Cybersecurity1 hr ago

Wake County Schools Halt Canvas After ShinyHunters Ransom Note Exposes 275 Million Records

Wake County shuts down Canvas following a ShinyHunters ransom note threatening to leak data from 275 million education users by May 12 2026.

Peter Olaleru/3 min/GB

Cybersecurity Editor

TweetLinkedIn
harvard-university.jpg
Source: TimeOriginal source

Wake County schools shut down Canvas after a ShinyHunters ransom note threatened to leak data from over 275 million education users, giving a May 12 2026 deadline.

Context Instructure, the owner of the Canvas learning management system, confirmed a cybersecurity incident over the weekend that affected thousands of schools worldwide. Wake County learned of the breach on Tuesday and notified families Wednesday. On Thursday users saw a pop‑up claiming to be from ShinyHunters, demanding contact by the end of May 12 2026 or threatening public release of personal data.

Key Facts - The ransom note gave a hard deadline of May 12 2026 for negotiation. - ShinyHunters claimed the Instructure breach exposed personal data of more than 275 million students, teachers, and staff. - No evidence has been found that passwords, dates of birth, government identifiers, or financial information were compromised. - Duke University and UNC‑Chapel Hill reported Canvas outages and are monitoring for any impact on grade submissions due May 11. - The attack vector appears to be a compromised Instructure service; specific CVEs have not been publicly disclosed yet.

What It Means The disruption forces schools to revert to alternative methods for distributing assignments and collecting work while the investigation continues. Affected institutions must communicate clearly with students and staff to prevent phishing attempts linked to the pop‑up. The incident highlights the reliance of K‑12 and higher education on a single LMS provider and the cascading risk when that provider is breached.

What Defenders Should Do - Apply the latest security patches for Instructure Canvas components as soon as they are released. - Monitor network traffic for indicators of compromise tied to ShinyHunters, such as unusual outbound connections to known malicious IPs (MITRE ATT&CK T1071). - Enforce multi‑factor authentication for all Canvas admin and user accounts. - Deploy email and web‑filtering rules to block links or attachments referenced in the ransom pop‑up. - Review and test incident response plans, ensuring timely notification procedures for data‑breach scenarios.

Watch for any official statement from Instructure regarding a potential ransom payment, further details on the exploited vulnerability, and whether the threatened data leak materializes after the May 12 deadline.

TweetLinkedIn

More in this thread

Reader notes

Loading comments...