Seton Hall Restores Canvas After Global Instructure Breach Hits 9,000 Universities
Seton Hall's Canvas platform is back online after a worldwide Instructure breach affecting over 9,000 universities and a ransom threat from ShinyHunters.

*TL;DR: Seton Hall’s Canvas learning platform is operational again after a global breach of Instructure’s services that affected more than 9,000 universities and triggered a ransom demand from the ShinyHunters group.*
Context On Thursday, Seton Hall’s Chief Information Officer Paul Fisher announced the restoration of Canvas access for students and faculty. The outage began earlier that day, disabling course materials, assignments, and exam portals across the campus. Fisher warned that some third‑party integrations remain offline and directed users to the university’s Systems Status page for updates.
Key Facts The Canvas disruption is a subset of a massive security incident at Instructure, the vendor that hosts Canvas for thousands of higher‑education institutions. ShinyHunters, a known cybercrime group, claimed to have exfiltrated personal data from the breach and demanded a ransom from Instructure. The initial deadline was May 6; the group later extended it to May 12, threatening public release of the stolen information.
University Relations confirmed that the compromised data includes personal identifiers such as names and email addresses, but no passwords, dates of birth, government IDs, or financial details. The university is collaborating with Instructure to delineate the precise impact on its community and has issued precautionary guidance.
Fisher thanked the campus for patience, noting the added stress during a critical academic week. He urged users to remain vigilant for suspicious messages referencing Canvas, “courses,” or “account recovery,” and to log in only through the standard Seton Hall credentials. Any anomalies should be reported to the Service Desk.
What It Means The breach underscores the risk of supply‑chain attacks, where a single vendor compromise cascades across thousands of organizations. For Seton Hall, the immediate concern is the potential exposure of student and staff contact information. While no financial or credential data appears to have been taken, attackers could leverage the harvested personal details for phishing campaigns targeting the university community.
Mitigations - Enforce multi‑factor authentication for all Canvas logins to block credential‑stuffing attacks. - Deploy detection signatures for known ShinyHunters TTPs (MITRE ATT&CK techniques T1078 – Valid Accounts, T1566 – Phishing) on email gateways and network monitors. - Apply any patches released by Instructure promptly; monitor the vendor’s advisory portal for updates. - Conduct a university‑wide phishing awareness drill, emphasizing verification of sender domains and avoidance of unsolicited account‑recovery links. - Review and tighten API integrations with Canvas, disabling any nonessential third‑party connections until they are vetted.
What to Watch Next Watch for Instructure’s final breach report, any public leak of the stolen data, and subsequent ransom negotiations that could affect additional institutions.
Continue reading
More in this thread
Second Canvas Breach Exposes Data of Nearly 300 Million Users, Triggers Test Cancellations
Peter Olaleru
Canvas Data Breach Exposes 9,000 Universities Worldwide, ShinyHunters Allegedly Steal 3.65TB
Peter Olaleru
Second Canvas breach in eight days exposes data of nearly 300 million users
Peter Olaleru
Conversation
Reader notes
Loading comments...