Executive Summary
In early May 2026, Instructure confirmed a significant security breach affecting its widely used Canvas Learning Management System (LMS). The incident, attributed to the extortion group ShinyHunters, marks the second attack against Instructure in less than a year. The attackers exploited the Free-For-Teacher (FFT) account program, which allowed educators to create Canvas accounts without institutional verification, resulting in unauthorized access to sensitive data. The exposure window lasted from April 30 to May 7, 2026, during which names, email addresses, student IDs, and some private messages of students, teachers, and staff at nearly 9,000 schools worldwide were compromised. While Instructure has not confirmed the attackers’ claims of 275 million affected users and 3.6 TB of stolen data, the breach has led to increased risks of spear phishing and social engineering attacks. The company responded by shutting down the FFT program, rotating credentials, and engaging forensic investigators and law enforcement. This report provides a detailed technical analysis of the incident, the threat actor’s tactics, and actionable recommendations for affected organizations.
Technical Information
The May 2026 breach of Instructure Canvas LMS was executed by the threat group ShinyHunters, known for extortion-as-a-service operations. The attackers exploited the Free-For-Teacher (FFT) account program, which permitted educators to create Canvas tenants without institutional verification. This low-friction onboarding process resulted in weaker trust boundaries between FFT and institutional tenants, all of which shared the same underlying infrastructure. The architectural model, common in multi-tenant SaaS (Software-as-a-Service) environments, relies on logical rather than physical isolation of customer data. When verification gaps exist, this isolation can be undermined, as occurred in this incident.
Initial Access: The attackers leveraged an issue related to FFT accounts to gain unauthorized access to production Canvas data. While Instructure has not disclosed the precise technical mechanism, it is confirmed that the attackers accessed and exfiltrated names, email addresses, student IDs, and private messages. There are credible reports from TechCrunch (via Mashable) of login page defacement at multiple institutions, suggesting the attackers may have obtained elevated privileges, potentially allowing them to alter tenant configurations or user interface elements. However, Instructure has not officially confirmed the scope of this privilege escalation.
MITRE ATT&CK Mapping: The attack aligns with several MITRE ATT&CK techniques. Initial access was achieved through Valid Accounts (T1078), exploiting FFT accounts. If defacement occurred, Exploitation for Privilege Escalation (T1068) is likely. Defense Evasion was facilitated by the use of legitimate FFT accounts. Data was collected from Information Repositories (T1213) and likely exfiltrated over web services (T1567.002). The reported defacement aligns with the Defacement (T1491) and Data Manipulation (T1565) techniques.
Malware and Tools: No specific malware or custom tools have been identified in this incident. The attack appears to have relied on abusing legitimate FFT account functionality and possible privilege escalation within the Canvas SaaS environment. ShinyHunters is historically known for using social engineering, voice phishing, and credential abuse rather than deploying custom malware payloads. No technical indicators such as hashes, command-and-control infrastructure, or malware samples have been published by Instructure or third-party investigators as of this report.
Threat Actor Profile: ShinyHunters is an established extortion group active since at least 2020, with a history of targeting SaaS, edtech, and consumer platforms. Their tactics, techniques, and procedures (TTPs) include social engineering, credential abuse, and public extortion campaigns. In September 2025, ShinyHunters targeted Instructure’s Salesforce business systems via social engineering, but no Canvas product data was accessed in that incident. Other 2026 campaigns include attacks on Udemy and Figure, and previous victims include Panera Bread, Crunchyroll, Bumble, ADT, and Rockstar Games.
Sector-Specific Impact: The breach primarily affects the education technology sector, with nearly 9,000 schools worldwide impacted, including major universities and K-12 districts in the US, Australia, and the EU. The compromised data is high-quality personally identifiable information (PII), increasing the risk of spear phishing and social engineering attacks. Operational disruptions have included forced credential rotations and potential login page defacement.
Indicators of Compromise (IOCs): ShinyHunters published a list of affected institutions and a data leak site, both of which are only accessible from sandboxed environments and require caution. No malware hashes or other technical artifacts have been published.
Attribution Confidence: Attribution to ShinyHunters is high-confidence, based on public claims, extortion activity, and confirmation by Instructure and multiple independent sources. The technical attribution is based on TTPs and public claims, as no unique malware or infrastructure artifacts have been identified.
Affected Versions & Timeline
The breach specifically targeted the Canvas LMS platform via the Free-For-Teacher account program. All institutions using FFT accounts between April 30 and May 7, 2026, are potentially affected. The exposure window began on April 30, 2026, when unauthorized activity was first detected, and closed on May 7, 2026, when Instructure shut down the FFT program and rotated privileged credentials. The following timeline summarizes key events:
April 29, 2026: Unauthorized activity detected in Instructure Canvas LMS (Bitdefender, Mashable, https://businessinsights.bitdefender.com/technical-advisory-shinyhunters-breach-instructure-canvas-lms, https://mashable.com/article/instructure-canvas-hack-shinyhunters-breach-school-websites).
