Educational Tech Giant Instructure Hit by Major Data Breach, ShinyHunters Threatens to Leak Data of 275 Million Users

Instructure Confirms Massive Breach; ShinyHunters Claims 275 Million User Records from Canvas LMS

HIGH
May 4, 2026
5m read
Data BreachThreat ActorSupply Chain Attack

Impact Scope

People Affected

275 million

Industries Affected

EducationTechnology

Related Entities

Threat Actors

Products & Tech

Canvas LMS Canvas Data 2Salesforce

Other

Instructure

Full Report

Executive Summary

Instructure, the parent company of the popular Canvas Learning Management System (LMS), has confirmed a significant data breach after the ShinyHunters extortion group claimed to have stolen 3.65 TB of data affecting 275 million users. The breach, which began around May 1, 2026, exposed user PII, including names, email addresses, student IDs, and private messages. ShinyHunters has threatened to leak the data if a ransom is not paid by May 6th. Instructure has engaged cybersecurity experts, notified law enforcement, and is taking remedial actions, including rotating all application keys. The attack vector may have involved a vulnerability in Instructure's systems or a Salesforce misconfiguration.


Threat Overview

On May 1, 2026, educational technology firm Instructure disclosed a cybersecurity incident that caused disruptions to its services, including the Canvas LMS. By May 3rd, the ShinyHunters threat group claimed responsibility, posting Instructure on its dark web leak site. The group's claims are vast, asserting the exfiltration of data belonging to 275 million users from nearly 9,000 schools and universities across North America, Europe, and the Asia-Pacific region.

The compromised data reportedly includes:

  • Full names
  • Email addresses
  • Student ID numbers
  • Private messages exchanged between students and faculty

Instructure has confirmed the exposure of this data but maintains that more sensitive information such as passwords, financial data, or government IDs were not accessed. The threat actors have set a deadline of May 6, 2026, for the company to make contact before they begin leaking the stolen data, employing a classic "Pay or Leak" extortion tactic.


Technical Analysis

The exact initial access vector has not been officially confirmed by Instructure. However, reports suggest two potential avenues exploited by ShinyHunters:

  1. System Vulnerability: The threat actors may have exploited an unspecified vulnerability in Instructure's infrastructure, which has since been patched.
  2. Salesforce Misconfiguration: ShinyHunters also claimed to have breached Instructure's Salesforce instance, which could point to a cloud configuration weakness as a potential entry point or a method for data exfiltration.

The attack appears to have focused on large-scale data exfiltration rather than service disruption, a hallmark of ShinyHunters' operations. The group is known for targeting large databases and selling the stolen information on underground forums.

MITRE ATT&CK Techniques


Impact Assessment

The business impact on Instructure is severe, encompassing reputational damage, potential regulatory fines under laws like GDPR and FERPA, and significant costs for incident response, remediation, and potential litigation. For the nearly 9,000 affected educational institutions, the breach erodes trust and poses a significant risk to student and faculty privacy. The exposure of private messages could lead to blackmail, social engineering, and targeted phishing campaigns against millions of individuals. The sheer scale of 275 million affected users makes this one of the largest education sector breaches to date.


IOCs — Directly from Articles

No specific Indicators of Compromise (IPs, domains, hashes) were mentioned in the source articles.


Cyber Observables — Hunting Hints

The following patterns could indicate related activity:

Type
url_pattern
Value
/api/v1/conversations
Description
Monitor for anomalous access patterns or large data pulls from the Canvas API endpoint for messages.
Type
log_source
Value
Salesforce Event Monitoring Logs
Description
Hunt for unusual ApiTotalUsage events or ReportExport events by unprivileged users.
Type
network_traffic_pattern
Value
Large egress traffic from production database servers
Description
Unusually large data transfers from servers hosting Canvas data to unknown external IP addresses.
Type
cloud_observable
Value
Anomalous IAM activity in AWS/Azure
Description
Look for suspicious creation of access keys or role assumption by unfamiliar principals with access to production data stores.

