Company Details
apollo-group
10,273
40,632
6113
apollo.edu
0
APO_1149070
In-progress


Apollo Education Group Company CyberSecurity Posture
apollo.eduApollo Education Group, Inc. was founded in 1973 in response to a gradual shift in higher education demographics from a student population dominated by youth to one in which approximately half the students are adults and over 80 percent of whom work full-time. Apollo's founder, John Sperling, believed -- and events proved him right -- that lifelong employment with a single employer would be replaced by lifelong learning and employment with a variety of employers. Lifelong learning requires an institution dedicated solely to the education of working adults. Today, Apollo Education Group, Inc., through its subsidiaries, the University of Phoenix, the College for Financial Planning, and Western International University, has established itself as a leading provider of higher education programs for working adults by focusing on servicing the needs of the working adult. Apollo Education Group is an Equal Opportunity Employer and welcomes diversity.
Company Details
apollo-group
10,273
40,632
6113
apollo.edu
0
APO_1149070
In-progress
Between 650 and 699

AEG Global Score (TPRM)XXXX

Description: What's Going On? Attorneys need to hear from people affected by the University of Phoenix data breach as they investigate whether a class action lawsuit can be filed. What You Can Do If you believe your information may have been compromised in the University of Phoenix data breach, fill out the form on this page to learn more about the investigation and how you can help. Does This Cost Anything? It costs nothing to get in touch or to talk to someone about your rights.
Description: The University of Phoenix (UoPX) has joined a growing list of U.S. universities breached in a Clop data theft campaign targeting vulnerable Oracle E-Business Suite instances in August 2025. Founded in 1976 and headquartered in Phoenix, Arizona, UoPX is a private for-profit university with nearly 3,000 academic staff and over 100,000 enrolled students. The university disclosed the data breach on its official website on Tuesday, while its parent company, Phoenix Education Partners, filed an 8-K form with the U.S. Securities and Exchange Commission (SEC). UoPX said it detected the incident on November 21 (after the extortion group added it to its data leak site) and noted that the attackers exploited a zero-day vulnerability in the Oracle E-Business Suite (EBS) financial application to steal a wide range of sensitive personal and financial information belonging to students, staff, and suppliers. "We believe that the unauthorized third-party obtained certain personal information, including names and contact information, dates of birth, social security numbers, and bank account and routing numbers with respect to numerous current and former students, employees, faculty and suppliers was accessed without authorization," the school said. "We continue to review the impacted data and will provide the required notifications to affected individuals and regulatory entities. Affected individuals will soon receive a letter via US Mail outlining the details of the incident and next ste
Description: Clop Ransomware Gang Steals Data of 3.5 Million from University of Phoenix The Clop ransomware gang has stolen the personal and financial data of nearly 3.5 million individuals including current and former students, staff, and suppliers after breaching the University of Phoenix (UoPX) network in August 2025. The attack was part of a broader extortion campaign exploiting a zero-day vulnerability (CVE-2025-61882) in Oracle E-Business Suite (EBS), a financial application used by the university. UoPX, a private for-profit institution based in Phoenix, Arizona, detected the breach on November 21 after Clop listed the university on its data leak site. The stolen data includes names, contact details, dates of birth, Social Security numbers, and bank account information. In early December, the university publicly disclosed the incident and filed an 8-K report with the U.S. Securities and Exchange Commission (SEC). On Monday, UoPX confirmed in notification letters filed with Maine’s Attorney General that 3,489,274 individuals were affected. The university is offering free identity protection services, including credit monitoring, dark web surveillance, and a $1 million fraud reimbursement policy. While UoPX has not officially attributed the attack, the tactics align with Clop’s recent campaign targeting Oracle EBS vulnerabilities. Other U.S. universities, including Harvard and the University of Pennsylvania, have also reported similar breaches linked to the same exploit. Clop has a history of high-profile data theft operations, previously targeting GoAnywhere MFT, Accellion FTA, MOVEit Transfer, Cleo, and Gladinet CentreStack. The U.S. Department of State has offered a $10 million reward for information connecting the gang’s activities to a foreign government. In a separate wave of attacks since late October, multiple universities including Harvard, Princeton, and the University of Pennsylvania have also fallen victim to voice phishing (vishing) attacks, compromising systems tied to development and alumni activities.


