Cybersecurity1 hr ago

Canvas Cyberattack Forces U.S. Colleges to Postpone Finals as 275M Records Exposed

A ransomware attack on Instructure’s Canvas platform exposed data of 275 million users, forced colleges to postpone finals, and was claimed by ShinyHunters. Details on impact and mitigations.

Peter Olaleru/3 min/US

Cybersecurity Editor

TweetLinkedIn
Canvas Cyberattack Forces U.S. Colleges to Postpone Finals as 275M Records Exposed
Source: PbsOriginal source

TL;DR: A ransomware attack on Instructure’s Canvas platform exposed data of 275 million users, forced colleges to postpone finals, and was claimed by the ShinyHunters group.

Context

On Thursday, students across the United States found Canvas login pages displaying a ransom note as they prepared for final exams. Instructure took the platform offline after detecting unauthorized activity in its network and said the intrusion was linked to a breach disclosed a week earlier. By Friday morning the service was restored, but the disruption had already prompted several institutions to adjust exam schedules.

The attack echoes a similar incident last year when PowerSchool, a provider used by 60 million K–12 students, disclosed a breach that exposed years of personal and disciplinary data. ShinyHunters has been active since at least 2020, notably harvesting credentials from Snowflake in 2024 and leveraging them in subsequent intrusions at firms such as TicketMaster.

Key Facts

ShinyHunters claimed responsibility on its dark web site, asserting that the stolen data covered 275 million individuals associated with 8,800 schools. The University of Illinois postponed all final exams and assignments for Friday through Sunday, while the University of Massachusetts Dartmouth extended or rescheduled due dates.

Instructure said the accessed information included names, email addresses, student IDs, and platform messages, but noted there was no evidence that passwords, dates of birth, government identifiers, or financial data were compromised.

What It Means

The incident highlights how a single cloud‑based education service can become a choke point for nationwide academic operations when compromised. The ransom demand directed individual institutions to negotiate, illustrating a shift toward extortion that targets downstream customers rather than the vendor alone.

The scale of the claimed exposure—hundreds of millions of records—places this event among the largest education‑sector data disclosures reported to date. The breach raises concerns about the adequacy of vendor security controls and may prompt tighter scrutiny from federal agencies overseeing student data privacy.

Mitigations

Organizations using Canvas should enforce multi‑factor authentication for all accounts, review and rotate any credentials that may have been exposed, and monitor for anomalous login attempts (MITRE ATT&CK T1078). Applying the latest Instructure security advisories and ensuring that third‑party integrations are patched reduces the risk of credential reuse attacks.

Security teams should also implement detection rules for unusual data exfiltration patterns (e.g., large outbound transfers to unfamiliar IP ranges) and maintain offline backups of critical coursework to limit ransomware impact.

Expect further statements from Instructure regarding forensic findings, potential regulatory filings, and any updates on whether the ransom demand was met or additional extortion attempts follow.

TweetLinkedIn

More in this thread

Reader notes

Loading comments...