News

Instructure Removed from ShinyHunters’ Leak Site as Canvas Breach Deadline Passes

Instructure Removed from ShinyHunters' Leak Site as Canvas Breach Deadline Passes

Instructure — the company behind Canvas LMS, the learning management system used by approximately 30 million students and educators across 8,809 institutions — was quietly removed from ShinyHunters' dark web leak site as the threat group's May 12, 2026 ransom deadline passed. No public data dump has followed. Instructure has issued no statement on whether it paid the ransom demand. Security researchers and breach notification experts are now treating the removal as a likely signal that contact or negotiations occurred between Instructure and the attackers.

ShinyHunters Extortion Campaign: What Happened

The breach leading to this standoff began around April 25, 2026, when ShinyHunters (a prolific financially motivated threat group responsible for dozens of high-profile data thefts) exploited Instructure's Free-For-Teacher (FFT) program — a feature that allowed educators to create Canvas accounts without institutional verification. The weaker identity boundaries in the FFT environment gave the attackers a foothold into Instructure's broader infrastructure.

Instructure detected unauthorized activity on April 30 and announced the incident publicly on May 1. The company stated that compromised data included names, email addresses, student ID numbers, and private messages between users. Instructure was explicit that passwords, dates of birth, government identifiers, and financial data were not involved — but that claim has not been independently verified against the attackers' full dataset.

ShinyHunters publicly claimed responsibility on May 3 and posted that they had exfiltrated 3.65 terabytes of data spanning roughly 275 million records across institutions in the United States, Netherlands, Sweden, Australia, and the United Kingdom. Notable institutions in the affected list include Harvard, MIT, Columbia, Cambridge, UC Berkeley, Penn State, Duke, and Cornell. If accurate, the breach would represent the largest educational data theft on record.

On May 5, ShinyHunters posted publicly that Instructure had "not even bothered speaking to us" and set a deadline: pay by the end of May 12, or the full dataset would be released. The ransom amount was never disclosed; ShinyHunters only stated it was "not even as high as you might think."

The Second Attack and Service Disruption

On May 7 — five days before their own deadline — ShinyHunters escalated. Canvas login portals at approximately 330 institutions were defaced with ransomware messaging. Canvas, Canvas Beta, and Canvas Test were taken offline simultaneously. The timing was deliberate: many U.S. universities were in finals week.

ShinyHunters simultaneously pivoted to direct extortion of individual institutions, demanding payment from schools rather than waiting for the corporate parent to settle. Instructure replaced the defacement messages with maintenance notices and restored service for most users within roughly 24 hours. On May 7, Instructure also permanently shut down the Free-For-Teacher program — the attack vector that enabled the initial compromise.

The Removal: What It Likely Means

As of May 10–11, 2026, Instructure's listing disappeared from ShinyHunters' extortion site. In its place sits a corporate press statement that amounts to no substantive disclosure. No data dump followed the May 12 deadline.

Security researchers familiar with ShinyHunters' operational patterns note that victim removal from their leak site typically signals one of three outcomes: a ransom payment has been made, a negotiated settlement (payment in exchange for data deletion or non-release) has been reached, or negotiations are actively underway and the group extended a private deadline. In no previous documented ShinyHunters case has a victim been removed from the site without some form of contact or payment.

Troy Hunt, operator of Have I Been Pwned (HIBP) — the breach notification service that indexes compromised credentials and notifies affected users — flagged this development in his May 10 weekly update, noting that Instructure's silence on the ransom question is notable and that the removal pattern matches prior ShinyHunters negotiation behavior.

Instructure has not responded to media requests asking whether a ransom was paid. The company's last substantive statement was that systems had returned to normal as of May 6 — before the second attack on May 7.

Data Not Yet Public

As of publication, no evidence has emerged that the claimed 275 million record dataset has been posted to paste sites, dark web forums, or data trading marketplaces. This is consistent with the removal having resolved the immediate threat, but it does not confirm deletion of the data.

