Canvas LMS Restored After May 7 Ransomware Attack Disrupts 9,000 Schools
Details on the Canvas LMS outage, impact on 9,000 schools, data claimed stolen by ShinyHunters, and steps defenders should take.

TL;DR: On May 7, a ransomware attack forced Canvas LMS offline, affecting roughly 9,000 schools and 275 million users. Service was restored by May 8, though attackers claimed to have stolen names, emails, student IDs and internal messages.
Context
Canvas, owned by Instructure, is a cloud‑based learning management system used by K‑12 districts and universities worldwide. On the morning of May 7, users reported inability to log in, access grades or submit coursework during spring finals. Instructure placed the platform in maintenance mode and began investigating the disruption.
Key Facts
- The outage lasted several hours before Instructure announced full restoration on May 8. - Hacking group ShinyHunters claimed responsibility, stating they accessed data from nearly 9,000 institutions affecting about 275 million individuals. - According to Instructure, the compromised data included names, email addresses, student ID numbers and user‑to‑user messages; passwords, birth dates, government IDs and financial information were not exposed. - ShinyHunters reportedly gave affected schools a May 12 deadline to negotiate a ransom, threatening to leak the data if unpaid. - The attack aligns with common ransomware tactics: initial access via phishing or compromised credentials (MITRE ATT&CK T1566, T1078), followed by data exfiltration (T1041) and impact through service disruption (T1489).
What It Means
For institutions, the incident highlights the reliance on third‑party SaaS platforms for critical academic functions. Even when core credentials remain safe, exposure of personal identifiers can enable follow‑on phishing or identity‑theft campaigns. The claimed ransom deadline creates pressure on schools to decide whether to engage with threat actors, a decision that carries legal and reputational risks.
Mitigations / What Defenders Should Do - Enforce multi‑factor authentication on all Canvas admin and user accounts. - Review and reset any passwords that were reused across Canvas and other services. - Monitor for phishing emails referencing the Canvas incident; block suspicious URLs and attachments. - Apply the latest security patches to any integrated plugins or LTI tools. - Deploy detection rules for MITRE ATT&CK techniques T1078 (Valid Accounts) and T1041 (Exfiltration Over Web Services) in SIEM tools. - Maintain offline backups of essential course data and verify restore procedures regularly.
Looking ahead, watch for any official statements from ShinyHunters regarding data release or further extortion attempts, and monitor Instructure’s security advisories for additional indicators of compromise.
Continue reading
More in this thread
Second Canvas Breach Exposes Data of Nearly 300 Million Users, Triggers Test Cancellations
Peter Olaleru
Canvas Data Breach Exposes 9,000 Universities Worldwide, ShinyHunters Allegedly Steal 3.65TB
Peter Olaleru
Second Canvas breach in eight days exposes data of nearly 300 million users
Peter Olaleru
Conversation
Reader notes
Loading comments...