ShinyHunters Claims 275 Million Records Stolen in Canvas Attack Affecting Canadian Universities
ShinyHunters alleges a breach of Canvas affecting 275 million users and disrupting Canadian universities. Learn the impact and mitigation steps.

ShinyHunters Claims 275 Million Records Stolen in Canvas Attack Affecting Canadian Universities
TL;DR
ShinyHunters alleges it stole data on 275 million students, teachers and staff in a Canvas breach that forced several Canadian universities offline.
Context Instructure, the U.S. firm behind the Canvas learning‑management system, confirmed a cyberattack by a “criminal threat actor” last week. The incident knocked Canvas services down at major Canadian institutions, including the University of Toronto, University of British Columbia, and University of Alberta. While Instructure now reports Canvas as fully operational and sees no ongoing unauthorized activity, the fallout continues.
Key Facts - ShinyHunters publicly claimed the theft of 275 million records, covering names, email addresses, student IDs and internal messages. The group did not say passwords, financial data or government IDs were taken. - The University of Alberta linked the breach to a broader Instructure issue that has impacted roughly 9,000 institutions worldwide. - The University of Toronto shut down its Quercus portal, a Canvas‑based service, as a precaution and warned users to avoid the platform while investigations proceed. - The University of British Columbia, Simon Fraser University and OCAD University reported similar disruptions and urged password changes for any active Canvas sessions. - Instructure announced that Canvas is back online, advises customers to review administrator privileges and rotate credentials, and is working directly with affected schools.
What It Means The scale of the claimed data set suggests a systematic exploitation of Canvas’s authentication or API endpoints, likely leveraging stolen admin credentials to harvest user profiles. No specific CVE (Common Vulnerabilities and Exposures) has been disclosed, but the attack aligns with MITRE ATT&CK techniques T1078 (Valid Accounts) and T1566.002 (Phishing: Spearphishing Link) often used by financially motivated groups. For Canadian universities, the breach raises immediate compliance concerns under provincial privacy statutes and the federal Personal Information Protection and Electronic Documents Act (PIPEDA). Institutions must assess whether the exposed data triggers mandatory breach notification thresholds and prepare for potential class‑action litigation.
Mitigations – What Defenders Should Do 1. Rotate all service‑account passwords and enforce multi‑factor authentication for admin access to Canvas. 2. Audit API keys for unused or overly permissive scopes; revoke any that are not required. 3. Deploy detection signatures for anomalous login patterns, especially from geographic locations outside the institution’s normal user base. 4. Apply any patches released by Instructure promptly; monitor the vendor’s advisory portal for updates. 5. Conduct a credential‑reuse assessment to ensure passwords compromised elsewhere are not reused on Canvas. 6. Inform affected users promptly, provide guidance on monitoring for phishing attempts, and require password changes for all Canvas accounts. 7. Review and tighten network segmentation to isolate the learning‑management system from critical campus services.
The next step will be a detailed forensic report from Instructure and law‑enforcement. Security teams should watch for follow‑up disclosures on the specific vulnerability exploited and be ready to adjust defenses accordingly.
Continue reading
More in this thread
10 Questions Security Teams Must Answer Before Deploying AI for Vulnerability Hunting
Peter Olaleru
Canadian Universities Grapple with Canvas Breach Exposing 275 Million Records
Peter Olaleru
ShinyHunters Breach Takes Canvas Offline for 9,000 Schools, Triggers Exam Delays
Peter Olaleru
Conversation
Reader notes
Loading comments...