YOUR EXPOSURE TODAY | DATA BREACH
Active Threat10 min read

ShinyHunters Canvas LMS Breach: 275 Million Students' Data at Risk of Public Leak Tomorrow

275 million
Users affected in the ShinyHunters Canvas LMS breach, including students, teachers, and staff across roughly 9,000 institutions worldwide
3.65 TB
Total data volume stolen by ShinyHunters from Instructure, containing billions of private Canvas messages between students and teachers
9,000+
Educational institutions named in the ShinyHunters breach list, including all 8 Ivy League universities and K-12 schools globally
May 8, 2026
ShinyHunters' updated deadline to release the full 3.65 TB dataset publicly if Instructure does not meet extortion demands

ShinyHunters stole 3.65 TB of data from 275 million Canvas LMS users across roughly 9,000 institutions worldwide, and the group will release the full dataset publicly on May 8 unless Instructure meets its extortion demand. The ShinyHunters Canvas LMS breach hit Instructure on April 30, 2026, when attackers exploited a vulnerability in the company's backend systems to gain unauthorized access. Instructure confirmed the incident on May 1 and acknowledged that names, email addresses, student ID numbers, and private user messages were exposed across its global customer base. The breach affects institutions spanning 41 percent of North American higher education, all eight Ivy League universities, and institutions across Europe and Asia-Pacific.

ShinyHunters forced Instructure to shut down Canvas Data 2 and Canvas Beta while the company deployed patches, revoked privileged credentials, and rotated application keys. The group listed Instructure on its dark web extortion site on May 3 with a "PAY OR LEAK" demand and an initial deadline of May 6. That deadline passed without confirmed payment. ShinyHunters has now set May 8 as its final date for full public data release.

The breach requires immediate action right now because the stolen dataset contains billions of private messages exchanged between students and teachers, including confidential academic discussions, mental health disclosures, and personal communications shared through Canvas's messaging system. Students and educators at any Canvas-using institution should assume their contact details and message history are in ShinyHunters' possession. Security and IT teams must verify exposure, force credential resets, and warn users about targeted phishing campaigns before the May 8 release window closes.

Free daily briefing

Briefings like this, every morning before 9am.

Threat intel, active CVEs, and campaign alerts — distilled for practitioners. 50,000+ subscribers. No noise.

How Did ShinyHunters Breach Canvas LMS?

ShinyHunters exploited a vulnerability in Instructure's backend infrastructure to gain unauthorized access on April 30, 2026. The attack caused immediate disruption: Canvas users and API integrations began reporting authentication failures before Instructure issued its first incident notice, indicating the attacker disrupted credential validity during the exfiltration activity. Once inside, ShinyHunters accessed the Canvas Data 2 data pipeline and Canvas Beta environment, which are the primary mechanisms through which Instructure delivers bulk institutional data to customers.

Instructure has not publicly disclosed the specific vulnerability class or its identifier. The company confirmed it deployed patches addressing the exploited flaw, rotated application keys, revoked privileged credentials and access tokens, required customers to re-authorize API integrations, and engaged outside forensic experts and law enforcement within 24 hours.

The pattern matches ShinyHunters' established methodology precisely: identify an authentication flaw or misconfigured access control in a cloud-hosted SaaS platform, exfiltrate bulk datasets before the target detects the breach, then list the victim on a dark web extortion site with a short payment deadline.

The speed of exfiltration at 3.65 TB across hundreds of millions of records indicates persistent access over several days before detection. The Canvas Data 2 pipeline, designed for bulk institutional data exports, is the most plausible primary exfiltration vector given the scale of message content in the stolen dataset. Bulk export paths that bypass standard API rate limiting allow rapid data extraction without generating the high-volume connection anomalies that might trigger security alerts at normal ingestion volumes.

What Data Was Exposed in the Instructure Breach?

The Instructure data breach exposed names, email addresses, student ID numbers, and private messages between users. Instructure confirmed these categories in its public disclosure and stated that passwords, dates of birth, government identifiers such as Social Security Numbers, and financial information were not involved.