No incidents recorded for Apollo Education Group in 2026.
No incidents recorded for Apollo Education Group in 2026.
No incidents recorded for Apollo Education Group in 2026.
AEG cyber incidents detection timeline including parent company and subsidiaries

Apollo Education Group, Inc. was founded in 1973 in response to a gradual shift in higher education demographics from a student population dominated by youth to one in which approximately half the students are adults and over 80 percent of whom work full-time. Apollo's founder, John Sperling, believed -- and events proved him right -- that lifelong employment with a single employer would be replaced by lifelong learning and employment with a variety of employers. Lifelong learning requires an institution dedicated solely to the education of working adults. Today, Apollo Education Group, Inc., through its subsidiaries, the University of Phoenix, the College for Financial Planning, and Western International University, has established itself as a leading provider of higher education programs for working adults by focusing on servicing the needs of the working adult. Apollo Education Group is an Equal Opportunity Employer and welcomes diversity.


Carolina’s vibrant people and programs attest to the University’s long-standing place among leaders in higher education since it was chartered in 1789 and opened its doors for students in 1795 as the nation’s first public university. Situated in the beautiful college town of Chapel Hill, N.C., UNC h

With more than 34,000 students and 7,000 faculty and staff, North Carolina State University is a comprehensive university known for its leadership in education and research, and globally recognized for its science, technology, engineering and mathematics leadership. NC State students, faculty and

No other university does as much for so many as the University of California. For almost 150 years, the University of California has educated the brightest minds and helped California become a beacon of innovation. Our campuses routinely are ranked among the best in the world. But our reach extends

Indiana University Bloomington is the flagship residential, research-intensive campus of Indiana University. Its academic excellence is grounded in the humanities, arts and sciences, and a range of highly ranked professional programs. Founded in 1820, the campus serves more than 42,000 undergradua

As the largest university in one of the nation’s most iconic cities, Temple educates diverse future leaders from across Philadelphia, the country and the world who share a common drive to learn, prepare for their careers and make a real impact. Founded as a night school by Russell Conwell in 1884, T

The Georgia Institute of Technology is one of the nation's premier research universities providing a focused, technologically based education to more than 25,000 undergraduate and graduate students . Ranked seventh among U.S. News & World Report's top public universities, Georgia Tech offers degrees

Known for its innovative and interdisciplinary approach to education at both the graduate and undergraduate levels, the University of Alabama at Birmingham, a part of the University of Alabama System, is an internationally renowned research university and academic medical center with over $700 milli

The California State University is the largest system of four-year higher education in the country, with 22 campuses, 56,000 faculty and staff and more than 450,000 students. Created in 1960, the mission of the CSU is to provide high-quality, affordable education to meet the ever-changing needs of

