Canvas Breach: 6.65 TB Stolen, 9,000 Schools Affected, Direct Talks Loom
ShinyHunters claims to have taken 6.65 TB of Canvas data, exposing student records for nearly 9,000 schools and prompting direct negotiations.

Canvas Breach: 6.65 TB Stolen, 9,000 Schools Affected, Direct Talks Loom
TL;DR
ShinyHunters says it exfiltrated 6.65 TB of Canvas data, compromising user names, emails, student IDs and private messages for nearly 9,000 schools; institutions are now weighing direct talks with the group.
Context Instructure, the operator of Canvas, announced an investigation on May 1 after detecting suspicious activity on its platform. Canvas serves roughly 30 million users worldwide, providing assignment management and communication tools for K‑12 and higher‑education institutions. By May 2 the company’s chief information security officer confirmed that the breach exposed personal identifiers and messages.
Key Facts - On May 3 the hacking collective ShinyHunters claimed to have stolen about 6.65 TB of data, a volume that can hold millions of records. The group said the breach touched almost 9,000 schools across the globe. - The compromised data set includes usernames, email addresses, student identification numbers and internal messages exchanged on Canvas. - ShinyHunters posted a list of roughly 1,400 schools on May 5 and announced it would negotiate directly after Instructure failed to respond to its demands, which the group described as “not even as high as you might think it is.” - Canvas was taken offline temporarily but restored within four hours on May 7. The outage coincided with changes to user‑visible pages, a sign that attackers altered the web interface. - The vulnerability was traced to the Free‑for‑Teacher service, now disabled while Instructure conducts a full security review. Test and Beta environments remain in maintenance mode. - By May 7 ShinyHunters removed its public statements, a pattern that often signals ongoing negotiations or settlement.
What It Means The breach highlights the risk of third‑party SaaS platforms that host large volumes of personally identifiable information (PII). Schools face potential compliance violations under data‑protection laws such as the UK’s GDPR, which could trigger fines and mandatory breach notifications. The public offer to negotiate directly bypasses traditional law‑enforcement channels, raising concerns about precedent and the incentive structure for extortion.
Mitigations – What Defenders Should Do 1. Patch and retire vulnerable services – Immediately disable any unused free‑tier features and apply the latest security patches released by Instructure. 2. Enforce multi‑factor authentication (MFA) – Require MFA for all Canvas admin and user accounts to block credential‑stuffing attacks. 3. Monitor for credential leakage – Deploy detection rules for known ShinyHunters data‑leak signatures and watch for suspicious login patterns. 4. Segment network access – Isolate educational platforms from core institutional networks to limit lateral movement if a breach occurs. 5. Update incident response plans – Incorporate SaaS‑specific breach scenarios, including rapid communication with vendors and regulators. 6. Educate users – Conduct phishing awareness training focused on login prompts and unexpected messages within Canvas.
What to watch next – Keep an eye on any public statements from ShinyHunters, potential data releases, and Instructure’s forthcoming security advisory, which will detail remediation steps and any regulatory filings.
Continue reading
More in this thread
Union Bank and Trust Settles MOVEit Breach Claims for $2.39 Million
Peter Olaleru
New Hanover County Schools Canvas Breach Exposes Student Names and IDs, Statewide Access Suspended
Peter Olaleru
Union Bank Settles MOVEit Breach for $2.39 M, Offers Up to $12,500 per Victim
Peter Olaleru
Conversation
Reader notes
Loading comments...