records Theft

What happened Carnival Corporation is investigating a potential data breach...

Grinex Exchange Blames Western Intelligence for $13.7M Crypto Hack

What happened Kyrgyzstan-based cryptocurrency exchange Grinex suspended operations on April...

Payouts King Ransomware Uses QEMU VMs to Bypass Endpoint Security

What happened Sophos researchers have documented two active campaigns in...

Share

What happened

Phoenix Education Partners, Inc. disclosed that its subsidiary, the University of Phoenix, experienced a significant cybersecurity incident involving the Oracle E‑Business Suite (EBS) software platform. An unauthorized third party exploited a previously unknown vulnerability in Oracle EBS to access and exfiltrate data from the university’s systems. The incident occurred in August 2025 and was publicly disclosed in a recent SEC filing.

Who is affected

The breach impacted approximately 3.5 million current and former students, employees, faculty, and suppliers, with sensitive personally identifiable information (PII) exposed, including names, contact details, dates of birth, Social Security numbers, and banking information. Notification letters have been sent to affected individuals and state authorities.

Why CISOs should care

This incident underscores the ongoing risk posed by zero‑day vulnerabilities in widely deployed enterprise software such as Oracle EBS, which many organizations, including higher education institutions, rely on for core functions. The attack, attributed to the Clop ransomware group, is part of a broader campaign targeting ERP systems with unpatched flaws, highlighting persistent gaps in vulnerability management and threat detection practices.

3 practical actions for CISOs

  1. Prioritize ERP vulnerability management: Maintain an up‑to‑date inventory of mission‑critical enterprise platforms, ensure rapid patch deployment, and monitor vendor advisories for emerging threats.
  2. Enhance detection and response for data exfiltration: Deploy advanced monitoring tools to detect anomalous access or data movement across internal systems, and conduct regular threat hunting exercises focused on high‑risk infrastructure.
  3. Review incident response readiness: Validate and practice incident response plans that include legal, regulatory, and communications procedures for large‑scale breaches; ensure coordination with identity protection services for affected parties.