Canvas Hacked: ShinyHunters Cyber Attack Exposes Data of 275 Million Students Worldwide

10–15 minutes
Canvas Hacked

It was supposed to be finals week — the most stressful stretch of the academic calendar. Students at Harvard, Columbia, Princeton, and thousands of other institutions across the globe were cramming notes, submitting term papers, and logging into Canvas to check their grades. Then, without warning, the platform went dark. And what replaced the login screen wasn’t a maintenance message. It was a ransom note.

The Canvas cyber attack is now being called one of the largest breaches of educational data in history — and the group behind it is no stranger to headline-grabbing heists.


What Happened: Canvas Down During Finals Week

On May 7, 2026, Instructure — the Utah-based company that operates Canvas, one of the world’s most widely used learning management systems — confirmed a major cybersecurity breach. Canvas was placed into maintenance mode as security teams scrambled to assess the damage and limit further exposure.

Students logging into Canvas were met with something deeply unusual: a message from a criminal hacking group called ShinyHunters, who had replaced normal platform access with a ransom demand. The message was blunt. “ShinyHunters has breached Instructure (again),” it reportedly read, according to CNN. “Instead of contacting us to resolve it, they ignored us and did some ‘security patches.'”

The timing could not have been worse. Thousands of universities across the United States — and many more globally — were running final examinations. Canvas is the backbone of modern academic life: it hosts course materials, assignment submissions, grade books, lecture videos, academic advising messages, and communication between students and faculty. When Canvas went down, it didn’t just inconvenience students. It paralyzed institutions.


The Scale of the Canvas Cyber Attack

The numbers alleged by ShinyHunters are staggering.

According to the group’s own claims on a dark web leak site, the breach affected nearly 9,000 institutions worldwide and compromised the data of up to 275 million individuals — students, teachers, and institutional staff. The group also claimed to have exfiltrated 3.65 terabytes of data, including what they described as “several billion” private messages exchanged on the platform.

Instructure confirmed the breach on its website, acknowledging that the unauthorized actor had accessed personal data, including full names, email addresses, student ID numbers, and messages. The company stated there is no evidence that passwords, dates of birth, government identifiers, or financial information were among the stolen data.

But the exposure of private messages alone is alarming. Canvas is not just used for submitting homework. Students routinely use the platform’s messaging features to disclose sensitive medical information to advisers, request disability accommodations, communicate with Title IX advocates, and discuss mental health challenges. These are exactly the kinds of messages no one expects to see posted on a dark web forum.


Who Are ShinyHunters?

To understand the Canvas hack, you need to understand the group behind it.

ShinyHunters is a financially motivated cybercriminal group that first emerged around 2020. Luke Connolly, a threat intelligence analyst at cybersecurity firm Emsisoft, described the group to the Associated Press as a loosely affiliated network of teenagers and young adults based primarily in the United States and the United Kingdom.

Despite their youth, ShinyHunters have an extensive and serious track record. The group has been linked to breaches targeting Live Nation’s Ticketmaster subsidiary, AT&T, Salesforce, and Rockstar Games, among dozens of other high-profile targets. In 2023, the U.S. Department of Justice announced the sentencing of Sebastien Raoult, a 22-year-old French citizen identified as an alleged ShinyHunters member, to three years in prison and over $5 million in restitution for wire fraud and aggravated identity theft.

Security researchers have also linked ShinyHunters to a broader “supergroup” that operates under the Scattered LAPSUS$ Hunters (SLH) banner — a loose situational alliance that includes LAPSUS$ and Scattered Spider, all sharing roots in a youth cybercrime subculture known as “The Com.” Despite international arrests across France, Canada, Turkey, and Finland, the group has continued operating with little sign of slowing down.

In recent years, ShinyHunters refined their playbook: rather than traditional network intrusions, they pivoted toward vishing (voice phishing) and social engineering campaigns targeting enterprise Salesforce environments — a tactic that proved devastatingly effective against Instructure.


A Second Breach in Eight Months — The Pattern Is Clear

What makes the Canvas hacked story even more troubling is that this is not Instructure’s first rodeo with ShinyHunters.

