Cybersecurity1 hr ago

ShinyHunters Claims Canvas Hack Exposes Data of 9,000 Schools Including Ivy League

ShinyHunters claims it breached Instructure’s Canvas LMS, exposing data from roughly 9,000 institutions including Ivy League schools. Lawmakers seek a briefing by May 21.

Peter Olaleru/3 min/US

Cybersecurity Editor

TweetLinkedIn
ShinyHunters Claims Canvas Hack Exposes Data of 9,000 Schools Including Ivy League
Source: EuOriginal source

TL;DR: ShinyHunters claims it breached Instructure’s Canvas LMS, exposing data from about 9,000 institutions including several Ivy League schools. The House Homeland Security Committee has asked Instructure to brief lawmakers by May 21.

Context: Canvas is a widely used learning management system that hosts course materials, grades, and communications for colleges and K‑12 districts. Attackers often target such platforms because they aggregate valuable personal data that can be reused in phishing or identity‑theft schemes.

Key Facts: According to a document posted by ShinyHunters, the intrusion affected roughly 9,000 customers, naming Georgetown, Harvard, and Cornell among them. The hackers say they accessed names, email addresses, student IDs, and private messages exchanged within Canvas. Instructure disclosed that the attackers exploited a vulnerability in the support‑ticket function of its Free for Teacher environment. The group posted an extortion note giving Instructure until May 12 to contact them before threatening to leak the data; the deadline has passed and the note was later removed from their portal. The House Homeland Security Committee sent a letter to Instructure CEO Steve Daly requesting a briefing by May 21, and the FBI has confirmed awareness of the incident.

What It Means: The stolen identifiers enable attackers to craft convincing spear‑phishing emails that appear to come from trusted university addresses, increasing the risk of credential harvesting and follow‑on intrusions. While immediate financial theft is unlikely, the data can fuel long‑term social‑engineering campaigns against students, faculty, and parents. Educational institutions should treat the breach as a signal to review third‑party vendor security and monitor for anomalous login attempts.

Mitigations: Defenders should apply any patches Instructure releases for the support‑ticket vulnerability (tracked as CVE‑2024‑XXXX if assigned) and restrict public access to the Free for Teacher portal unless required. Enforce multi‑factor authentication on all Canvas and associated email accounts. Monitor login logs for impossible travel or use of compromised credentials (MITRE ATT&CK T1078). Deploy detection rules for suspicious support‑ticket submissions (T1190 – Exploit Public‑Facing Application). Regularly review third‑party service contracts for security clauses and incident‑notification timelines.

Watch for further updates from Instructure on any data‑leak disclosures, the outcome of the House Homeland Security Committee’s briefing, and any extortion‑related messages that may surface in the coming weeks.

TweetLinkedIn

More in this thread

Reader notes

Loading comments...