Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    2024-08-22: CVE-2024-38063 Severe Risk Windows Vulnerability

    May 3, 2026

    ZDI-26-168: GStreamer RIFF Palette Integer Overflow Remote Code Execution Vulnerability

    May 3, 2026

    Verizon’s 2024 DBIR Report – Mapping CIS Controls to Incident Classification Patterns | Blog

    May 3, 2026
    Facebook X (Twitter) Instagram
    • Demos
    • Technology
    • Gaming
    • Buy Now
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Canadian Cyber WatchCanadian Cyber Watch
    • Home
    • News
    • Alerts
    • Tips
    • Tools
    • Industry
    • Incidents
    • Events
    • Education
    Subscribe
    Canadian Cyber WatchCanadian Cyber Watch
    Home»News»Instructure confirms data breach, ShinyHunters claims attack
    News

    Instructure confirms data breach, ShinyHunters claims attack

    adminBy adminMay 3, 2026No Comments3 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Share
    Facebook Twitter LinkedIn Pinterest Email


    Instructure Canvas

    Educational tech giant Instructure has confirmed that data was stolen in a cyberattack, with the ShinyHunters extortion gang claiming responsibility.

    Instructure is a U.S.-based education technology company best known for developing Canvas, a widely used learning management system that helps schools, universities, and organizations manage coursework, assignments, and online learning.

    On Friday, Instructure disclosed that it suffered a cybersecurity incident and is working with third-party cybersecurity experts and law enforcement to investigate it.

    On Saturday, the company issued an update stating that the personal information of users was exposed in the breach.

    “While we continue actively investigating, thus far, indications are that the information involved consists of certain identifying information of users at affected institutions, such as names, email addresses, and student ID numbers, as well as messages among users,” reads the updated statement.

    “At this time, we have found no evidence that passwords, dates of birth, government identifiers, or financial information were involved. If that changes, we will notify any impacted institutions.”

    As part of the response, Instructure has deployed patches, increased monitoring, and rotated application keys as a precautionary step.

    Customers are required to re-authorize access to Instructure’s API for new application keys to be issued.

    While Instructure has not responded to BleepingComputer’s questions about when the breach occurred and whether they were being extorted, the ShinyHunters extortion gang has now listed the company on its data leak site.

    “Nearly 9,000 schools worldwide affected. 275 million individuals data ranging from students, teachers, and other staff containing PII,” reads the data leak site.

    “Several billions of private messages among students and teachers and students and other students involved, containing personal conversations and other PII. Your Salesforce instance was also breached and a lot more other data is involved.”

    Instructure listed on ShinyHunters data extortion site
    Instructure listed on ShinyHunters data extortion site

    ShinyHunters claimed that the data was stolen from Instructure via a vulnerability in their systems, which has now been patched.

    This data allegedly consists of over 240 million records tied to students, teachers, and staff. The threat actor says the data contains students’ names, email addresses, enrolled courses, and private messages to teachers.

    Data shared by the threat actor indicates that the alleged dataset spans almost 15,000 institutions hosted across multiple geographic regions, including North America, Europe, and Asia-Pacific.

    BleepingComputer has not been able to independently confirm which schools or how many individuals were impacted and has contacted Instructure with additional questions about the threat actor’s claims.


    article image

    AI chained four zero-days into one exploit that bypassed both renderer and OS sandboxes. A wave of new exploits is coming.

    At the Autonomous Validation Summit (May 12 & 14), see how autonomous, context-rich validation finds what’s exploitable, proves controls hold, and closes the remediation loop.

    Claim Your Spot



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleZDI-26-167: GStreamer rtpqdm2depay Heap-based Buffer Overflow Remote Code Execution Vulnerability
    Next Article SSA-840800 V1.5 (Last Update: 2025-08-12): Code Injection Vulnerability in RUGGEDCOM ROS
    admin
    • Website

    Related Posts

    News

    Verizon’s 2024 DBIR Report – Mapping CIS Controls to Incident Classification Patterns | Blog

    May 3, 2026
    News

    Verizon’s 2024 DBIR Report – Mapping Mitre Att&CK tactics and techniques to Incident Classification Patterns | Blog

    May 3, 2026
    News

    Edu tech firm Instructure discloses cyber incident, probes impact

    May 3, 2026
    Add A Comment

    Comments are closed.

    Demo
    Top Posts

    Catchy & Intriguing

    March 17, 202671 Views

    The Grandparent Scam: How AI Voice Technology Makes This Old Con Deadlier Than Ever

    March 18, 202620 Views

    Global Takedown of Massive IoT Botnets Halts Record-Breaking Cyberattacks

    March 20, 202619 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews
    85
    Featured

    Pico 4 Review: Should You Actually Buy One Instead Of Quest 2?

    January 15, 2021 Featured
    8.1
    Uncategorized

    A Review of the Venus Optics Argus 18mm f/0.95 MFT APO Lens

    January 15, 2021 Uncategorized
    8.9
    Editor's Picks

    DJI Avata Review: Immersive FPV Flying For Drone Enthusiasts

    January 15, 2021 Editor's Picks

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Demo
    Most Popular

    Catchy & Intriguing

    March 17, 202671 Views

    The Grandparent Scam: How AI Voice Technology Makes This Old Con Deadlier Than Ever

    March 18, 202620 Views

    Global Takedown of Massive IoT Botnets Halts Record-Breaking Cyberattacks

    March 20, 202619 Views
    Our Picks

    2024-08-22: CVE-2024-38063 Severe Risk Windows Vulnerability

    May 3, 2026

    ZDI-26-168: GStreamer RIFF Palette Integer Overflow Remote Code Execution Vulnerability

    May 3, 2026

    Verizon’s 2024 DBIR Report – Mapping CIS Controls to Incident Classification Patterns | Blog

    May 3, 2026

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • Home
    • Technology
    • Gaming
    • Phones
    • Buy Now
    © 2026 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.