Cybersecurity1 hr ago

Canvas Breach Hits Up to 275 Million Users, ShinyHunters Sets May 12 Ransom Deadline

Canvas breach may expose 275 million users; extortion group ShinyHunters demands payment by May 12. Learn the impact and mitigation steps.

Peter Olaleru/3 min/GB

Cybersecurity Editor

TweetLinkedIn
Canvas Breach Hits Up to 275 Million Users, ShinyHunters Sets May 12 Ransom Deadline

Canvas Breach Hits Up to 275 Million Users, ShinyHunters Sets May 12 Ransom Deadline

Source: StateofsurveillanceOriginal source

Canvas suffered a breach that may expose 275 million users; extortion group ShinyHunters gives institutions until May 12 to negotiate.

Context Instructure, the operator of Canvas, detected unauthorized access on April 25, 2026. The company revoked privileged credentials and access tokens, then placed Canvas, Canvas Beta, and Canvas Test into maintenance mode on May 7. The timing coincided with final exams and graduation deadlines, amplifying operational disruption for thousands of schools.

Key Facts - The breach potentially impacts up to 275 million users across nearly 9,000 educational institutions, including Harvard, MIT, Oxford, Duke and others. - Stolen data includes names, email addresses, student ID numbers and private messages exchanged within Canvas. No passwords, dates of birth or financial data have been confirmed as compromised. - ShinyHunters, a loosely organized group of young cyber‑actors linked to the United States and United Kingdom, claims to have accessed several billion private messages. - The group issued a ransom note demanding negotiation and set a deadline of May 12, after which it threatens public release of the data. - Prior to Canvas, ShinyHunters extracted 6.2 million records from Dutch telecom Odido and dumped 350 GB of European Commission data, demonstrating a pattern of targeting high‑value, low‑defense platforms.

What It Means The exposure of billions of private messages creates a fertile ground for credential‑stuffing and spear‑phishing attacks. Even basic identifiers enable attackers to craft convincing impersonations of professors or administrators, increasing the risk of secondary breaches. The incident also highlights the systemic reliance of higher education on a single SaaS platform, raising questions about cloud‑security governance and incident‑response readiness in the sector.

Mitigations – What Defenders Should Do 1. Reset credentials for all Canvas accounts and enforce multi‑factor authentication (MFA) where possible. 2. Deploy detection signatures for suspicious API calls and token misuse, referencing MITRE ATT&CK technique T1078 (Valid Accounts). 3. Review and limit privileged access tokens; revoke any that are not actively used. 4. Conduct a forensic review of outbound traffic for exfiltration patterns matching large‑scale data transfers. 5. Notify affected individuals promptly and provide guidance on phishing awareness, emphasizing the risk of messages that appear to come from faculty. 6. Coordinate with Instructure to obtain any patches or configuration hardening recommendations released after the incident.

Looking Ahead Watch for ShinyHunters’ next move after the May 12 deadline and for any public data dumps that could trigger a wave of targeted phishing campaigns across the education sector.

TweetLinkedIn

More in this thread

Reader notes

Loading comments...