275 million
Instructure, the parent company of the Canvas Learning Management System, has reached an agreement with the ShinyHunters hacking group to resolve a massive data breach that impacted approximately 275 million users and nearly 9,000 educational institutions globally. The breach, which occurred in late April and early May 2026, involved the exfiltration of 3.65 terabytes of sensitive data, including student and faculty personal information. While Instructure confirmed the deal was made to secure and delete the stolen data, the lack of transparency regarding a potential ransom payment and the reliance on the attackers' promise of data destruction have drawn criticism and heightened concerns about setting a dangerous precedent for handling ransomware incidents.
The attack was first detected by Instructure on April 29, 2026, with a subsequent incident on May 7. The threat actors, publicly identified as ShinyHunters, exploited a vulnerability in the "Free-for-Teacher" environment of the Canvas platform. This initial access allowed them to escalate privileges, move laterally, and ultimately exfiltrate a vast trove of data. The stolen information reportedly includes student ID numbers, full names, email addresses, course enrollment details, and private messages. The attack culminated in widespread service disruptions during a critical period of final exams for many institutions, and the defacement of login portals with taunting messages, amplifying the chaos and psychological impact on the education sector.
The attack chain appears to have initiated through the exploitation of a vulnerability in a less-secure, public-facing component of the Canvas ecosystem. This aligns with common threat actor TTPs for initial access into large cloud environments.
MITRE ATT&CK Techniques Identified:
T1190 - Exploit Public-Facing Application: The attackers exploited a flaw in the "Free-for-Teacher" environment to gain their initial foothold.T1530 - Data from Cloud Storage Object: The attackers accessed and staged data from Canvas's underlying cloud infrastructure.T1041 - Exfiltration Over C2 Channel: The 3.65 TB of data was exfiltrated to attacker-controlled infrastructure.T1485 - Data Destruction: While the data was stolen for extortion, the threat of public release or deletion is a core part of the impact. The attackers also engaged in T1491.001 - Defacement by altering school login portals.T1071.001 - Web Protocols: Assumed to be used for C2 communications and data exfiltration.The decision to negotiate with threat actors is fraught with risk. While Instructure aimed for "peace of mind," security professionals understand that there is no technical way to verify that a cybercriminal has truly deleted all copies of stolen data. The "shred logs" provided by ShinyHunters are likely worthless as proof.
The business impact of this breach is catastrophic for Instructure and its customers. The disruption during final exams caused significant operational and academic damage to thousands of schools. The exfiltration of PII for 275 million individuals creates a long-term risk of identity theft, phishing, and fraud. For Instructure, the financial impact includes the undisclosed settlement amount, massive incident response costs, and potential regulatory fines under frameworks like GDPR and CCPA. The reputational damage is immense and could lead to a loss of customers as institutions question the security of the platform. Cyber insurers are also taking note, as the incident highlights the systemic risk posed by attacks on widely adopted cloud service providers.
No specific technical Indicators of Compromise (IOCs) such as IP addresses, domains, or file hashes were mentioned in the source articles.
Security teams may want to hunt for activity related to the exploitation of educational software platforms. The following patterns could indicate related activity:
User Geolocation Logon Pattern Analysis (D3-UGLPA) can help detect suspicious login patterns.Network Traffic Analysis (D3-NTA).Application Configuration Hardening (D3-ACH).Multi-factor Authentication (D3-MFA).Broadcast Domain Isolation (D3-BDI).Instructure confirms ransom payment to ShinyHunters for Canvas data breach, triggering a U.S. congressional investigation.
Promptly patching the exploited vulnerability in the 'Free-for-Teacher' environment is the primary mitigation.
Properly segmenting trial or sandbox environments like 'Free-for-Teacher' from production systems could have prevented the breach from escalating.
Enhanced logging and auditing of data access patterns within the cloud environment could help detect anomalous activity sooner.
Enforcing MFA on all accounts, especially administrative ones, increases the difficulty for attackers to move laterally even after an initial compromise.
Instructure first detects the cyberattack on its systems.
A second related incident is detected by Instructure.
Instructure announces it has reached an agreement with the threat actors.
The deadline set by ShinyHunters for a settlement was due to expire.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.