Cybersecurity6 hrs ago

ShinyHunters Claims 3.65 TB Canvas Breach, Issues Pay‑or‑Leak Ultimatum

ShinyHunters claims theft of 3.65 TB of Canvas data affecting nearly 9,000 schools worldwide, issues a pay‑or‑leak ultimatum, and marks its second breach of Instructure in eight months.

Peter Olaleru/3 min/US

Cybersecurity Editor

TweetLinkedIn
ShinyHunters Claims 3.65 TB Canvas Breach, Issues Pay‑or‑Leak Ultimatum

ShinyHunters Claims 3.65 TB Canvas Breach, Issues Pay‑or‑Leak Ultimatum

Source: EnOriginal source

TL;DR: On April 30, 2026, Instructure disclosed that ShinyHunters stole 3.65 TB of Canvas data—about 275 million records from nearly 9,000 schools worldwide—and issued a pay‑or‑leak threat. This marks the group’s second breach of the vendor in eight months, following a September 2025 Salesforce intrusion.

Context

Instructure, maker of the Canvas learning management system, said the breach was discovered on April 30 and appears contained. Canvas serves roughly 41 percent of North American higher‑education institutions and thousands of K‑12 districts. The stolen data includes names, email addresses, student ID numbers, and private messages exchanged inside the platform. Instructure said there is no evidence that passwords, dates of birth, government identifiers, or financial information were accessed.

Key Facts

- ShinyHunters claims the exfiltrated volume is 3.65 TB, equivalent to about 275 million records from students, teachers, and staff at nearly 9,000 institutions globally. - The group has issued a pay‑or‑leak ultimatum, threatening to publish the data unless its demands are met. - This incident follows a September 2025 intrusion in which ShinyHunters used social engineering to compromise Instructure’s Salesforce environment, marking the second attack on the same vendor within eight months.

What It Means

The exposure of private messages raises the risk of highly targeted phishing that references real courses and conversations, increasing the likelihood of credential theft. Affected institutions must assess notification obligations under FERPA, COPPA, and roughly 130 state student‑privacy statutes, most of which place the burden on the school rather than the vendor.

Mitigations / What Defenders Should Do - Apply the latest Canvas security patches released by Instructure and verify that all privileged credentials and access tokens have been revoked. - Rotate application keys and enforce multi‑factor authentication for admin accounts. - Monitor for anomalous login attempts and unusual data exfiltration using detection rules for MITRE ATT&CK techniques T1078 (Valid Accounts), T1566 (Phishing), and T1041 (Exfiltration Over Command‑and‑Control Channel). - Educate users about phishing that references specific course names or recent discussions; consider implementing email authentication controls such as DMARC, DKIM, and SPF. - Maintain offline backups of critical data and test restoration procedures regularly.

Watch for any follow‑up statements from ShinyHunters regarding the pay‑or‑leak deadline and for official guidance from Instructure on additional hardening measures.

TweetLinkedIn

More in this thread

Reader notes

Loading comments...