May 1, 2026: Instructure publicly confirms breach (Bitdefender, https://businessinsights.bitdefender.com/technical-advisory-shinyhunters-breach-instructure-canvas-lms).
May 3, 2026: ShinyHunters claims responsibility and launches extortion campaign (Bitdefender, https://businessinsights.bitdefender.com/technical-advisory-shinyhunters-breach-instructure-canvas-lms).
May 7, 2026: Canvas, Canvas Beta, and Canvas Test taken offline for investigation; FFT program permanently shut down; original ransom deadline (Bitdefender, Mashable, https://businessinsights.bitdefender.com/technical-advisory-shinyhunters-breach-instructure-canvas-lms, https://mashable.com/article/instructure-canvas-hack-shinyhunters-breach-school-websites).
May 8, 2026: Canvas restored; public advisories issued (Bitdefender, Mashable, https://businessinsights.bitdefender.com/technical-advisory-shinyhunters-breach-instructure-canvas-lms, https://mashable.com/article/instructure-canvas-hack-shinyhunters-breach-school-websites).
May 12, 2026: ShinyHunters threatens to release data if ransom not paid (Mashable, TechCrunch via Mashable, https://mashable.com/article/instructure-canvas-hack-shinyhunters-breach-school-websites).
Threat Activity
ShinyHunters initiated a public extortion campaign on May 3, 2026, threatening to release stolen data unless a ransom was paid by May 7, later extended to May 12. The group claimed to have exfiltrated 3.6 TB of data affecting 275 million users across 9,000 schools, though these figures have not been confirmed by Instructure. The attackers published a list of affected institutions and threatened to leak data on their public sites. TechCrunch and Mashable reported defacement of Canvas login pages at several schools, with injected HTML files displaying ransom messages. While these reports are credible, Instructure has not officially confirmed the extent of defacement or the level of access required.
The attackers’ tactics align with their established pattern of using public pressure and extortion to coerce payment. The compromised data includes high-quality PII, which can be used for targeted phishing and social engineering attacks. The risk extends beyond the initial breach window, as the stolen data remains valuable for future attacks.
Mitigation & Workarounds
The following actions are recommended, prioritized by severity:
Critical: Immediately rotate all API credentials and privileged accounts associated with Canvas LMS integrations. Ensure that all integrations are re-authorized using new credentials. This step is essential to prevent further unauthorized access using compromised credentials (Bitdefender, https://businessinsights.bitdefender.com/technical-advisory-shinyhunters-breach-instructure-canvas-lms).
Critical: Assess and disable any remaining Free-For-Teacher accounts or similar low-verification access methods in your environment. Confirm that no unauthorized FFT accounts have access to institutional data (Bitdefender, https://businessinsights.bitdefender.com/technical-advisory-shinyhunters-breach-instructure-canvas-lms).
High: Prepare for and educate users about personalized phishing campaigns. Use the compromised data (names, emails, student IDs, private messages) to craft simulated phishing exercises and update security awareness training (NJCCIC, https://www.cyber.nj.gov/Home/Components/News/News/2027/214).
High: Review all Canvas login pages and tenant configurations for signs of tampering or defacement. Restore from known-good backups if unauthorized changes are detected (Mashable, https://mashable.com/article/instructure-canvas-hack-shinyhunters-breach-school-websites).
Medium: Monitor for suspicious activity in Canvas logs, focusing on access patterns from FFT accounts and unusual data export or configuration changes during the exposure window (Bitdefender, https://businessinsights.bitdefender.com/technical-advisory-shinyhunters-breach-instructure-canvas-lms).
Medium: Engage with Instructure’s official incident updates and follow all vendor guidance for ongoing remediation and investigation (Instructure, https://www.instructure.com/incident_update).
Low: Coordinate with law enforcement and regulatory bodies as required by local data breach notification laws.
References
https://businessinsights.bitdefender.com/technical-advisory-shinyhunters-breach-instructure-canvas-lms
https://mashable.com/article/instructure-canvas-hack-shinyhunters-breach-school-websites
https://www.cyber.nj.gov/Home/Components/News/News/2027/214
https://www.instructure.com/incident_update
About Rescana
Rescana provides a third-party risk management (TPRM) platform designed to help organizations identify, assess, and monitor risks in their digital supply chain. Our platform enables continuous visibility into vendor security posture, supports rapid incident response coordination, and assists in mapping exposure to SaaS and cloud service providers. For questions about this incident or to discuss how our capabilities can support your risk management program, contact us at ops@rescana.com.