ShinyHunters claims the full dataset contains 3.65 TB of data covering 275 million individuals, with 231 million unique email addresses verified by security researchers who reviewed samples the group provided. TechCrunch confirmed records from two U.S. institutions, one in Massachusetts and one in Tennessee, were genuine. Phone numbers appeared in samples from institutions that collected them during enrollment. Enrolled course information revealing the academic programs students attend was also present in verified samples.

The most sensitive element of the breach is the private message corpus. ShinyHunters describes the haul as several billions of private messages between students and teachers, which includes confidential academic discussions, mental health communications routed through Canvas's messaging function, accommodation requests submitted to instructors, and personal details shared in what students believed was a private channel. This exposure goes far beyond what email addresses and student IDs alone represent.

For organizations in Canvas' customer base, the risk extends beyond the directly exposed data. Attackers with 231 million verified emails linked to course enrollments and institutional affiliations can construct highly targeted spear-phishing campaigns that reference specific courses, instructors, and academic context to appear credible. The combination of name, email, student ID, and message history creates a phishing profile far more convincing than a standard credential dump.

Who Are ShinyHunters and What Have They Targeted Before?

**ShinyHunters** is a financially motivated cybercriminal group first identified in 2020 that specializes in large-scale data theft and extortion from SaaS platforms, cloud storage services, and enterprise systems. The group has claimed responsibility for breaches affecting more than 1.5 billion user records across multiple campaigns, making it one of the most prolific data exfiltration operations active today.

Confirmed ShinyHunters operations include the 2024 Snowflake credential-harvesting campaign that compromised Ticketmaster (560 million records), AT&T (73 million records), Santander Bank (30 million records), and Hot Topic (54 million records). In the education sector, the group previously carried out the [ShinyHunters 45-million-record McGraw-Hill Salesforce breach](/blog/shinyhunters-mcgraw-hill-salesforce-breach-45-million), demonstrating persistent interest in platforms holding academic and professional records. The group also targeted [Amtrak in a Salesforce breach exposing 9 million records](/blog/amtrak-shinyhunters-salesforce-breach-9-million-records), consistent with its focus on SaaS platform vulnerabilities rather than endpoint compromise.

ShinyHunters monetizes stolen data through ransom demands, dark web marketplace listings, and direct data sales to third parties. At least two individuals with alleged ties to the group have faced criminal charges in the United States and France.

In the Instructure breach, ShinyHunters reportedly demanded payment from individual institutions alongside a general demand to the company. Penn was previously given a $1 million ransom demand in a prior ShinyHunters operation and did not pay. The group targeted Canvas specifically for the breadth of its customer base: one successful breach yields data from 9,000 organizations simultaneously, delivering leverage at unprecedented scale with a single intrusion.

PAY OR LEAK. Several billions of private messages among students and teachers. Reach out by May 6 before we leak.

ShinyHunters dark web extortion post, May 3, 2026

ShinyHunters Dark Web Timeline and Indicators of Compromise

The Instructure breach followed a structured four-stage timeline. Security teams at affected institutions should map their own logs against these dates to identify their specific exposure window.

The Canvas Data 2 pipeline disruption on April 30 is the earliest detection signal. Any institution that logged API authentication failures, unusual bulk export activity, or unexpected key revocation errors during that window should treat those events as direct breach indicators. Institutions that received no alerts during that window should not assume they were unaffected: ShinyHunters' access may have occurred through paths that did not trigger standard alerting on Instructure's infrastructure.

For post-breach monitoring, watch for phishing emails that impersonate Canvas system notifications using familiar platform formatting. The stolen dataset gives attackers enough context to craft emails referencing specific courses, instructors, and enrollment details that will pass a casual review by targeted recipients. Credential stuffing attacks against institutional SSO systems using the 231 million exposed email addresses are a high-probability secondary threat that will persist for months after the initial breach.

1

Initial Access — April 30, 2026

ShinyHunters exploited a vulnerability in Instructure's systems. Canvas users began reporting authentication key disruptions and API failures before the company issued an incident notice.

2

Exfiltration and Containment — May 1, 2026

Instructure confirmed the breach on its status page and shut down Canvas Data 2 and Canvas Beta. The company revoked privileged credentials, rotated keys, deployed patches, and engaged outside forensic support and law enforcement.

