New, from me: Canvas Breach Disrupts Schools and Colleges Nationwide
"An ongoing data extortion attack targeting the widely-used education technology platform Canvas disrupted classes and coursework at school districts and universities across the United States today, after a cybercrime group defaced the service’s login page with a ransom demand that threatened to leak data from 275 million students and faculty across nearly 9,000 educational institutions."
"Canvas parent firm Instructure responded to today's defacement attacks by disabling the platform, which is used by thousands of schools, universities and businesses to manage coursework and assignments, and to communicate with students."
Lots more here:
krebsonsecurity.com/2026/05/ca…
#canvas #breach #shinyhunters #instructure
An ongoing data extortion attack targeting the widely-used education technology platform Canvas disrupted classes and coursework at school districts and universities across the United States today, after a cybercrime group defaced the service's login…
krebsonsecurity.com
BrianKrebs
in reply to BrianKrebs • • •Instructure says it paid a ransom. SMH
"STATUS UPDATE 5/11/26
We know that concerns about the potential publication of data related to this incident remain top of mind for many customers. We understand how unsettling situations like this can be, and protecting our community remains our top priority."
"With that responsibility in mind, Instructure reached an agreement with the unauthorized actor involved in this incident. As part of that agreement:"
"The data was returned to us.
We received digital confirmation of data destruction (shred logs).
We have been informed that no Instructure customers will be extorted as a result of this incident, publicly or otherwise."
'This agreement covers all impacted Instructure customers, and there is no need for individual customers to attempt to engage with the unauthorized actor.
While there is never complete certainty when dealing with cyber criminals, we believe it was important to take every step within our control to give customers additional peace of mind, to the extent possible. We continue to work with expert vendors to support our forensic analysis, further harden our environment, and conduct a comprehensive review of the data involved. We will continue to provide updates as that work progresses."
instructure.com/incident_updat…
Security Incident Update & FAQs
InstructureMike Sheward
in reply to BrianKrebs • • •Joe ❌👑
in reply to BrianKrebs • • •John Breen
in reply to BrianKrebs • • •Wait, "shred logs" are a thing ?
...They promised they destroyed the negatives...
Also, "there is no need for individual customers to attempt to engage with the unauthorized actor" sounds a little like "pay no attention to the man behind the curtain".
They don't have your data, so go ahead and engage them, right ?
Cliff'sEsportCorner
in reply to BrianKrebs • • •Princess Bride, "You keep using that word. I do not think it means what you think it means."
MrJeffooie (YouTube)Isaac Lyman
in reply to BrianKrebs • • •John Kristoff
in reply to BrianKrebs • • •zl2tod
in reply to BrianKrebs • • •s/nationwide/worldwide/
rnz.co.nz/news/education/59463…
New Zealand students' details caught up in massive global university hack
Checkpoint, Luka Forman (RNZ)Beachbum
in reply to BrianKrebs • • •Arapalla
in reply to BrianKrebs • • •Hackers are dedicated and clever people. They get what they're after.
But it always drives me spare that these people hack schools and pharmacies and the local council, but never Truth Social or Reform UK or pedophiles r us. 😮💨
ee
in reply to BrianKrebs • • •ee
in reply to BrianKrebs • • •interestingly, Shinyhunters removed the listing from their site¹. I attached a screenshot I found displaying the listing while it was still live (better than this screenpic lol).
With the recent Chipsoft hack by the same group, the removal of the listing by the site indicated negotiations by the hacked and the hacker were ongoing. Chipsoft likely ended up paying, since they report the data was deleted.
[1] for the curious, at your own peril: shnyhntww34phqoa6dcgnvps2yu7dl…
mark
in reply to BrianKrebs • • •Hugs4friends ♾🇺🇦 🇵🇸😷
in reply to BrianKrebs • • •Sensitive content
I do hope the institutions had hard copies.
Jhooper
in reply to BrianKrebs • • •Yet another Josh
in reply to BrianKrebs • • •Yep! All for Finals week and Graduation week very soon.
Its basically their best possible timing as a ransom operation.
Annelies
in reply to BrianKrebs • • •@plutarch I have to hand it to the hackers - doing this in May is just really excellent timing.
trumpresistance
in reply to BrianKrebs • • •