Code Defence Cyber security

Instructure confirms Canvas LMS breach scope as ShinyHunters extends ransom deadline

The fallout from the massive intrusion into a leading global learning management system continues to expand as threat actors demonstrate their persistence within the platform ecosystem. Forensic investigations have confirmed that the exposure window for sensitive student and institutional data remained open for over a week.

The breach at the Canvas platform, managed by @[Instructure](urn:li:organization:1310123), resulted from the exploitation of the Free-For-Teacher account program. ShinyHunters has extended the ransom deadline to May 12, 2026, while claiming to hold 3.6 TB of data covering 275 million users. Instructure has confirmed the exfiltration of names, email addresses, student ID numbers, and private messages between users, though no evidence of password or financial data exposure has been found.

This incident marks the second major breach for the vendor in eight months, highlighting a pattern of underdefended adjacencies where trust boundaries were weaker than the data they protected. The exfiltrated dataset provides a permanent resource for highly targeted social engineering campaigns across the global academic community.

– Perform a mandatory rotation of all API keys and revoke privileged credentials associated with the Canvas platform.

– Instruct all institutional users to be hyper-vigilant against phishing attempts that utilize specific student IDs or internal messaging details.

– Disable or strictly audit the use of the Free-For-Teacher program within your organization environment.

– Review and harden identity protections for all academic service accounts, ensuring the use of phishing-resistant MFA.

When a foundational educational platform is compromised, the data of an entire generation of students must be treated as permanently exposed to threat actor databases. #CodeDefence #Canvas #Instructure #ShinyHunters #DataBreach
/

Scroll to Top