3

Dark Web Listing — May 3, 2026

ShinyHunters listed Instructure on its dark web extortion site, naming nearly 9,000 affected institutions including all eight Ivy League universities and setting a May 6 ransom deadline.

4

Deadline Extended to May 8 — May 6, 2026

The initial deadline passed without confirmed payment. ShinyHunters extended its deadline to May 8 and threatened to release the full 3.65 TB dataset publicly on dark web forums.

Subscribe to unlock Indicators of Compromise

Free subscribers unlock full IOC lists, remediation steps, and every daily briefing.

Which Schools and Institutions Are at Risk?

ShinyHunters published a list naming roughly 9,000 institutions it claims are represented in the stolen dataset. All eight Ivy League universities are confirmed on the list. The breach spans North America, the United Kingdom, Europe, and Asia-Pacific. At Penn alone, over 306,000 individuals are reported affected.

The breadth reflects Canvas's penetration into education. Instructure reports serving nearly 9,000 school customers globally across K-12 and higher education segments. The K-12 component adds a significant child data protection dimension. In the United States, FERPA establishes federal obligations around unauthorized disclosure of student education records, particularly for minors. Institutions in the United Kingdom and European Union operate under GDPR-equivalent data protection laws with mandatory breach notification timelines and potential fines for inadequate response.

Healthcare-adjacent university programs that use Canvas to deliver medical education, mental health counseling degree curricula, and nursing programs face a separate risk class. Students enrolled in those programs may have shared sensitive personal disclosures in Canvas messages while completing clinical reflection assignments or seeking instructor support. Standard breach notification processes do not capture that risk adequately.

Organizations with employees who are alumni or current students at Canvas-using institutions should treat their data as potentially compromised. The 41 percent figure for North American higher education means most mid-to-large organizations employ individuals who are in the affected population regardless of whether their institution has issued a specific notification.

How to Verify Your Exposure and Protect Your Institution Now

Security and IT teams at Canvas-using institutions should complete these steps before the May 8 data release deadline. The actions below address immediate exposure verification, credential security, and user protection in priority order.

Subscribe to unlock Remediation & Mitigation steps

Free subscribers unlock full IOC lists, remediation steps, and every daily briefing.

The bottom line

The ShinyHunters Canvas LMS breach exposed 275 million students and teachers to one of the largest education data exfiltrations ever recorded, with the full 3.65 TB dataset potentially going public on May 8. Every institution running Canvas must audit API logs from April 27 to May 1, force credential resets, and warn users about targeted phishing campaigns today. The breach demonstrates the acute risk of centralizing student communications within a single SaaS platform without independent data loss prevention monitoring. Verify your institutional exposure at HaveIBeenPwned.com and contact your IT security team before the release window closes.

Frequently asked questions

Was my Canvas LMS account data breached?

If you have a Canvas LMS account at any institution that uses Instructure's platform, your name, email address, and student ID may be in the stolen dataset. ShinyHunters claims 275 million user records across roughly 9,000 institutions globally. Instructure confirmed names, email addresses, student ID numbers, and private user messages were exposed. Passwords, dates of birth, government identifiers, and financial information were not included. Check HaveIBeenPwned.com using your institutional email to see if it appears in known data dumps.

What data did ShinyHunters steal from Canvas LMS?

ShinyHunters stole names, email addresses, student ID numbers, and private messages between users. In some institutional configurations, phone numbers and enrolled course information were also included. The group claims the dataset totals 3.65 TB and contains 231 million unique email addresses verified through sample data. The most sensitive element is the private message corpus, which ShinyHunters describes as several billions of private conversations between students and teachers containing confidential academic, personal, and potentially medical disclosures.

How did ShinyHunters breach Instructure?

ShinyHunters exploited a vulnerability in Instructure's systems to gain unauthorized access on April 30, 2026. Instructure has not disclosed the specific vulnerability class. The breach forced the company to shut down Canvas Data 2 and Canvas Beta while patches were deployed. The pattern matches ShinyHunters' established methodology of exploiting platform-level authentication weaknesses to exfiltrate bulk datasets before detection. Instructure confirmed it revoked privileged credentials, rotated application keys, and engaged outside forensic experts and law enforcement within 24 hours.

