Canvas Data Breach Exposes 9,000 Universities Worldwide, ShinyHunters Allegedly Steal 3.65TB
Instructure confirms Canvas breach affecting ~9,000 universities; ShinyHunters alleges 3.65TB stolen, including 275M records and billions of messages.

TL;DR: On May 1, Instructure disclosed a cybersecurity incident affecting Canvas, impacting roughly 9,000 universities globally. Threat actor ShinyHunters claims to have exfiltrated 3.65 terabytes of data, including 275 million records and billions of private messages.
Context: Canvas, the learning management system owned by Instructure, is used by thousands of institutions for course delivery. On May 1, Instructure notified users of a "cybersecurity incident perpetrated by a criminal threat actor." Two days later the company confirmed that user information such as names, email addresses, and student IDs, as well as messages between users, had been accessed. It stated that no passwords, birth dates, government IDs, or financial data were evident at that time.
Key Facts: The breach originated from a vulnerability in Canvas’s Free-For-Teacher accounts, which allowed the attacker to modify pages seen by logged‑in students and instructors. Instructure responded by temporarily shutting down Free-For-Teacher access and restoring the platform by May 8. The University of Toronto suspended access to its Quercus instance (the local name for Canvas) on May 3 as a precaution, advising users not to use the service until further notice. ShinyHunters, a known cybercrime group, asserted via Hackread that they stole 3.65TB of data encompassing 275 million records and billions of private messages between students and teachers. The group’s claim aligns with the timeline of the Free-For-Teacher exploit, which maps to MITRE ATT&CK technique T1190 (Exploit Public‑Facing Application).
What It Means: The scale of the incident highlights the risk posed by shared SaaS components in education environments. Institutions should review admin roles, enforce multifactor authentication, and monitor for anomalous login activity, particularly from Free-For-Teacher accounts. Defenders can apply detection rules for T1059 (Command and Scripting Interpreter) and T1078 (Valid Accounts) to spot abuse of compromised credentials. Instructure’s advisory recommends enabling MFA, auditing API tokens, and reviewing third‑party integrations.
Mitigations: Patch the Free-For-Teacher component per Instructure’s security advisory (released May 1, 2024). Enforce MFA on all Canvas and institutional accounts. Review and prune unnecessary admin privileges. Deploy SIEM rules for unusual file downloads or mass message exports. Educate users about phishing attempts that mimic Canvas or Instructure communications.
What to watch next: Whether additional personal data such as passwords or financial details emerge, and how institutions adjust their reliance on shared LMS modules amid ongoing threat actor activity.
Continue reading
More in this thread
Sequoia Says AGI Arrived as AI‑Powered Attacks Outpace Human Defenses
Peter Olaleru
Instructure Disables Free-For-Teacher Canvas Accounts After Hack Exposes Student Data
Peter Olaleru
Instructure Halts Free‑For‑Teacher Canvas Accounts After Hack Exposes Millions
Peter Olaleru
Conversation
Reader notes
Loading comments...