Cybersecurity2 hrs ago

Canvas Restored After Shinyhunters Attack on 9,000 Schools

Canvas LMS returned Friday after a Shinyhunters‑claimed cyberattack disrupted access for roughly 9,000 schools during final exams. Details and mitigations inside.

Peter Olaleru/3 min/US

Cybersecurity Editor

TweetLinkedIn
Canvas Restored After Shinyhunters Attack on 9,000 Schools
Source: Giantswire EuOriginal source

TL;DR: Canvas service was restored Friday after a Shinyhunters‑claimed cyberattack disrupted access for roughly 9,000 schools during final exams.

Context

When students logged in to review grades and submit assignments Thursday evening, many found the Canvas learning management system offline. Canvas is a cloud‑based platform that hosts course materials, grades, assignments and communications for thousands of K‑12 schools and colleges. The outage coincided with the end of the semester, heightening frustration among students and faculty. University of Minnesota officials said they were notified by Instructure of a worldwide cybersecurity incident affecting its clients, while University of Wisconsin administrators warned users not to follow any unsolicited Canvas‑related prompts.

Key Facts

Instructure confirmed the incident Thursday night and took the service offline. By Friday morning the platform was back online, though administrators continued to verify stability. The hacking group Shinyhunters posted a message claiming responsibility and told affected schools to consult a cyber advisory firm and contact them privately to negotiate a settlement. Shinyhunters asserted that nearly 9,000 schools globally were impacted, with billions of private messages and other records accessed. The University of Minnesota and the University of Wisconsin both acknowledged they were part of the outage. Instructure subsequently removed the dedicated leak site that Shinyhunters had used to publish stolen data on the dark web, and the company had not published a public statement about the attack on its blog.

What It Means

The disruption forced schools to scramble for alternative ways to collect assignments and communicate grades during a critical academic period. While service is restored, the alleged access to billions of messages raises the risk of follow‑on social engineering attacks, such as phishing emails that appear to come from Canvas or school administrators. Security experts note that stolen contact information can be stockpiled and used months later in credential‑harvesting campaigns.

Mitigations / What Defenders Should Do - Enforce multi‑factor authentication on all Canvas and related accounts. - Review authentication logs for unusual login locations or times and block suspicious IPs. - Ensure any third‑party plugins or LTI integrations are patched to the latest versions. - Reset passwords for accounts that may have been exposed, especially if reuse is suspected. - Conduct user awareness training focused on recognizing phishing attempts that reference Canvas or exam schedules. - Monitor dark‑web forums and leak sites for any mention of Canvas‑related data and be ready to notify affected individuals if confirmation emerges. - Defenders should watch for tactics such as credential use (MITRE ATT&CK T1078), phishing (T1566) and command‑line abuse (T1059) in post‑incident monitoring.

Watch for any follow‑up phishing campaigns targeting Canvas users and for further statements from Instructure on the scope of data exposure.

TweetLinkedIn

More in this thread

Reader notes

Loading comments...