Wake County Shuts Canvas After ShinyHunters Ransom Pop‑up Threat
Wake County disables Canvas and warns users not to engage with a ShinyHunters ransom pop‑up after a breach exposing 275 million records.
Visual sourcing
No source-linked image is attached to this story yet. Measured Take avoids generic stock art when a relevant credited image is not available.
TL;DR
Wake County has disabled access to Canvas and told users to ignore a ransomware pop‑up that claims to have breached Instructure, a breach that ShinyHunters says exposed data for over 275 million students and staff.
Context Instructure, the company behind Canvas, suffered a breach over the weekend. The criminal extortion group ShinyHunters announced the attack, claiming it affected nearly 9,000 schools worldwide. The group posted a pop‑up inside Canvas demanding a settlement by May 12, 2026, and threatened public release of personal data.
Key Facts - Wake County discovered the breach on Tuesday and notified families the next day. The district’s response on Thursday was to temporarily shut down Canvas for all users. - The pop‑up appeared for some users who logged in on Thursday, presenting a link to a list of affected schools and a deadline to contact the attackers. - ShinyHunters asserts the breach exposed personal identifying information for more than 275 million students, teachers and staff, but Wake County says no passwords, dates of birth, government IDs or financial data appear to have been taken. - Similar disruptions hit UNC‑Chapel Hill and Duke University, both of which confirmed the outage but reported no evidence of sensitive credential theft. - Canvas powers roughly 41 % of North American higher‑education institutions and is the core learning management system for public schools across North Carolina.
What It Means The incident highlights the risk of supply‑chain attacks on widely used SaaS platforms. Even without confirmed credential loss, the public exposure of personal data can fuel phishing and identity‑theft campaigns. The deadline threat is a classic ransomware tactic: create urgency, force victims to pay, and use the promise of data leakage as leverage.
Mitigations – What Defenders Should Do 1. Disable access to compromised services until the provider confirms remediation. Wake County’s shutdown of Canvas follows this best practice. 2. Block malicious URLs associated with the pop‑up using web filtering or DNS sinkholing. The link in the message is a known indicator of compromise. 3. Monitor for credential dumping (MITRE ATT&CK T1003) and unusual authentication patterns across all identity providers. 4. Apply patches released by Instructure. The vendor is expected to issue updates addressing the exploited vulnerability; apply them immediately. 5. Educate users to ignore unsolicited pop‑ups, avoid clicking links, and report suspicious messages to IT security teams. 6. Implement multi‑factor authentication (MFA) for all Canvas accounts to mitigate the impact of any stolen credentials. 7. Conduct a forensic review of logs from the breach window to identify any lateral movement or data exfiltration.
The next step is for Instructure to publish a detailed technical advisory, including any CVE identifiers for the exploited flaw. Security teams should watch for updated detection signatures from threat‑intel feeds and prepare for potential follow‑up extortion attempts after the May 12 deadline.
*Watch for Instructure’s official remediation guide and any new ransomware demands from ShinyHunters after the deadline.*
Continue reading
More in this thread
Conversation
Reader notes
Loading comments...