Cybersecurity2 hrs ago

ShinyHunters Claims 275 Million Records Stolen in Canvas Attack Affecting Canadian Universities

ShinyHunters alleges a breach of Canvas affecting 275 million users and disrupting Canadian universities. Learn the impact and mitigation steps.

Peter Olaleru/3 min/NG

Cybersecurity Editor

TweetLinkedIn
ShinyHunters Claims 275 Million Records Stolen in Canvas Attack Affecting Canadian Universities

ShinyHunters Claims 275 Million Records Stolen in Canvas Attack Affecting Canadian Universities

Source: EnOriginal source

ShinyHunters alleges it stole data on 275 million students, teachers and staff in a Canvas breach that forced several Canadian universities offline.

Context Instructure, the U.S. firm behind the Canvas learning‑management system, confirmed a cyberattack by a “criminal threat actor” last week. The incident knocked Canvas services down at major Canadian institutions, including the University of Toronto, University of British Columbia, and University of Alberta. While Instructure now reports Canvas as fully operational and sees no ongoing unauthorized activity, the fallout continues.

Key Facts - ShinyHunters publicly claimed the theft of 275 million records, covering names, email addresses, student IDs and internal messages. The group did not say passwords, financial data or government IDs were taken. - The University of Alberta linked the breach to a broader Instructure issue that has impacted roughly 9,000 institutions worldwide. - The University of Toronto shut down its Quercus portal, a Canvas‑based service, as a precaution and warned users to avoid the platform while investigations proceed. - The University of British Columbia, Simon Fraser University and OCAD University reported similar disruptions and urged password changes for any active Canvas sessions. - Instructure announced that Canvas is back online, advises customers to review administrator privileges and rotate credentials, and is working directly with affected schools.

What It Means The scale of the claimed data set suggests a systematic exploitation of Canvas’s authentication or API endpoints, likely leveraging stolen admin credentials to harvest user profiles. No specific CVE (Common Vulnerabilities and Exposures) has been disclosed, but the attack aligns with MITRE ATT&CK techniques T1078 (Valid Accounts) and T1566.002 (Phishing: Spearphishing Link) often used by financially motivated groups. For Canadian universities, the breach raises immediate compliance concerns under provincial privacy statutes and the federal Personal Information Protection and Electronic Documents Act (PIPEDA). Institutions must assess whether the exposed data triggers mandatory breach notification thresholds and prepare for potential class‑action litigation.

Mitigations – What Defenders Should Do 1. Rotate all service‑account passwords and enforce multi‑factor authentication for admin access to Canvas. 2. Audit API keys for unused or overly permissive scopes; revoke any that are not required. 3. Deploy detection signatures for anomalous login patterns, especially from geographic locations outside the institution’s normal user base. 4. Apply any patches released by Instructure promptly; monitor the vendor’s advisory portal for updates. 5. Conduct a credential‑reuse assessment to ensure passwords compromised elsewhere are not reused on Canvas. 6. Inform affected users promptly, provide guidance on monitoring for phishing attempts, and require password changes for all Canvas accounts. 7. Review and tighten network segmentation to isolate the learning‑management system from critical campus services.

The next step will be a detailed forensic report from Instructure and law‑enforcement. Security teams should watch for follow‑up disclosures on the specific vulnerability exploited and be ready to adjust defenses accordingly.

TweetLinkedIn

More in this thread

Reader notes

Loading comments...