Security & Infrastructure Tools
Instructure reaches 'agreement' with ShinyHunters to stop data leak
Instructure has announced an agreement with the ShinyHunters extortion group to stop the leakage of data stolen in a breach of the Canvas LMS, with the stolen data returned and destruction logs provided. The incident affected more than 30 million educators and students across 8,000 schools and universities, and ShinyHunters claimed about 3.6TB of data was stolen after exploiting Free-for-Teacher XSS flaws and even defaced Canvas login pages on May 7. Canvas has been restored, Free-for-Teacher accounts were temporarily shut, and Instructure will share further updates in a May 13 webinar; the FBI cautions that paying a ransom does not guarantee safety from further extortion.

Instructure Reaches Agreement with ShinyHunters to Stop Data Leak
OverviewInstructure, the maker of the Canvas learning management system, announced that it has reached an agreement with the ShinyHunters extortion group to prevent the leaked data from spreading online. The company emphasized that the agreement applies to all affected customers and that there is no need for individual customers to engage with the attacker. The incident involved a data theft that the company attributes to vulnerabilities in a free-for-teacher version of Canvas and subsequent unauthorized activity on login portals.
Timeline of Events
- Initial breach: ShinyHunters claimed responsibility for a data breach affecting Canvas, asserting the theft of more than 3.6 terabytes of uncompressed data from Instructure’s systems.
- Exploitation details: The attackers reportedly exploited a security issue in Free-for-Teacher, a free, limited Canvas environment for individual educators, to access data.
- Defacement and extortion: On May 7, the group defaced Canvas login portals and left an extortion message, warning that negotiations for payment would be required by a stated deadline.
- Restoration: Instructure stated that Canvas had been restored and was fully online again after the incident, while recommending ongoing monitoring of environments, integrations, and administrative activity.
- May 12–13 developments: The company announced an agreement with the attacker and indicated that no customers would be extorted publicly or privately as a result of the incident.
- Follow-up breach: Instructure disclosed a separate breach in September 2025, also attributed to ShinyHunters, involving access to data in the company’s Salesforce instance.
- Broader context: ShinyHunters’ activity has touched multiple high-profile targets beyond Instructure, including other tech companies, services, and organizations across various sectors.
What Was Compromised and How It Happened
- Affected ecosystem: Canvas is used by more than 30 million educators and students across upwards of 8,000 schools and universities worldwide.
- Access path: The attackers leveraged vulnerabilities found in the Free-for-Teacher environment and used malicious JavaScript to exploit Canvas cross-site scripting (XSS) flaws embedded in user-generated content features.
- Privileged access gained: By exploiting these flaws, the attackers obtained authenticated administrator sessions and were able to perform privileged actions within the environment.
- Defacement mechanics: The unauthorized actor made changes to pages visible to logged-in students and teachers, disrupting normal login experiences and signaling the extortion intent.
- Ongoing remediation: Following the incident, Instructure temporarily shut down Free-For-Teacher accounts as it worked to address the security gaps and prevent future incidents.
Data Involved
- Data scale: The breach involved a claim of more than 3.6 terabytes of uncompressed data stolen from Instructure’s systems.
- Data categories: While specific data types were not exhaustively itemized in official statements, the scope encompassed information accessible through the Canvas platform and related administrative sessions that attackers could leverage.
Response and Containment
- Official stance: Instructure issued a statement highlighting that it had reached an agreement with the unauthorized actor and that protecting the community remained the top priority.
- Customer impact: The company asserted that no Instructure customers would be extorted as a result of the incident, publicly or otherwise, and that the agreement covers all impacted customers.
- Recovery status: Canvas was reported as restored and fully online, with an emphasis on continuing monitoring of Canvas environments, integrations, and administrative activity.
- Security posture moving forward: Leadership indicated that additional information about the incident and security measures would be shared in a forthcoming May webinar, signaling ongoing efforts to strengthen defenses against future attacks.
Defacement, Extortion, and What It Means
- Extortion attempts: The May 7 defacement combined with an extortion message suggested a broader aim beyond data theft, pressuring the organization to negotiate under threat of additional disclosure or harm.
- The FBI perspective: U.S. authorities have repeatedly warned that paying a ransom does not guarantee that stolen data will not be sold to other criminals or that further extortion attempts will not follow.
- Continuous risk: The combination of XSS exploitation and the potential for subsequent intrusions underscores the persistent risk associated with unpatched web-facing components and privileged access paths.
Subsequent Breaches and Related Incidents
- Salesforce exposure: The September 2025 breach claimed by ShinyHunters is notable for its impact on Instructure’s Salesforce instance, illustrating how attackers move laterally to target ancillary services used by the organization.
- Broader trend: ShinyHunters’ activity has affected multiple entities across technology, telecommunications, and consumer services, including high-profile entities involved in data handling and digital services.
- Context for customers: The incidents highlight the importance of securing not just core platforms but also interconnected services and developer tools that can serve as entry points for attackers.
Industry and Security Implications
- Risk landscape: The case demonstrates how significant data-exfiltration events can begin with relatively modest vulnerabilities in freely available or low-friction environments and escalate through compromised login channels.
- Incident response: The sequence—from discovery and defacement to remediation and public disclosure—illustrates the complexity of coordinating technical containment with communications to users and stakeholders.
- Trust and continuity: For education technology platforms serving millions of users, maintaining continuity and trust requires rapid restoration of services, transparent communication about scope and impact, and visible steps to harden defenses.
Bottom LineThe Instructure–ShinyHunters engagement marks a high-profile example of a data breach crisis where the attacker’s leverage was curtailed through an agreement intended to prevent further leaks. The events emphasize the ongoing threats posed by extortion-focused groups and the importance of securing all layers of a platform—especially free and low-friction environments that can inadvertently become gateways to larger networks. As organizations continue to grapple with similar threats, the need for comprehensive vulnerability management, vigilant monitoring, and robust incident response remains evident.


