Human
Canvas is online again after ShinyHunters threaten to leak schools’ data
Posts from this topic will be added to your daily email digest and your homepage feed.
3 days ago
Instructure’s Canvas platform — the digital backbone of classrooms around the world — has just been yanked into a very real-world crisis: a high‑stakes standoff between a prolific hacking gang and an ed‑tech giant that runs on school‑day deadlines.
The saga began earlier in the week, when education tech giant Instructure confirmed it had suffered a data breach involving its widely used learning management system, Canvas. The attackers were not shy about who they were: the hacking and extortion outfit ShinyHunters quickly claimed responsibility.
According to reporting based on a sample of the stolen data, the hackers accessed students’ private information, including their names, personal email addresses, and messages between teachers and students — exactly the categories of data Instructure later acknowledged were compromised. The group, already known for hitting universities and cloud database firms, boasted that this time they had gone much bigger.
ShinyHunters claimed the breach touched roughly 9,000 schools globally and exposed data on as many as 275 million individuals, with stolen files allegedly covering information on 231 million people. A list of about 8,800 supposedly impacted schools was shared, though reporters couldn’t confirm how many were actually affected or even current Canvas customers.
A sample of data seen by journalists allegedly included:
The sample did not include passwords or other categories Instructure said were untouched by the breach, but it was more than enough to confirm that real students’ personal communications and identifiers were now leverage in an extortion play.
Instructure, for its part, responded with caution and tight lips. When contacted, spokesperson Kate Holmes declined to answer detailed questions and instead pointed reporters to a dedicated incident page where the company was posting updates.
If phase one was about data theft, phase two was about spectacle.
By Tuesday, after that initial disclosure, ShinyHunters told reporters they had compromised Instructure again — and this time they had something students and teachers couldn’t miss: school login pages.
TechCrunch observed defaced Canvas login portals at three separate schools, where the usual institutional branding had been replaced with an HTML‑injected ransom message from ShinyHunters. The threat was stark: the group said it would publish the stolen data on May 12 if Instructure did not “negotiate a settlement.”
This new move appeared calculated to crank up public and institutional pressure. After all, it’s one thing to quietly know your data might be at risk; it’s another to have your daily login portal hijacked by extortionists.
A member of ShinyHunters claimed to reporters that this was a second, separate breach, but refused to provide technical details. What was clear is that the group had learned exactly where to hit Instructure to cause maximum chaos: the front door to classes, grades, assignments, and communication.
At the same time, Instructure’s own properties were struggling. The main website reportedly flickered between being online and returning “too many requests” errors, while the Canvas portal displayed a banner saying it was undergoing “scheduled maintenance.” For students and teachers in the midst of coursework, finals, or grading, the timing was brutal.
The real shockwave hit on Thursday, when Canvas — the learning management backbone for thousands of institutions — effectively went offline for many users.
A “massive outage” began with a stark ransom note claiming to be from ShinyHunters, appearing directly within the platform. Students trying to access classes were instead greeted with a message declaring:
“ShinyHunters has breached Instructure (again). Instead of contacting us to resolve it they ignored us and did some ‘security patches.’ If any of the schools in the affected list are interested in preventing the release of their data, please consult with a cyber advisory firm and contact us privately at TOX to negotiate a settlement. You have till the end of the day by 12 May 2026 before everything is leaked.”
The message linked to a list of schools the hackers claimed to have breached through Canvas, mirroring earlier boasts.
Instructure’s response was blunt: pull the plug, then investigate.
“Yesterday, Instructure discovered the unauthorized actor involved in our ongoing security incident made changes to the pages that appeared when some students and teachers were logged in. Out of an abundance of caution, we immediately took Canvas offline to contain access and further investigate,” the company said in a statement.
“We regret the inconvenience and concern this may have caused.”
The decision effectively froze a huge slice of global education infrastructure. Classes, assignments, grading workflows, and communications were all tied to a platform that, for critical hours, wasn’t there.
By later Thursday, Canvas was back — mostly.
Instructure’s status updates indicated that core Canvas services had been restored for the majority of users, though some systems remained in maintenance mode, including Canvas Beta and Canvas Test environments. The company also said it was investigating login issues affecting Student ePortfolios.
But there was a significant casualty: Free‑For‑Teacher accounts.
“We have confirmed that the unauthorized actor exploited an issue related to our Free-For-Teacher accounts. As a result, we have made the difficult decision to temporarily shut down our Free-For-Teacher accounts,” Instructure said, without specifying when or how those accounts might come back.
That move effectively cut off a swath of educators, adjuncts, and institutions — especially smaller or under‑resourced ones — who rely on the free tier to run classes.
Meanwhile, ShinyHunters’ May 12 deadline loomed. The group’s strategy was clear: use public defacements, platform outages, and a ticking clock to push schools and the vendor into paying up.
ShinyHunters is playing a familiar game, but at unprecedented scale.
They’ve claimed:
Yet they’re deliberately vague on technical specifics, declining to explain how they pulled off the second claimed breach. The posture is classic extortion: share just enough proof to build fear and credibility, but keep the operational details opaque to maintain the upper hand.
Instructure is walking a tightrope.
It has:
Publicly, however, the company has been restrained. It declined to answer detailed questions for reporters, funneling inquiries to a generic incident page instead. The official statements emphasize caution, regret, and restoration over granular disclosure of security failures.
From a business and legal standpoint, that’s unsurprising. From a parent, student, or teacher’s standpoint, it’s maddeningly opaque.
The group most affected has the least control.
Schools face potential reputational damage, operational disruption, and tough questions from families about why their children’s messages and personal details were exposed. Many institutions listed by the hackers may not even know yet whether their data is actually in the trove; reporters couldn’t confirm the full scope of affected schools.
Students and teachers are left wondering:
The defacement of login pages and the platform‑wide outage were not just technical events; they were psychological signals that the digital classroom is nowhere near as insulated from the internet’s darker corners as many assumed.
Chronologically, the story is simple: a major breach disclosure; a claimed second hack with high‑visibility defacements; a ransom countdown; a platform takedown and partial revival. But underneath that timeline is a harder truth: when one cloud platform underpins thousands of schools, it also centralizes risk.
ShinyHunters clearly understands that central point of failure — and is exploiting it with ruthless efficiency.
Instructure now faces a dual crisis: a technical scramble to secure its systems and a trust crisis with institutions that built their daily operations on Canvas. For the schools themselves, the choices are even uglier: ride out the threat and hope Instructure holds the line, or weigh the unthinkable — engaging, directly or indirectly, with extortionists.
The countdown to May 12 isn’t just about whether data gets dumped. It’s a stress test for how modern education — digitized, centralized, and dependent on a handful of platforms — handles a future where ransomware gangs treat school as just another high‑value target.