ShinyHunters has no documented history of actually deleting data after payment. Historical cases involving the group show that stolen data tends to resurface on underground markets months or years after extortion events, regardless of whether the victim paid. Security teams at affected institutions should operate on the assumption that the data exists and could be traded or released in the future.

Who Is Affected and What the Data Enables

The categories of data confirmed compromised — names, email addresses, student ID numbers, and private messages — are sufficient for targeted phishing, credential stuffing against institutional email systems, and social engineering attacks impersonating students, faculty, or administrators.

For institutions with single sign-on (SSO) configurations tied to Canvas, a phishing email using a student's real name, institutional email address, and academic context (drawn from intercepted Canvas messages) is significantly more convincing than generic lures. Security teams should treat this dataset as live threat intelligence for the foreseeable future.

What Affected Institutions and Users Should Do

  • Rotate all Canvas API tokens and integration credentials regardless of whether your institution appears in ShinyHunters' published list. If Instructure's backend was compromised, integration credentials may have been exposed even without direct attribution.
  • Enable multi-factor authentication (MFA) on all institutional accounts connected to Canvas, including SSO endpoints. If MFA was already enabled, verify that all enrolled methods are still valid and no unauthorized methods were added during the incident window (April 25 – May 7).
  • Brief your IT help desk on social engineering risk. Attackers with names, emails, student IDs, and private message context can construct convincing impersonation requests. Train help desk staff to verify identity through out-of-band channels rather than email or chat alone.
  • Monitor for phishing campaigns targeting your institution's domain over the next 30–90 days. Threat actors who acquire datasets often wait for media attention to fade before launching follow-on campaigns.
  • Watch for Have I Been Pwned notifications. Troy Hunt has indicated the dataset will be indexed in HIBP once it can be verified. Affected institutions can register for domain-level monitoring to receive email-level breach notifications for all addresses on their domain.
  • Preserve logs for the period April 25 – May 12. Class action litigation is underway, and institutions may face discovery requests or regulatory inquiries. Authentication logs, Canvas API access logs, and network flow data for that period should be preserved and access-controlled.

Legal and Regulatory Consequences

Multiple class action lawsuits have been filed or are in preparation on behalf of affected students, faculty, and institutions. Instructure's legal exposure is significant: 275 million records spanning dozens of countries implicates data protection regulations including FERPA (Family Educational Rights and Privacy Act, U.S.), GDPR (European Union), and the Australian Privacy Act, among others.

FERPA governs the handling of student education records in U.S. institutions receiving federal funding. A breach of this scale involving student IDs and private communications likely triggers mandatory notification obligations for institutions — not just for Instructure as the vendor. Legal teams at affected institutions should review their vendor agreements with Instructure for breach notification obligations and indemnification clauses.

Background: ShinyHunters' Track Record

ShinyHunters is a financially motivated threat group operating since approximately 2020. The group is responsible for breaches affecting Tokopedia (91 million records), Wattpad (270 million records), Mashable, Animal Jam, Pluto TV, and dozens of other platforms. Multiple members have been arrested; the group reconstituted under new operators. ShinyHunters operates a dark web leak site that functions as a ransom enforcement mechanism: victims who do not pay have their data published publicly.

The group's extortion of Instructure follows a pattern of targeting large consumer platforms with high volumes of personally identifiable information. Ransom demands have historically ranged from low five-figure to seven-figure sums depending on the scale of the breach and the perceived ability of the victim to pay.

Conclusion

The immediate threat of a public data dump appears to have been resolved — but "resolved" in this context means Instructure likely paid or negotiated, not that the data is gone. Affected institutions should treat the stolen dataset as a persistent threat, implement the credential rotation and phishing awareness steps above, and monitor for downstream abuse over the coming months. The full picture of what Instructure agreed to will likely emerge through litigation rather than voluntary disclosure.

For any query contact us at contact@cipherssecurity.com

Leave a Reply

Your email address will not be published. Required fields are marked *