Cybersecurity2 hrs ago

Instructure reaches deal with hackers after Canvas breach exposing data of 275 million students

Instructure says it agreed with attackers behind a Canvas breach exposing up to 275M student records; ShinyHunters threatened 3.65TB leak unless paid by May 12.

Peter Olaleru/3 min/US

Cybersecurity Editor

TweetLinkedIn
Instructure reaches deal with hackers after Canvas breach exposing data of 275 million students
Source: MashableOriginal source

Instructure says it reached an agreement with the hackers behind a Canvas breach that may have exposed data of up to 275 million students, with ShinyHunters threatening to leak a 3.65‑TB dataset unless paid by May 12.

Context Instructure announced on Tuesday that it had reached an agreement with the unauthorized actor responsible for a breach of its Canvas learning platform. The breach potentially exposed personal information of as many as 275 million students across roughly 9,000 institutions worldwide. The company said it detected unauthorized access on two occasions: first on April 29, when it revoked the intruder’s access and began an investigation, and again on May 7, linked to the same incident.

Key Facts - The exposed data includes usernames, email addresses, student ID numbers, and internal communications from some institutions. - ShinyHunters claimed responsibility for the breach and threatened to publish a 3.65‑terabyte dataset if payment talks were not concluded by May 12. - Instructure said it received digital confirmation from the hackers that the stolen data was destroyed, though it did not confirm whether a ransom was paid. - The breach caused widespread disruption, locking students and faculty out of Canvas and forcing universities to reschedule final exams and implement contingency plans.

What It Means The incident highlights the accumulation risk of relying on a single cloud‑based edtech provider; a compromise can trigger simultaneous losses across thousands of organizations. For defenders, the recurrence of unauthorized activity after initial containment suggests possible persistence mechanisms or retained credentials. Security teams should review privileged access controls, enforce multifactor authentication, and monitor for anomalous login patterns (MITRE ATT&CK T1078). Although no specific CVE has been disclosed, organizations should apply the latest patches for Canvas components and enable detailed logging to detect exfiltration attempts (MITRE ATT&CK T1041).

Mitigations - Patch all Canvas‑related servers and integrations according to Instructure’s security advisories. - Enforce MFA for all administrative and service accounts. - Review and restrict OAuth tokens and API keys; rotate any that may have been compromised. - Deploy network‑based detection for large outbound transfers (e.g., >1 GB) to catch potential exfiltration. - Test incident‑response plans with tabletop exercises that include third‑party vendor scenarios.

What to watch next Regulators and insurers will scrutinize whether any ransom payment occurred and how institutions handle notification, credit‑monitoring, and potential class‑action claims stemming from the exposed PII.

TweetLinkedIn

More in this thread

Reader notes

Loading comments...