Cybersecurity1 hr ago

Instructure Breach Exposes Data of 275 Million Users as ShinyHunters Claims Responsibility

Instructure disclosed a cyberattack that exposed personal data of roughly 275 million education users. ShinyHunters claims responsibility and lists the breach on its leak site.

Peter Olaleru/3 min/US

Cybersecurity Editor

TweetLinkedIn

No source-linked image is attached to this story yet. Measured Take avoids generic stock art when a relevant credited image is not available.

Instructure said a breach exposed names, emails, student IDs, and messages of about 275 million users, with ShinyHunters claiming responsibility.

Context

Instructure, the U.S. maker of the Canvas learning management system, disclosed on Friday that it suffered a cybersecurity incident and is working with outside experts and law enforcement. On Saturday the company updated that personal information of users had been accessed. The attacker allegedly exploited a vulnerability in Instructure’s systems, which has since been patched.

Key Facts

- Exposed data includes names, email addresses, student ID numbers, and user‑to‑user messages; no evidence yet shows passwords, birth dates, government IDs, or financial data were taken. - ShinyHunters claims the breach affected roughly 9,000 schools and the personal data of about 275 million students, teachers, and staff worldwide. - The threat actor says the dataset contains over 240 million records, including enrolled courses and private conversations, and that a Salesforce instance was also compromised. - Instructure has deployed patches, increased monitoring, and rotated application keys; customers must re‑authorize API access for new keys.

What It Means

The incident highlights the risk posed by vulnerabilities in widely used edtech platforms, especially when attackers chain access to ancillary services like Salesforce. Exposure of messaging content can enable social engineering or credential‑phishing campaigns against educators and students. While financial data appears untouched, the sheer volume of personally identifiable information raises concerns about identity theft and targeted scams.

### Mitigations / What Defenders Should Do 1. Apply the latest security patches released by Instructure for Canvas and any integrated applications. 2. Rotate all API keys and enforce least‑privilege scopes; require re‑authorization of third‑party integrations. 3. Enable multi‑factor authentication on all admin and user accounts where possible. 4. Monitor authentication logs for anomalous API usage or unexpected geographic logins (MITRE ATT&CK T1078 – Valid Accounts). 5. Review and restrict outbound connections from Canvas servers to unknown endpoints to limit data exfiltration (MITRE ATT&CK T1041 – Exfiltration Over Command and Control). 6. Educate users about phishing risks that may arise from leaked message content and encourage verification of unexpected requests for credentials.

Organizations should watch for any follow‑up disclosures from Instructure regarding additional data types, and for potential extortion attempts linked to the ShinyHunters leak site.

TweetLinkedIn

More in this thread

Reader notes

Loading comments...