Canvas Breach Exposes 275 Million Records, Forces Free‑For‑Teacher Shutdown at 9,000 Universities
ShinyHunters stole 3.65 TB of Canvas data, exposing 275 million records. Instructure disables Free‑For‑Teacher accounts; universities scramble to secure LMS.

Canvas Breach Exposes 275 Million Records, Forces Free‑For‑Teacher Shutdown at 9,000 Universities
TL;DR
ShinyHunters stole 3.65 TB of Canvas data, affecting roughly 9,000 universities; Instructure shut down Free‑For‑Teacher accounts to restore service.
Context Instructure, the U.S. firm behind the Canvas learning management system, announced a cybersecurity incident on May 1. The breach targeted the Free‑For‑Teacher offering, a free tier used by many institutions for teaching and research. By May 2 the company confirmed that user names, email addresses and student IDs, along with billions of private messages, had been extracted. No passwords, dates of birth, government IDs or financial data were found at that time.
Key Facts - The criminal group ShinyHunters claims responsibility, reporting 3.65 TB of stolen data and 275 million individual records. - Impact spans roughly 9,000 universities across North America, Europe and Asia, including major campuses such as Oxford, Harvard and the University of Toronto. - Instructure responded by temporarily disabling Free‑For‑Teacher accounts, a move that allowed the core Canvas service to be brought back online by early May. - Affected institutions issued alerts, suspended access to their Canvas instances, and warned users of phishing attempts that mimic official Canvas communications. - The breach exploited a vulnerability in the Free‑For‑Teacher authentication flow, allowing the actor to modify pages displayed to logged‑in users and harvest data from message stores.
What It Means The scale of the theft underscores the risk of free, widely deployed SaaS platforms in higher education. With billions of private messages exposed, the breach creates a rich source for credential‑stuffing attacks, social engineering and targeted phishing. Universities must treat the incident as a data‑privacy crisis, not merely a service outage.
Mitigations - Enforce multifactor authentication (MFA) for all Canvas accounts; MFA blocks credential reuse even if passwords are later compromised. - Review and tighten admin privileges; limit the number of users with full control over LMS configuration. - Apply any patches released by Instructure for the Free‑For‑Teacher authentication flaw; monitor Instructure advisories for CVE identifiers. - Deploy detection signatures for MITRE ATT&CK technique T1071.001 (Web Protocols) and T1566.002 (Spearphishing Link) to catch malicious page modifications and phishing emails. - Conduct a credential‑reuse audit; force password resets for any accounts that may have been exposed elsewhere. - Educate staff and students on verifying URLs and avoiding unsolicited requests for personal information.
Looking Ahead Watch for Instructure’s post‑mortem report, which should detail the exact vulnerability and any additional indicators of compromise that security teams can use to hunt for lingering threats.
Continue reading
More in this thread
Instructure Disables Free-For-Teacher Canvas Accounts After Hack Exposes Student Data
Peter Olaleru
Instructure Halts Free‑For‑Teacher Canvas Accounts After Hack Exposes Millions
Peter Olaleru
Second Canvas Breach Exposes Data of Nearly 300 Million Users, Triggers Test Cancellations
Peter Olaleru
Conversation
Reader notes
Loading comments...