In September 2025, Instructure disclosed a separate cybersecurity incident in which a social engineering attack gave threat actors access to its Salesforce environment. At the time, the company indicated that no Canvas product data had been accessed in that breach. ShinyHunters claimed responsibility then too — before Instructure had even completed its investigation.

That pattern repeated itself with the May 2026 attack. On May 3, ShinyHunters posted Instructure’s name on its dark web leak site as a “final warning,” giving the company until May 6 to make contact or face a data dump. When Instructure did not respond — or, as the hackers claimed, attempted to patch the vulnerability without engaging — the group escalated.

Two confirmed breaches by the same threat actor, targeting the same company, using similar attack vectors within eight months, raises serious questions about whether Instructure’s post-September remediation was adequate. Cybersecurity analysts at Dataminr noted that both incidents appear to involve Salesforce infrastructure and credential-based access, suggesting the root vulnerability was never fully addressed.

Instructure confirmed that the unauthorized actor had exploited an issue related to Free-For-Teacher accounts — the entry point that allowed the breach to scale. As a result, the company made the decision to temporarily shut down all Free-For-Teacher accounts while restoring access to the main platform.


Which Schools Were Affected? Canvas Down Globally

The disruption extended far beyond any single campus. Students and faculty at some of the most prestigious universities in the United States reported being locked out of Canvas or redirected to the hackers’ ransom message.

In the United States, reported impacts included Harvard University, Princeton University, Columbia University, Georgetown University, Rutgers University, the University of Michigan, the University of Chicago, Baylor University, the University of Maryland, and the University of California system — which ordered all of its campuses to temporarily block Canvas access until the platform could be confirmed secure.

The University of Missouri–St. Louis told students the entire Canvas system was down. Sacramento State students logging into Canvas were redirected to a page displaying the ShinyHunters ransom message.

The damage did not stop at U.S. borders. In Australia, ABC News reported that universities, vocational providers, and some state schools were affected, with the federal government’s National Office of Cyber Security coordinating a response. In the Netherlands, 44 educational institutions reported disruptions. In the United Kingdom, New Zealand, and Sweden, schools also reported impacts or active monitoring.

ShinyHunters listed 8,809 school districts, universities, and online education platforms as affected, with per-institution record counts ranging from tens of thousands to several million individual records.


The Ransom Deadline and What’s at Stake

According to a ransom letter posted by the threat intelligence tracking platform Ransomware.live, ShinyHunters gave Instructure a clear ultimatum: reach out by May 6, 2026 or face a mass data leak along with “several annoying (digital) problems.” When that deadline passed without Instructure engaging, the group escalated to the platform defacement and appeared to extend the deadline to May 12 for final “negotiation.”

ShinyHunters warned that a failure to pay could result in the public release of “several billions of private messages among students and teachers.” As of May 8, 2026, Instructure had not confirmed any negotiations with the attackers.

The legal exposure for Instructure could be enormous. Canvas serves students from elementary school through university, meaning a significant portion of the alleged 275 million affected individuals are likely minors. The FTC’s updated COPPA rule, which took effect on April 22, 2026, carries penalties of up to $51,744 per affected child for violations involving under-13 data. State-level statutes — including New York Education Law 2-d, California’s SOPIPA, and roughly 130 analogous laws — impose additional vendor notification and security obligations.

The closest comparable case is the PowerSchool breach of January 2025, which exposed 62 million student records and resulted in a $17.25 million settlement with class actions filed in 11 states. The Canvas breach, if confirmed at the scale ShinyHunters claims, could dwarf even that.


Why Education Is a Prime Target for Cybercriminals

The Canvas cyber attack is not happening in isolation. It is part of an accelerating pattern of attacks on educational institutions, and ShinyHunters has specifically identified edtech as a lucrative hunting ground.

The structural vulnerability is consistent across incidents: a single SaaS provider holds records on tens of millions of students across thousands of institutions. When that single provider is compromised — through one account, one integration, one poorly patched Salesforce environment — every dependent institution inherits the breach simultaneously.

Canvas joins PowerSchool and Infinite Campus in what cybersecurity researchers at Dataminr describe as a documented pattern of ShinyHunters targeting edtech platforms through Salesforce environments and credential compromise. Past attacks have also hit Minneapolis Public Schools and the Los Angeles Unified School District.

