Cybersecurity5 hrs ago

Canvas Restored After Ransomware Attack Exposes Data of 275 Million Users

Canvas suffered a ransomware outage on May 7, exposing personal data of 275 million users. Learn the timeline, impact, and mitigation steps.

Peter Olaleru/3 min/GB

Cybersecurity Editor

TweetLinkedIn
Canvas Restored After Ransomware Attack Exposes Data of 275 Million Users
Source: EuOriginal source

Canvas suffered a multi‑hour ransomware outage on May 7, exposing names, email addresses, student IDs and messages of roughly 275 million users before coming back online on May 8.

Context Canvas, the learning‑management system run by Instructure, powers coursework for thousands of schools worldwide. During spring finals, the platform went dark, preventing students and faculty from accessing grades and assignments. The outage coincided with a ransom demand from the hacking group ShinyHunters, which claimed to have stolen data from nearly 9,000 institutions.

Key Facts - The attack began early on May 7, triggering a maintenance mode that blocked logins to Canvas and related services. - ShinyHunters announced the breach, stating that data belonging to about 275 million individuals—students, teachers and staff—had been taken. - Instructure confirmed that passwords, dates of birth, government IDs and financial information were not compromised. Exposed items included names, email addresses, student identification numbers and user‑generated messages. - By May 8, Instructure reported Canvas fully operational for most users and urged affected schools to advise their communities on precautionary steps. - The group set a May 12 deadline for a “settlement,” threatening further leaks if the ransom was not paid.

What It Means The incident highlights the vulnerability of large‑scale SaaS platforms to ransomware that exploits credential‑related weaknesses and inadequate segmentation of user data. While the most sensitive fields remained protected, the breach still provides attackers with a rich set of personal identifiers useful for phishing and credential‑stuffing attacks. Institutions must treat the exposed information as a catalyst for targeted social engineering campaigns.

Mitigations – What Defenders Should Do 1. Enforce multi‑factor authentication (MFA) for all Canvas accounts; MFA adds a second verification step, blocking automated credential use. 2. Rotate passwords for any accounts that shared credentials with Canvas, especially privileged admin accounts. 3. Monitor for phishing that references the Canvas breach; deploy email‑gateway filters and educate users to verify sender authenticity. 4. Apply relevant patches – review Instructure’s advisories for any CVEs (Common Vulnerabilities and Exposures) disclosed after the incident and update libraries accordingly. 5. Segment access – limit data exposure by separating personal identifiers from other services and enforcing least‑privilege access controls. 6. Log and audit login attempts and API calls for anomalous patterns that match MITRE ATT&CK techniques such as “Valid Accounts” (T1078) and “Exfiltration Over Web Service” (T1041).

Looking Ahead Watch for any follow‑up disclosures from Instructure regarding ransom negotiations, additional data sets, or new threat‑actor tactics that could affect other education‑technology providers.

TweetLinkedIn

More in this thread

Reader notes

Loading comments...