LSU is the flagship institution of Louisiana and is one of only 30 universities nationwide holding land-grant, sea-grant and space-grant status. Since 1860, LSU has served its region, the nation, and the world through extensive, multipurpose programs encompassing instruction, research, and public
.png)
The Shadowy Exploitation of Oracle Flaws: Inside the University of Phoenix Cyber Intrusion. In the ever-evolving realm of cybersecurity...
If you were affected by the University Of Phoenix data breach, you may be entitled to compensation.
New York, NY – October 9, 2025 – Phoenix Education Partners Inc. (NYSE: PXED), the parent company of the University of Phoenix,...
Phoenix Education Partners shares jumped 18.8% in their New York Stock Exchange debut on Thursday, valuing the University of Phoenix owner...
The owner of the University of Phoenix is targeting a valuation of up to $1.17 billion in its U.S. initial public offering,...
Apollo Micro Systems Limited (AMSL) has signed MoUs with Sibersentinel Technologies Limited and Zoom Technologies (India) Private Limited to...
Online learning provider Phoenix Education Partners on Friday filed for an initial public offering in the United States, as the IPO market...
Dallas-based Apollo Information Systems has publicly launched iCOUNTER, a cyber security risk intelligence company backed by a $30 million Series A funding...
PRNewswire/ -- Apollo Information Systems Corp. (Apollo), a leader in cybersecurity solutions for SLED, SMB, and enterprise customers,...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Apollo Education Group is http://www.apollo.edu.
According to Rankiteo, Apollo Education Group’s AI-generated cybersecurity score is 660, reflecting their Weak security posture.
According to Rankiteo, Apollo Education Group currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Apollo Education Group has been affected by a supply chain cyber incident involving Oracle, with the incident ID PRIORAUNI1766419165.
According to Rankiteo, Apollo Education Group is not certified under SOC 2 Type 1.
According to Rankiteo, Apollo Education Group does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Apollo Education Group is not listed as GDPR compliant.
According to Rankiteo, Apollo Education Group does not currently maintain PCI DSS compliance.
According to Rankiteo, Apollo Education Group is not compliant with HIPAA regulations.
According to Rankiteo,Apollo Education Group is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Apollo Education Group operates primarily in the Higher Education industry.
Apollo Education Group employs approximately 10,273 people worldwide.
Apollo Education Group presently has no subsidiaries across any sectors.
Apollo Education Group’s official LinkedIn profile has approximately 40,632 followers.
Apollo Education Group is classified under the NAICS code 6113, which corresponds to Colleges, Universities, and Professional Schools.
No, Apollo Education Group does not have a profile on Crunchbase.
Yes, Apollo Education Group maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/apollo-group.
As of January 23, 2026, Rankiteo reports that Apollo Education Group has experienced 3 cybersecurity incidents.
Apollo Education Group has an estimated 15,181 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Cyber Attack and Breach.
Detection and Response: The company detects and responds to cybersecurity incidents through an communication strategy with disclosure on official website and sec filing (8-k form), and communication strategy with public disclosure on official website, sec filing, notification letters to affected individuals..
Title: University of Phoenix Data Breach via Oracle E-Business Suite Zero-Day Exploit
Description: The University of Phoenix (UoPX) was breached in a Clop data theft campaign targeting vulnerable Oracle E-Business Suite instances in August 2025. The attackers exploited a zero-day vulnerability to steal sensitive personal and financial information belonging to students, staff, and suppliers.
Date Detected: 2025-11-21
Date Publicly Disclosed: 2025-11-26
Type: Data Breach
Attack Vector: Exploitation of zero-day vulnerability in Oracle E-Business Suite
Vulnerability Exploited: Zero-day vulnerability in Oracle E-Business Suite (EBS) financial application
Threat Actor: Clop ransomware group
Motivation: Data theft and extortion
Title: University of Phoenix Data Breach
Description: Attorneys are investigating whether a class action lawsuit can be filed regarding a data breach at the University of Phoenix that may have compromised personal information of affected individuals.
Type: Data Breach
Title: Clop Ransomware Gang Steals Data of 3.5 Million University of Phoenix Students and Staff
Description: The Clop ransomware gang has stolen the data of nearly 3.5 million University of Phoenix (UoPX) students, staff, and suppliers after breaching the university's network in August 2025. The attackers exploited a zero-day vulnerability in the Oracle E-Business Suite (EBS) financial application to steal sensitive personal and financial information.
Date Detected: 2025-11-21
Date Publicly Disclosed: 2025-12-01
Type: Data Breach, Ransomware
Attack Vector: Exploitation of zero-day vulnerability (CVE-2025-61882)
Vulnerability Exploited: CVE-2025-61882 (Oracle E-Business Suite)
Threat Actor: Clop ransomware gang
Motivation: Extortion, Data Theft
Common Attack Types: The most common types of attacks the company has faced is Breach.
Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Oracle E-Business Suite zero-day vulnerability and Oracle E-Business Suite (EBS) zero-day vulnerability (CVE-2025-61882).

