Code Defence Cyber security

Instructure pays ransom to ShinyHunters to prevent 3.65TB Canvas LMS data leak

The parent company of a global learning management system has confirmed reaching a settlement with threat actors to avoid the publication of stolen data belonging to millions of students. This decision concludes a weeks-long extortion campaign that disrupted access to academic materials at thousands of institutions.

Tracked as the May 2026 Canvas security incident, the breach resulted in the theft of 3.65TB of data by the ShinyHunters group. @[Instructure](urn:li:organization:1310123) stated that they reached an agreement with the unauthorized actor to provide peace of mind to customers, receiving digital confirmation that the stolen data was destroyed. The breach originated from an unspecified vulnerability in the Free-for-Teacher environment and eventually impacted nearly 9,000 organizations.

While the payment aims to prevent a mass leak, it does not erase the fact that sensitive identifiers like student IDs and private messages were in adversary hands for weeks. For academic institutions, the primary risk now shifts to long-term social engineering campaigns that utilize the specific institutional details exfiltrated during the breach.

– Conduct a final audit of all API keys and service accounts used within the Canvas environment to ensure no persistent sessions remain.

– Monitor for a surge in targeted spear-phishing attempts that leverage student ID numbers or internal messaging context.

– Verify that the Free-for-Teacher account program has been fully deactivated or isolated within your institutional network.

– Reinforce phishing-resistant MFA across all academic and administrative accounts to mitigate risks of follow-on credential abuse.

The resolution of the extortion campaign through payment represents a strategic closure but necessitates a total forensic reset of student and faculty data trust. #CodeDefence #Canvas #Instructure #ShinyHunters #Ransomware
/

Scroll to Top