Education is an attractive target for several reasons. Schools store enormous volumes of sensitive personal data — not just names and email addresses, but medical records, mental health disclosures, disciplinary files, and financial aid information. Unlike banks or healthcare companies, most educational institutions lack the cybersecurity budgets and dedicated security personnel to defend against sophisticated threat actors. And because platforms like Canvas serve captive, deadline-driven audiences — students who need access for grades and finals — the leverage for extortion is enormous.


What Students and Parents Should Do Now

If you or your child are a Canvas user, cybersecurity experts recommend taking the following steps immediately:

Change your Canvas password now — even if you haven’t received a specific notification from your institution. Use a unique, strong password that is not reused on any other platform.

Enable multi-factor authentication (MFA) wherever your institution allows it. A code sent via SMS or an authenticator app makes it significantly harder for attackers to use stolen credentials.

Be alert for phishing attempts. The combination of names, email addresses, and student ID numbers exposed in this breach is exactly what social engineers use to craft convincing, targeted phishing emails. If you receive an unexpected email about your account, financial aid, or academic standing, verify it through official channels before clicking anything.

Monitor your child’s accounts. For parents of K-12 students, now is a good time to audit which education platforms your child uses and ensure each has a unique, strong password.

Watch for notifications from your institution. Schools are required to notify affected individuals under various state and federal laws. Follow your institution’s official communications channels for updates.


Instructure’s Response and What Comes Next

By late Thursday, May 7, Instructure said most users had been able to restore access to Canvas. The company stated it had “revoked affected credentials, rotated application keys, and deployed patches.” It also confirmed the shutdown of Free-For-Teacher accounts as a containment measure, describing it as “the difficult decision” necessary to restore confidence in the platform’s security.

In a statement, Instructure said: “We have confirmed that the unauthorized actor exploited an issue related to our Free-For-Teacher accounts. As a result, we have made the difficult decision to temporarily shut down our Free-For-Teacher accounts. This gives us the confidence to restore access to Canvas, which is now fully back online and available for use.”

But the questions that linger are bigger than one statement can answer. Why was a vulnerability connected to Salesforce infrastructure and credential access still exploitable eight months after the first ShinyHunters breach? What specific controls were put in place after September 2025, and why did they fail? And if nearly 9,000 institutions and 275 million individuals are confirmed to have had data accessed, what is the path to accountability?

Institutions affected by the breach are being advised by cybersecurity experts to formally request from Instructure a detailed accounting of what changed after the September 2025 incident — and why those changes were insufficient.


The Bigger Picture: LLMs, AI, and the Future of Edtech Security

The Canvas attack also arrives at a moment when artificial intelligence and large language models (LLMs) are being deeply integrated into the very edtech platforms that were compromised. Canvas itself has been expanding its AI-assisted learning features, and institutions are increasingly building curriculum delivery, automated grading, and personalized tutoring tools on top of platforms like Canvas.

The convergence of AI and education creates both opportunity and risk. LLM-powered tools embedded in LMS platforms often require deep access to student data — messages, grades, behavioral patterns — to function effectively. That data, when housed in centralized platforms, becomes a high-value target for exactly the kind of attack ShinyHunters has demonstrated expertise in executing.

The Canvas hack is a reminder that as edtech grows more powerful and more central to the educational experience, the cybersecurity posture of the companies that operate these platforms must grow with it. The stakes are no longer limited to grades and assignments. They extend to the private lives of tens of millions of students — many of them minors — who trusted these platforms with their most sensitive information.


Final Word

The Canvas hacked incident of May 2026 will be studied in cybersecurity classrooms for years. It exposed the fragility of a centralized edtech infrastructure that nearly half of all North American higher education institutions depend on. It showed that a loosely organized group of young hackers with a refined social engineering playbook can paralyze academic life on a global scale during the most critical week of the academic year.

And it raised a question that Instructure — and every edtech company like it — must now answer: when the breach happens again, and history suggests it will, will the response be different?


Sources: NBC News, TIME, Cybernews, Malwarebytes, Dataminr, WCNC, Wikipedia (2026 Canvas security incident), IBTimes UK


Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top