Data Compromised: Sensitive personal and financial information
Systems Affected: Oracle E-Business Suite (EBS) financial application
Identity Theft Risk: High
Payment Information Risk: High

Data Compromised: Personal information
Legal Liabilities: Potential class action lawsuit

Data Compromised: 3,489,274 records
Systems Affected: Oracle E-Business Suite (EBS) financial application
Brand Reputation Impact: Yes
Legal Liabilities: Potential regulatory fines and legal actions
Identity Theft Risk: Yes
Payment Information Risk: Yes
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Names, Contact Information, Dates Of Birth, Social Security Numbers, Bank Account And Routing Numbers, , Personal information, Personal Information, Financial Information and .

Entity Name: University of Phoenix
Entity Type: Educational Institution
Industry: Higher Education
Location: Phoenix, Arizona, USA
Size: Nearly 3,000 academic staff and over 100,000 enrolled students
Customers Affected: Current and former students, employees, faculty, and suppliers

Entity Name: University of Phoenix
Entity Type: Educational Institution
Industry: Education

Entity Name: University of Phoenix
Entity Type: Educational Institution
Industry: Higher Education
Location: Phoenix, Arizona, USA
Size: Over 100,000 enrolled students and nearly 3,000 academic staff
Customers Affected: 3,489,274 (current and former students, employees, faculty, and suppliers)

Communication Strategy: Disclosure on official website and SEC filing (8-K form)

Communication Strategy: Public disclosure on official website, SEC filing, notification letters to affected individuals

Type of Data Compromised: Names, Contact information, Dates of birth, Social security numbers, Bank account and routing numbers
Sensitivity of Data: High
Data Exfiltration: Yes
Personally Identifiable Information: Yes

Type of Data Compromised: Personal information

Type of Data Compromised: Personal information, Financial information
Number of Records Exposed: 3,489,274
Sensitivity of Data: High (Social Security numbers, bank account and routing numbers, dates of birth, contact information)
Data Exfiltration: Yes
Personally Identifiable Information: Yes

Regulations Violated: Potential violations of data protection laws (e.g., FERPA, GDPR if applicable),
Regulatory Notifications: SEC filing (8-K form), required notifications to affected individuals and regulatory entities

Legal Actions: Potential class action lawsuit

Regulations Violated: Potential violations of data protection laws (e.g., FERPA, GDPR if applicable),
Regulatory Notifications: Filed with Maine's Attorney General, SEC filing
Ensuring Regulatory Compliance: The company ensures compliance with regulatory requirements through Potential class action lawsuit.

Source: University of Phoenix Official Website
Date Accessed: 2025-11-26

Source: Investigation Notice

Source: BleepingComputer

Source: University of Phoenix Official Website

Source: SEC Filing (8-K)
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: University of Phoenix Official WebsiteDate Accessed: 2025-11-26, and Source: SEC Filing (8-K form)Date Accessed: 2025-11-26, and Source: Investigation Notice, and Source: BleepingComputer, and Source: University of Phoenix Official Website, and Source: SEC Filing (8-K).

Investigation Status: Ongoing

Investigation Status: Ongoing

Investigation Status: Ongoing
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Disclosure on official website and SEC filing (8-K form), Public disclosure on official website, SEC filing and notification letters to affected individuals.

Customer Advisories: Affected individuals will receive a letter via US Mail outlining the details of the incident and next steps

Customer Advisories: Affected individuals are advised to fill out a form to learn more about the investigation and their rights.

