Loading...
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors

Instructure Confirms Ransom Payment Following ShinyHunters Canvas Breach

A minimal dark-themed cybersecurity background with subtle blue and red network patterns, glowing breach indicators, and abstract digital infrastructure elements, featuring the Canvas LMS logo centered.

Educational technology company Instructure has confirmed it reached an agreement with the threat actors behind the recent Canvas breach after attackers threatened to leak allegedly stolen data tied to thousands of schools and universities.

Instructure, the parent company of the Canvas learning management platform, disclosed that it negotiated with the attackers following concerns over the potential publication of customer data reportedly exfiltrated during the intrusion.

The company said the agreement applies to all impacted customers and claims the stolen data was returned alongside what it described as digital confirmation of destruction. Instructure also stated it was informed that affected schools and universities would not face separate extortion demands tied to the incident, a claim later echoed in a statement published by the ShinyHunters operation.

The breach has been linked to the ShinyHunters extortion group, which previously claimed to have stolen approximately 3.65 TB of data from Canvas environments impacting nearly 9,000 organizations.

The latest disclosure follows earlier BreachNews reporting after Instructure confirmed a data breach tied to alleged mass student data theft and a subsequent escalation that saw schools and universities across the United States report potential exposure linked to the incident.

Shortly after Instructure disclosed the agreement, the ShinyHunters operation published a statement appearing to confirm the resolution. In the post, the group claimed it would not pursue further extortion against affected institutions and asserted that the allegedly stolen data was “nonexistent,” though those claims could not be independently verified.

The statement also instructed impacted organizations to stop attempting contact regarding payment negotiations, writing that “the matter has been resolved.”

ShinyHunters leak site statement claiming the Canvas LMS extortion matter has been resolved and affected institutions will not face further payment demands
ShinyHunters posted a statement claiming the Canvas LMS extortion incident had been resolved and that affected institutions would not face additional payment demands.

Second wave of activity escalated pressure campaign

According to Instructure, attackers conducted a second wave of unauthorized activity on May 7 after the company initially believed the incident had been contained.

The additional activity reportedly included defacement of Canvas login portals across hundreds of institutions with extortion-related messages demanding negotiations before a May 12 deadline.

The incident previously expanded beyond Instructure itself after multiple universities, K-12 districts, and statewide education systems disclosed they were assessing potential impact tied to their Canvas environments.

Earlier reporting from BreachNews documented how the Canvas breach escalated as schools across the U.S. reported potential exposure of student information tied to the incident.

Instructure said the attackers exploited a vulnerability involving support tickets within its Free-for-Teacher environment to gain initial access. The company claims approximately 275 million records were exposed, including usernames, email addresses, course names, enrollment information, and messages.

The company stated that passwords, course submissions, and course content were not compromised during the incident.

As part of its response, Instructure said it revoked privileged credentials and access tokens, rotated internal keys, restricted token creation pathways, and implemented additional security controls. The company also temporarily disabled Free-for-Teacher accounts.

Education sector faces growing extortion pressure

The incident highlights the growing pressure ransomware and extortion groups are placing on educational technology providers and centralized learning platforms that service large numbers of institutions simultaneously.

Security researchers warned the exposed data could still be weaponized in targeted phishing campaigns against students, parents, faculty, and administrators by leveraging enrollment details and institutional context.

The decision to negotiate with attackers remains controversial across the cybersecurity industry, though organizations increasingly face pressure to prevent publication of sensitive downstream customer information during large-scale extortion incidents.

Additional technical details regarding the exploited vulnerability have not yet been publicly disclosed.

Further reporting and technical details were first published by The Hacker News.

Picture of m00s3c

m00s3c

Moose (@m00s3c) is the author of BreachNews, focusing on data breach intelligence, dark web monitoring, and threat analysis. His work involves analyzing breach claims, reviewing leaked datasets, and tracking threat actor activity to provide clear, factual reporting.

Related Posts

Newsletter signup

Get the latest data breach and security news.

Please wait...

Thank you for signing up!