Canvas LMS breach exposes data of 275 million users across nearly 9,000 schools
Details on the Canvas LMS breach by ShinyHunters, impact on 275 million users, disrupted schooling, and steps defenders can take.

Canvas LMS breach exposes data of 275 million users across nearly 9,000 schools
TL;DR: ShinyHunters claims to have stolen about 3.65 TB of Canvas LMS data affecting roughly 275 million users from nearly 9,000 schools worldwide. Instructure temporarily shut down the platform, disrupting exams and grading while investigators verify the scope.
Context
Canvas LMS is a cloud‑hosted learning management system used by K‑12 districts, colleges, and training providers as the central hub for coursework, grades, and communication. Its widespread adoption creates a single point of failure; when the vendor’s service is interrupted, entire campuses lose access to instructional materials and assessment tools. The breach highlights how deep reliance on a SaaS monoculture can amplify both data exposure and operational disruption.
Key Facts
- ShinyHunters, a known extortion group, announced the theft of approximately 3.65 TB of data linked to 275–280 million Canvas users. - The compromised set includes names, institutional email addresses, student ID numbers, and private messages exchanged inside Canvas; Instructure says there is no evidence that passwords, birth dates, government IDs, or financial data were taken. - The attacker’s list names nearly 8,800 to 9,000 educational institutions across North America, Europe, the U.K., and Australia. - Instructure took Canvas offline during the incident, which halted exams, grading, and course delivery at many schools, according to multiple news reports. - No public CVE has been released; the initial attack vector remains undisclosed, though the group’s typical tactics involve credential abuse and exploitation of exposed services.
What It Means
The leaked personal identifiers and message histories enable highly targeted phishing, impersonation, and harassment campaigns. Because the data includes real course details and internal communications, attackers can craft convincing lures that reference specific classes or instructors, increasing the likelihood of credential theft or account takeover. Long‑term risk arises from correlating this information with other breaches to build richer profiles for future social engineering or identity‑theft attempts.
### Mitigations - Enforce multi‑factor authentication for all Canvas admin and user accounts; monitor for anomalous login locations or times (MITRE ATT&CK T1078 – Valid Accounts). - Review and restrict third‑party app integrations and API tokens; apply the principle of least privilege to reduce exposure (T1059 – Command and Scripting Interpreter). - Deploy data loss prevention or cloud access security broker controls to detect large outbound transfers (T1041 – Exfiltration Over Command and Control). - Educate students and staff about phishing that references real course names; encourage verification through official channels. - Preserve logs and retain them for at least 90 days to support forensic analysis if further incidents emerge.
Watch for additional disclosures from Instructure, any observed phishing or credential‑stuffing campaigns using the leaked data, and potential regulatory guidance from education‑focused agencies.
Continue reading
More in this thread
Hogan Transports Discloses 2025-2026 Data Breach Exposing SSNs, Offers Two-Year Credit Monitoring
Peter Olaleru
Hogan Transports Breach Exposes SSNs, Triggers May 2026 Notifications and Free Credit Monitoring
Peter Olaleru
New Congoleum Data Breach Exposes 4,831 Names and SSNs, Triggers Lawsuit Probe
Peter Olaleru
Conversation
Reader notes
Loading comments...