Stakeholder Advisories: Notification letters mailed to affected individuals, public disclosure on website
Customer Advisories: Free identity protection services offered (credit monitoring, identity theft recovery, dark web monitoring, $1 million fraud reimbursement policy)
Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: were Affected individuals will receive a letter via US Mail outlining the details of the incident and next steps, Affected individuals are advised to fill out a form to learn more about the investigation and their rights., Notification letters mailed to affected individuals, public disclosure on website, Free identity protection services offered (credit monitoring, identity theft recovery, dark web monitoring and $1 million fraud reimbursement policy).

Entry Point: Oracle E-Business Suite zero-day vulnerability

Entry Point: Oracle E-Business Suite (EBS) zero-day vulnerability (CVE-2025-61882)

Root Causes: Exploitation of unpatched zero-day vulnerability in Oracle E-Business Suite

Root Causes: Exploitation of zero-day vulnerability in Oracle E-Business Suite (CVE-2025-61882)
Last Attacking Group: The attacking group in the last incident were an Clop ransomware group and Clop ransomware gang.
Most Recent Incident Detected: The most recent incident detected was on 2025-11-21.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2025-12-01.
Most Significant Data Compromised: The most significant data compromised in an incident were Sensitive personal and financial information, Personal information, 3,489 and274 records.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Personal information, 3,489,274 records and Sensitive personal and financial information.
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 3.5M.
Most Significant Legal Action: The most significant legal action taken for a regulatory violation was Potential class action lawsuit.
Most Recent Source: The most recent source of information about an incident are University of Phoenix Official Website, BleepingComputer, SEC Filing (8-K form), Investigation Notice and SEC Filing (8-K).
Current Status of Most Recent Investigation: The current status of the most recent investigation is Ongoing.
Most Recent Stakeholder Advisory: The most recent stakeholder advisory issued was Notification letters mailed to affected individuals, public disclosure on website, .
Most Recent Customer Advisory: The most recent customer advisory issued were an Affected individuals will receive a letter via US Mail outlining the details of the incident and next steps, Affected individuals are advised to fill out a form to learn more about the investigation and their rights., Free identity protection services offered (credit monitoring, identity theft recovery, dark web monitoring and $1 million fraud reimbursement policy).
Most Recent Entry Point: The most recent entry point used by an initial access broker were an Oracle E-Business Suite zero-day vulnerability and Oracle E-Business Suite (EBS) zero-day vulnerability (CVE-2025-61882).
Most Significant Root Cause: The most significant root cause identified in post-incident analysis was Exploitation of unpatched zero-day vulnerability in Oracle E-Business Suite, Exploitation of zero-day vulnerability in Oracle E-Business Suite (CVE-2025-61882).
.png)
Improper validation of specified type of input in M365 Copilot allows an unauthorized attacker to disclose information over a network.
Improper access control in Azure Front Door (AFD) allows an unauthorized attacker to elevate privileges over a network.
Azure Entra ID Elevation of Privilege Vulnerability
Moonraker is a Python web server providing API access to Klipper 3D printing firmware. In versions 0.9.3 and below, instances configured with the "ldap" component enabled are vulnerable to LDAP search filter injection techniques via the login endpoint. The 401 error response message can be used to determine whether or not a search was successful, allowing for brute force methods to discover LDAP entries on the server such as user IDs and user attributes. This issue has been fixed in version 0.10.0.
Runtipi is a Docker-based, personal homeserver orchestrator that facilitates multiple services on a single server. Versions 3.7.0 and above allow an authenticated user to execute arbitrary system commands on the host server by injecting shell metacharacters into backup filenames. The BackupManager fails to sanitize the filenames of uploaded backups. The system persists user-uploaded files directly to the host filesystem using the raw originalname provided in the request. This allows an attacker to stage a file containing shell metacharacters (e.g., $(id).tar.gz) at a predictable path, which is later referenced during the restore process. The successful storage of the file is what allows the subsequent restore command to reference and execute it. This issue has been fixed in version 4.7.0.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.