Canvas breach exposes hundreds of millions of student records after April intrusion
Instructure disclosed an April 29 intrusion that exposed names, emails, IDs and private messages from Canvas users affecting hundreds of millions of student records. Details and mitigations.

TL;DR
Instructure disclosed that an intrusion detected on April 29 exposed names, email addresses, student IDs and private messages from Canvas users across hundreds of millions of student records. The company said the learning‑management platform is back online, though some institutions still report outages.
Context
Canvas is a widely used learning‑management system that serves thousands of colleges and K‑12 districts nationwide. Institutions rely on it for course delivery, grading and communication, making it a high‑value target for attackers seeking personal data.
Key Facts
- Instructure announced on Friday that the breach originated from an initial intrusion they detected on April 29. - The compromised data includes names, email addresses, student identification numbers and private messages exchanged within Canvas. - Instructure stated there is no evidence that passwords, birth dates, government‑issued IDs or financial information were accessed. - Tom Holt, a criminal‑justice professor at Michigan State University, warned that breaches are growing exponentially and urged users to avoid reusing passwords across services. - Jackson College in Michigan confirmed it was affected; the attack occurred during a semester break, though some schools lost access to Canvas during finals week. - As of the latest update, Canvas is back online, but a subset of institutions continue to experience intermittent outages while investigations proceed.
What It Means
The exposure of personal identifiers and private messages increases the risk of targeted phishing and social‑engineering attacks, especially if attackers combine the data with information from other breaches. Although passwords were not disclosed, credential‑reuse remains a concern; users who employ the same password on Canvas and elsewhere could face account takeover if those credentials are leaked elsewhere. The incident underscores the reliance of educational institutions on third‑party SaaS platforms and highlights the need for robust vendor‑risk management.
What Defenders Should Do
- Enforce multi‑factor authentication (MFA) for all Canvas admin and user accounts. - Review login logs for anomalous access patterns consistent with MITRE ATT&CK technique T1078 (Valid Accounts) and T1566 (Phishing). - Ensure that OAuth tokens and API keys associated with Canvas are rotated and scoped to least privilege. - Apply any security patches or advisories released by Instructure promptly; monitor the Instructure security advisory page for CVE‑related updates. - Deploy detection rules for suspicious mailbox activity (e.g., unexpected forwarding rules) that could indicate message exfiltration. - Educate students and staff about password hygiene and the dangers of reusing credentials across platforms. - Conduct a third‑party risk assessment of all SaaS providers, focusing on data‑handling practices and incident‑response capabilities.
Watch for Instructure’s forthcoming forensic report, which may clarify the attack vector and indicate whether additional data types were accessed.
Continue reading
More in this thread
Union Bank and Trust Settles MOVEit Breach Claims for $2.39 Million
Peter Olaleru
New Hanover County Schools Canvas Breach Exposes Student Names and IDs, Statewide Access Suspended
Peter Olaleru
Union Bank Settles MOVEit Breach for $2.39 M, Offers Up to $12,500 per Victim
Peter Olaleru
Conversation
Reader notes
Loading comments...