Which schools were affected by the Canvas data breach?

ShinyHunters published a list naming roughly 9,000 institutions globally, including all eight Ivy League universities: Harvard, Yale, Princeton, Columbia, Penn, Brown, Dartmouth, and Cornell. The breach covers institutions across North America, the United Kingdom, Europe, and Asia-Pacific. Penn confirmed over 306,000 individuals at that institution are affected. The scope reflects Canvas's market position: 41 percent of North American higher education institutions use Canvas as their primary learning management system.

Has Instructure paid the ShinyHunters ransom?

Instructure has not publicly confirmed any ransom payment. The initial ShinyHunters deadline of May 6 passed without confirmed payment, after which the group extended its deadline to May 8 with a threat to release the full 3.65 TB dataset publicly. Instructure's public statements focused on breach containment, law enforcement cooperation, and forensic investigation. CISA and FBI guidance advises against paying ransoms, as payment does not guarantee data deletion and may invite repeat targeting.

How do I check if my student data was leaked from Canvas?

Visit HaveIBeenPwned.com and enter your institutional email address. The service indexes known breach datasets and will notify you if your address appears. For institutional monitoring, security teams can submit a domain-level request to monitor all addresses under their domain. If your email is confirmed in the breach, change passwords on any accounts that share credentials with your Canvas login, enable multi-factor authentication where available, and watch for phishing emails that use your course enrollment context to appear legitimate.

What should my institution do right now about the Canvas breach?

IT and security teams should immediately audit Canvas Data 2 API access logs for the period April 27 through May 1, 2026, looking for bulk export activity. Force a campus-wide credential reset for all accounts linked to Canvas. Revoke and reissue all Canvas API tokens and LTI integration credentials. Alert users to watch for phishing emails referencing Canvas courses, grades, or IT maintenance. Assess your institution's breach notification obligations under FERPA and applicable state privacy laws, and notify your data protection officer.

Who are ShinyHunters and what other attacks have they carried out?

ShinyHunters is a financially motivated cybercriminal group active since 2020 that specializes in large-scale data theft from SaaS platforms and cloud storage services. Confirmed previous targets include Ticketmaster (560 million records), AT&T (73 million records), Santander Bank (30 million records), and Hot Topic (54 million records). The group consistently exploits platform-level authentication weaknesses to exfiltrate bulk datasets and monetizes through dark web extortion and data sales. At least two individuals linked to ShinyHunters have faced criminal charges in the United States and France.

Sources & references

  1. Inside Higher Ed — PAY OR LEAK: Hackers Target Big Higher Ed Vendor
  2. BleepingComputer — Instructure confirms data breach, ShinyHunters claims attack
  3. TechCrunch — Hackers steal students' data during breach at education tech giant Instructure
  4. Cybernews — Canvas breach: Hackers threaten to leak messages of 275M users
  5. Malwarebytes — Millions of students' personal data stolen in major education breach

Free resources

25
Free download

Critical CVE Reference Card 2025–2026

25 actively exploited vulnerabilities with CVSS scores, exploit status, and patch availability. Print it, pin it, share it with your SOC team.

No spam. Unsubscribe anytime.

Free download

Ransomware Incident Response Playbook

Step-by-step 24-hour IR checklist covering detection, containment, eradication, and recovery. Built for SOC teams, IR leads, and CISOs.

No spam. Unsubscribe anytime.

Free newsletter

Get threat intel before your inbox does.

50,000+ security professionals read Decryption Digest for early warnings on zero-days, ransomware, and nation-state campaigns. Free, weekly, no spam.

Unsubscribe anytime. We never sell your data.

Eric Bang
Author

Founder & Cybersecurity Evangelist, Decryption Digest

Cybersecurity professional with expertise in threat intelligence, vulnerability research, and enterprise security. Covers zero-days, ransomware, and nation-state operations for 50,000+ security professionals weekly.

Daily Briefing

Get briefings like this every morning

Actionable threat intelligence for working practitioners. Free. No spam. Trusted by 50,000+ SOC analysts, CISOs, and security engineers.

Unsubscribe anytime.

Get tomorrow's threat briefing before your inbox does.