ShinyHunters Claims 280 Million Canvas Records Lifted from Instructure

ShinyHunters claims 280 million records stolen from Instructure's Canvas LMS across 8,809 schools and universities in a breach disclosed May 5, 2026.
ShinyHunters Claims 280 Million Canvas Records Lifted from Instructure
Table of Contents
    Add a header to begin generating the table of contents

    The ShinyHunters extortion gang claims to have stolen approximately 280 million records from Instructure, the company behind the Canvas learning management system, in what may be one of the largest education-sector data breaches on record. The threat actor published a list of 8,809 affected colleges, school districts, and online education platforms on May 5, 2026, with per-institution record counts ranging from tens of thousands to several million.

    ShinyHunters’ Claims: 280 Million Records Pulled from Canvas APIs Across 8,809 Institutions

    Instructure did not respond to press inquiries from BleepingComputer following the disclosure, and no official breach notice had been issued by the company as of May 6, 2026. According to the threat actor’s published claims, the data was obtained through Canvas data export APIs and provisioning reports — legitimate administrative interfaces built into the platform — rather than through a disclosed software vulnerability.

    The scope of the alleged breach is substantial. The 8,809 named institutions span large public universities, community college systems, K-12 school districts, and online education platforms. If confirmed at the scale ShinyHunters claims, the incident would rank among the largest single data theft events in education history.

    Data Said to Include Student Private Messages and Enrollment Records

    The stolen dataset allegedly includes names, email addresses, private messages between students and instructors, and enrollment records. ShinyHunters did not identify a specific CVE or technical attack vector in its public disclosure. No independent forensic verification of the full claimed dataset had been completed as of publication, according to BleepingComputer’s reporting.

    Several affected institutions responded by describing the situation as “a nationwide event affecting multiple institutions,” language that suggests inter-institution communication had begun, though no coordinated public incident response had been announced as of May 6.

    ShinyHunters’ Pattern of Publishing Data After Failed Extortion Demands

    ShinyHunters is one of the most prolific data extortion groups active today, with a documented pattern of demanding ransom, then publicly leaking stolen data when victims decline to pay. The group claimed responsibility for a separate breach of Vimeo disclosed the same week, in which it leaked a 106 GB archive after Vimeo refused to negotiate. No ransom demand figure or deadline was publicly disclosed in the Instructure case as of May 6.

    Why the Canvas API Export Vector Complicates Breach Response for Schools

    The alleged use of Canvas’s own administrative export APIs as the breach vector — rather than a traditional software exploit — creates a response challenge distinct from a standard patch cycle. Administrative data export features, when accessed with compromised credentials or through misconfigured access controls, can extract large volumes of structured personal data without triggering intrusion detection systems designed to flag anomalous software behavior.

    No CVE has been assigned to this incident. The absence of a disclosed software vulnerability means affected institutions cannot point to a single patch or configuration change as a remediation step, and may instead need to audit API access logs, credential inventories, and provisioning configurations for signs of unauthorized access.

    FERPA Exposure and State Data Breach Notification Obligations

    The exposure of student educational records — including private messages — raises immediate compliance implications under the Family Educational Rights and Privacy Act (FERPA), which governs the confidentiality of student education records at federally funded institutions. Beyond FERPA, affected institutions in states with active data breach notification laws face notification obligations that may be triggered by the exposure of names combined with email addresses or other personal identifiers.

    The involvement of K-12 school districts alongside higher education institutions extends the potential regulatory exposure, as minors’ records carry additional protections under federal and state law. Law enforcement involvement had not been publicly confirmed as of May 6, 2026.

    Instructure’s Silence and the Likelihood of a Data Leak

    Instructure’s failure to respond to press inquiries as of the disclosure date stands in contrast to the scale of the claimed breach. The company had not issued a public statement, confirmed or denied ShinyHunters’ claims, or announced an investigation by the time this article was published.

    Based on ShinyHunters’ established operational pattern, data leaks typically follow failed or refused extortion demands within days to weeks. The group’s simultaneous activity across multiple high-profile victims in a single week — Vimeo and Instructure, among others — suggests an accelerated pace of operations. Affected institutions and individuals whose data may be included have not yet received formal notification from Instructure as of May 6, 2026.

    Related Posts