Instructure, the education technology company behind the widely used Canvas learning management system (LMS), has confirmed a significant cybersecurity breach perpetrated by a criminal threat actor, the notorious hacking group ShinyHunters.
which claims to have stolen data belonging to 275 million individuals across nearly 9,000 educational institutions worldwide. The security incident first surfaced quietly on April 30, 2026.
When Instructure opened an internal status ticket reporting “limited disruption to tools relying on API keys.” Within 24 hours, what appeared to be a routine API outage escalated into a confirmed cybersecurity breach.
On May 1, 2026, Instructure’s Chief Information Security Officer (CISO) Steve Proud issued an official statement confirming that a criminal threat actor had targeted the company. The statement acknowledged that outside forensics experts had been engaged to support the ongoing investigation.
Simultaneously, Canvas Data 2 and Canvas Beta and Test environments were placed under maintenance, causing widespread disruption to API-dependent tools and third-party integrations used by institutions globally.
By May 2, 2026, Proud issued a follow-up update declaring that the incident had been “contained,” while confirming that personal user data had been exposed in the attack.
Canvas Data Breach 2026
According to Instructure’s statement, the categories of exposed data include:
- Names of users at affected institutions
- Email addresses are predominantly institutional
.edudomain accounts - Student ID numbers used by schools for financial aid reconciliation, transcripts, and discipline records
- Private messages between users, including Inbox conversations between students, professors, teaching assistants, and counselors, within the Canvas platform
Instructure explicitly stated that no passwords, dates of birth, government identifiers, or financial information were found to be involved at this stage of the investigation. However, the company warned that this could change. “If that changes, we will notify any impacted institutions.
While Instructure’s confirmed scope covers identifying information and private messages, the threat actor ShinyHunters has made far more alarming allegations.
The group listed Instructure on its data leak site, claiming the breach affected nearly 9,000 schools worldwide and exposed data for 275 million students, teachers, and staff, along with several billion private messages.
ShinyHunters further alleged that Instructure’s Salesforce instance was compromised as part of the attack, and that the stolen dataset spans institutions across North America, Europe, and the Asia-Pacific region, totaling approximately 15,000 institutions.
The group attributed the breach to a vulnerability in Instructure’s systems that has since been patched. Instructure has not publicly responded to ShinyHunters’ specific claims or confirmed the scale of the alleged activity.
Instructure’s Second Breach
This incident marks Instructure’s second significant cybersecurity event in less than eight months. In September 2025, the company fell victim to a social engineering attack targeting its Salesforce instance, an incident in which ShinyHunters also claimed involvement.
The recurrence raises serious questions about Instructure’s security posture, particularly around privileged access management and API key governance.
Security analysts note that the attack methodology described involving revoked credentials, rotated application keys, and API disruptions is consistent with a credential or token compromise, a technique increasingly leveraged by sophisticated threat actors targeting cloud-based SaaS platforms.
Remediation
In response to the breach, Instructure confirmed it has taken the following steps:
- Revoked privileged credentials and access tokens associated with affected systems
- Deployed security patches to enhance system defenses
- Rotated certain application keys as a precautionary measure, even where no evidence of misuse existed
- Implemented increased monitoring across all platforms
Instructure also reissued certain application keys, requiring end users to re-authorize access to affected tools. The company noted that reissued keys include a timestamp in the name and will be visible to users during the re-authorization process, confirming that these are legitimate Instructure-created keys and that users should proceed with authorization.
As of May 3, 2026, Canvas Data 2 has been restored for all customers, though Canvas Beta and Test environments remain under maintenance as the investigation continues.
Canvas LMS serves over 7,000 universities, K-12 districts, and education ministries worldwide, making this breach one of the most consequential cyberattacks ever recorded in the education sector.
If ShinyHunters’ claims are even partially accurate, the scale of exposure spanning private student messages, institutional email addresses, and student identification numbers could have far-reaching implications for academic privacy and institutional trust.
Private messages accessed through Canvas may contain sensitive academic content, mental health disclosures, accommodation requests, and other personally sensitive communications, far more damaging than standard contact details.
FAQ
Q1: What data was stolen in the Instructure Canvas breach?
Names, email addresses, student ID numbers, and private Canvas messages were exposed; no passwords, financial data, or government IDs are confirmed compromised.
Q2: Who is responsible for the Canvas cyberattack?
ShinyHunters, a notorious extortion group linked to multiple high-profile breaches, has claimed responsibility, though Instructure has not formally attributed the incident.
Q3: How many users are affected by the Instructure data breach?
Instructure has not confirmed a specific number, but ShinyHunters claims up to 275 million individuals across approximately 9,000 institutions were impacted.
Q4: What should Canvas users do following the Instructure security incident?
Users should re-authorize API tools using the new timestamped keys, monitor institutional email for breach notifications, and remain alert for phishing attempts using exposed credentials.
Site: thecybrdef.com
For more insights and updates, follow us on Google News, Twitter, and LinkedIn.