Detection & Response

Security teams at affected institutions should immediately take the following steps:

  1. Monitor for Leaked Data: Use threat intelligence services to monitor dark web forums and marketplaces for the appearance of institutional data.
  2. User Communication: Alert users about the breach and advise them to be vigilant against phishing emails that may leverage their exposed personal information.
  3. Log Analysis: Review logs for any unusual API activity related to the Canvas integration, particularly focusing on the timeframe of the breach.
  4. Phishing Awareness: Increase awareness and training for students and faculty on how to spot targeted phishing attacks that may use information from the breach to appear legitimate.

Defensive techniques from the D3FEND framework, such as D3-NTA - Network Traffic Analysis and D3-UBA - User Behavior Analysis, are crucial for detecting anomalous data access and exfiltration patterns.


Mitigation

Instructure has already begun mitigation by rotating API keys, which is a critical first step. Long-term recommendations include:

  1. API Key Management: Enforce regular, automated rotation of all API keys and credentials. Implement stricter access controls on which services can access sensitive APIs.
  2. Cloud Security Posture Management (CSPM): Implement CSPM tools to continuously scan for misconfigurations in cloud environments like Salesforce, AWS, and Azure. This aligns with D3FEND's D3-PH - Platform Hardening.
  3. Data Loss Prevention (DLP): Deploy DLP solutions to monitor and block large-scale exfiltration of sensitive data from the network and cloud environments.
  4. Vulnerability Management: Enhance the vulnerability scanning and patch management program to ensure all public-facing applications are patched in a timely manner. This corresponds to D3FEND's D3-SU - Software Update.
  5. Data Minimization: Review data retention policies to ensure that only necessary data is stored and that sensitive information, like private messages, is archived or deleted after a certain period.

Timeline of Events

1
May 1, 2026
Instructure discloses a cybersecurity incident causing service disruptions.
2
May 3, 2026
Access to Canvas Data 2 platform is largely restored.
3
May 3, 2026
ShinyHunters claims responsibility on its dark web leak site, threatening to leak data.
4
May 4, 2026
This article was published
5
May 6, 2026
Deadline set by ShinyHunters for Instructure to make contact before data is leaked.

MITRE ATT&CK Mitigations

Implement Cloud Security Posture Management (CSPM) to continuously detect and remediate misconfigurations in cloud services like Salesforce.

Audit

M1047enterprise

Enhance logging and monitoring of API access and data queries to detect anomalous behavior, such as unusually large data exports.

Deploy Data Loss Prevention (DLP) solutions at network egress points to inspect and block unauthorized transfers of large volumes of sensitive data.

Maintain a rigorous patch management process to ensure all public-facing applications and systems are updated to prevent exploitation of known vulnerabilities.

Timeline of Events

1
May 1, 2026

Instructure discloses a cybersecurity incident causing service disruptions.

2
May 3, 2026

Access to Canvas Data 2 platform is largely restored.

3
May 3, 2026

ShinyHunters claims responsibility on its dark web leak site, threatening to leak data.

4
May 6, 2026

Deadline set by ShinyHunters for Instructure to make contact before data is leaked.

Sources & References

Instructure confirms data breach, ShinyHunters claims attack
BleepingComputer (bleepingcomputer.com) May 3, 2026
Instructure, Parent of Canvas, Confirms Data Breach
Security Magazine (securitymagazine.com) May 4, 2026
ShinyHunters Claims Responsibility for Instructure Data Breach
AsatuNews.co.id (asatu.asia) May 4, 2026

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

InstructureCanvasShinyHuntersData BreachEducationExtortionLMS

📢 Share This Article

Help others stay informed about cybersecurity threats

🎯 MITRE ATT&CK Mapped

Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.

🧠 Enriched & Analyzed

Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.

🛡️ Actionable Guidance

Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.

🔗 STIX Visualizer

Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.

Sigma Generator

Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.