in

ShinyHunters breaches Canvas and threatens to leak student data

The learning platform Canvas, operated by Instructure, was taken offline after a cybercrime group claimed a large-scale intrusion that surfaced on May 7. Universities and K-12 systems reported interruptions at a sensitive moment in academic calendars, as many institutions were entering or conducting final examinations. The attackers, who identify themselves as ShinyHunters, posted an affected-institutions list and issued deadlines for a payout, creating a scramble among IT teams, instructors, and students to restore access and verify records.

In response to the incident, Instructure put Canvas, Canvas Beta, and Canvas Test into maintenance mode while investigating. The company has said it restored service for most users by late evening on May 7, though students and faculty continued to share outage reports on social media. This event follows an initial claim of compromise earlier in the week, when ShinyHunters said they first breached Instructure on May 3, and it overlaps with public deadlines set by the group, including a previously missed May 8 cutoff and a looming May 12 demand.

Timeline, actors and scope

The incident unfolded as a mix of public statements and dark web postings. ShinyHunters publicly named more than 8,800 institutions it says were affected and posted a ransom-style message that gave Instructure and impacted schools until May 12 to negotiate. Instructure has communicated mitigation steps, including revoking privileged credentials and deploying patches, and stated there is currently no evidence that passwords, dates of birth, government identifiers, or financial data were taken. Still, the group’s warnings and the repeated service interruptions have amplified concerns about long-term exposure.

Data exposed

According to Instructure, the material stolen appears to include names, email addresses, student ID numbers, and user messages exchanged on the platform. These elements may seem limited compared with full financial or government records, but when combined they increase the risk of targeted scams and account compromise. The attackers’ threat to publish the information if demands are not met is a form of extortion, and the current schedule gives stakeholders a narrow window to respond before further dissemination.

Who is affected and operational impact

Canvas supports more than 30 million active users worldwide and lists over 8,000 institutional customers. Industry reporting places Canvas usage at roughly 41% of higher education institutions in North America, making the platform a central piece of many schools’ course delivery. Among named impacted institutions are Harvard, Columbia, Rutgers, Georgetown, the University of Pennsylvania, Virginia Tech, the University of New Mexico, the University of Florida, Johns Hopkins, Duke, and the University of Iowa. The University of Texas at San Antonio pushed back finals, and the University of California system temporarily restricted or rerouted access as a precaution. International disruptions were also reported in the United Kingdom, Australia, New Zealand, Sweden, and the Netherlands, where 44 institutions were listed.

Academic records and phishing risk

Beyond downtime, educators and students worry about the integrity of final grades, submission timestamps, and other course records stored inside Canvas. Error messages and locked views of grades were reported at some schools, prompting administrators to consider deadline extensions and alternate submission methods. The breach also raises the specter of post-incident scams: attackers commonly follow large leaks with credential-phishing and impersonation attempts, so institutions have warned students to be cautious of messages purporting to be official Canvas notices.

Next steps for institutions and students

The most immediate milestone is the May 12 deadline set by the attackers; if Instructure or schools do not reach an agreement, the group has said it may release the data publicly. Institutions are notifying communities, mobilizing incident response teams, and preparing to offer standard post-breach services such as identity protection. Legal action is likely to follow, and law enforcement and cyber professionals are involved in many campuses’ response plans. The broader trend shows education technology is increasingly targeted, echoing prior incidents at other vendors and large districts.

Students and families should take practical protective steps now: consider a free credit freeze with Equifax, Experian, and TransUnion (the most effective barrier to new credit fraud), change reused passwords, enable multi-factor authentication where available, and monitor accounts for suspicious activity. Borrowers should be especially cautious of scams impersonating loan servicers or financial aid offices. While many records may already circulate in criminal markets, vigilance and prompt action can reduce the chances of long-term harm.

How to choose between paid-off rentals and mortgaged growth

How to choose between paid-off rentals and mortgaged growth

MRG Metals expanding exploration footprint in Mozambique and Australia

MRG Metals expanding exploration footprint in Mozambique and Australia