Instructure Breach Exposes Data of 275 Million Users as ShinyHunters Claims Responsibility
Instructure disclosed a cyberattack that exposed personal data of roughly 275 million education users. ShinyHunters claims responsibility and lists the breach on its leak site.
Visual sourcing
No source-linked image is attached to this story yet. Measured Take avoids generic stock art when a relevant credited image is not available.
TL;DR
Instructure said a breach exposed names, emails, student IDs, and messages of about 275 million users, with ShinyHunters claiming responsibility.
Context
Instructure, the U.S. maker of the Canvas learning management system, disclosed on Friday that it suffered a cybersecurity incident and is working with outside experts and law enforcement. On Saturday the company updated that personal information of users had been accessed. The attacker allegedly exploited a vulnerability in Instructure’s systems, which has since been patched.
Key Facts
- Exposed data includes names, email addresses, student ID numbers, and user‑to‑user messages; no evidence yet shows passwords, birth dates, government IDs, or financial data were taken. - ShinyHunters claims the breach affected roughly 9,000 schools and the personal data of about 275 million students, teachers, and staff worldwide. - The threat actor says the dataset contains over 240 million records, including enrolled courses and private conversations, and that a Salesforce instance was also compromised. - Instructure has deployed patches, increased monitoring, and rotated application keys; customers must re‑authorize API access for new keys.
What It Means
The incident highlights the risk posed by vulnerabilities in widely used edtech platforms, especially when attackers chain access to ancillary services like Salesforce. Exposure of messaging content can enable social engineering or credential‑phishing campaigns against educators and students. While financial data appears untouched, the sheer volume of personally identifiable information raises concerns about identity theft and targeted scams.
### Mitigations / What Defenders Should Do 1. Apply the latest security patches released by Instructure for Canvas and any integrated applications. 2. Rotate all API keys and enforce least‑privilege scopes; require re‑authorization of third‑party integrations. 3. Enable multi‑factor authentication on all admin and user accounts where possible. 4. Monitor authentication logs for anomalous API usage or unexpected geographic logins (MITRE ATT&CK T1078 – Valid Accounts). 5. Review and restrict outbound connections from Canvas servers to unknown endpoints to limit data exfiltration (MITRE ATT&CK T1041 – Exfiltration Over Command and Control). 6. Educate users about phishing risks that may arise from leaked message content and encourage verification of unexpected requests for credentials.
Organizations should watch for any follow‑up disclosures from Instructure regarding additional data types, and for potential extortion attempts linked to the ShinyHunters leak site.
Continue reading
More in this thread
IBM Finds Global Breach Cost at $4.88 Million; Experts Recommend NIST and Zero Trust
Peter Olaleru
IBM Italy Subsidiary Breached by Salt Typhoon, Intelligence Links Attack to Chinese Cyber Espionage
Peter Olaleru
IBM Italy Subsidiary Sistemi Informativi Hit by Suspected Salt Typhoon Cyberattack in Late April 2026
Peter Olaleru
Conversation
Reader notes
Loading comments...