275 million
Instructure, the parent company of the popular Canvas Learning Management System (LMS), has confirmed a significant data breach after the ShinyHunters extortion group claimed to have stolen 3.65 TB of data affecting 275 million users. The breach, which began around May 1, 2026, exposed user PII, including names, email addresses, student IDs, and private messages. ShinyHunters has threatened to leak the data if a ransom is not paid by May 6th. Instructure has engaged cybersecurity experts, notified law enforcement, and is taking remedial actions, including rotating all application keys. The attack vector may have involved a vulnerability in Instructure's systems or a Salesforce misconfiguration.
On May 1, 2026, educational technology firm Instructure disclosed a cybersecurity incident that caused disruptions to its services, including the Canvas LMS. By May 3rd, the ShinyHunters threat group claimed responsibility, posting Instructure on its dark web leak site. The group's claims are vast, asserting the exfiltration of data belonging to 275 million users from nearly 9,000 schools and universities across North America, Europe, and the Asia-Pacific region.
The compromised data reportedly includes:
Instructure has confirmed the exposure of this data but maintains that more sensitive information such as passwords, financial data, or government IDs were not accessed. The threat actors have set a deadline of May 6, 2026, for the company to make contact before they begin leaking the stolen data, employing a classic "Pay or Leak" extortion tactic.
The exact initial access vector has not been officially confirmed by Instructure. However, reports suggest two potential avenues exploited by ShinyHunters:
The attack appears to have focused on large-scale data exfiltration rather than service disruption, a hallmark of ShinyHunters' operations. The group is known for targeting large databases and selling the stolen information on underground forums.
T1190 - Exploit Public-Facing Application: Potentially used for initial access if an unpatched vulnerability was the entry point.T1530 - Data from Cloud Storage Object: If a misconfigured Salesforce or other cloud asset was involved, attackers would have accessed data stored there.T1213 - Data from Information Repositories: The primary objective was to access and steal data from the Canvas LMS databases.T1567 - Exfiltration Over Web Service: Attackers likely used common web protocols (HTTP/S) to exfiltrate the 3.65 TB of data to avoid detection.T1485 - Data Destruction: While not executed, the threat to leak data is a form of extortion tied to the potential destruction of its confidentiality and value.The business impact on Instructure is severe, encompassing reputational damage, potential regulatory fines under laws like GDPR and FERPA, and significant costs for incident response, remediation, and potential litigation. For the nearly 9,000 affected educational institutions, the breach erodes trust and poses a significant risk to student and faculty privacy. The exposure of private messages could lead to blackmail, social engineering, and targeted phishing campaigns against millions of individuals. The sheer scale of 275 million affected users makes this one of the largest education sector breaches to date.
No specific Indicators of Compromise (IPs, domains, hashes) were mentioned in the source articles.
The following patterns could indicate related activity:
url_pattern/api/v1/conversationslog_sourceSalesforce Event Monitoring LogsApiTotalUsage events or ReportExport events by unprivileged users.network_traffic_patternLarge egress traffic from production database serverscloud_observableAnomalous IAM activity in AWS/AzureSecurity teams at affected institutions should immediately take the following steps:
Defensive techniques from the D3FEND framework, such as D3-NTA - Network Traffic Analysis and D3-UBA - User Behavior Analysis, are crucial for detecting anomalous data access and exfiltration patterns.
Instructure has already begun mitigation by rotating API keys, which is a critical first step. Long-term recommendations include:
D3-PH - Platform Hardening.D3-SU - Software Update.Implement Cloud Security Posture Management (CSPM) to continuously detect and remediate misconfigurations in cloud services like Salesforce.
Enhance logging and monitoring of API access and data queries to detect anomalous behavior, such as unusually large data exports.
Deploy Data Loss Prevention (DLP) solutions at network egress points to inspect and block unauthorized transfers of large volumes of sensitive data.
Maintain a rigorous patch management process to ensure all public-facing applications and systems are updated to prevent exploitation of known vulnerabilities.
Instructure discloses a cybersecurity incident causing service disruptions.
Access to Canvas Data 2 platform is largely restored.
ShinyHunters claims responsibility on its dark web leak site, threatening to leak data.
Deadline set by ShinyHunters for Instructure to make contact before data is leaked.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.