Instructure confirms hackers used Canvas flaw to deface portals

BleepingComputer
Actively Exploited

Overview

Instructure, the company behind the Canvas learning management system, has acknowledged that a security flaw was exploited by hackers to alter Canvas login portals. This breach allowed the attackers to leave an extortion message, raising serious concerns about the security of educational platforms used by schools and students. The incident underscores the vulnerability of widely used technologies in the education sector, as they can be targeted for malicious purposes. Users of Canvas, including students and educators, may face disruptions or potential data risks due to this security lapse. It's crucial for institutions to evaluate their security measures and ensure that similar vulnerabilities are patched to prevent future incidents.

Key Takeaways

  • Active Exploitation: This vulnerability is being actively exploited by attackers. Immediate action is recommended.
  • Affected Systems: Canvas learning management system
  • Action Required: Institutions should apply any available patches for the Canvas system and review security protocols to prevent similar attacks.
  • Timeline: Newly disclosed

Original Article Summary

Education technology giant Instructure has confirmed that a security vulnerability allowed hackers to modify Canvas login portals and leave an extortion message. [...]

Impact

Canvas learning management system

Exploitation Status

This vulnerability is confirmed to be actively exploited by attackers in real-world attacks. Organizations should prioritize patching or implementing workarounds immediately.

Timeline

Newly disclosed

Remediation

Institutions should apply any available patches for the Canvas system and review security protocols to prevent similar attacks.

Additional Information

This threat intelligence is aggregated from trusted cybersecurity sources. For the most up-to-date information, technical details, and official vendor guidance, please refer to the original article linked below.

Related Topics: This incident relates to Vulnerability.

Related Coverage

TanStack, Mistral AI, UiPath Hit in Fresh Supply Chain Attack

SecurityWeek

A recent supply chain attack known as the Mini Shai-Hulud campaign has resulted in the release of over 400 malicious versions of 170 software packages. Companies like TanStack, Mistral AI, and UiPath have been affected by this incident. Researchers have noted that the attack targets developers by compromising popular package repositories, which could lead to the distribution of malware to unsuspecting users. This incident is concerning as it highlights the vulnerabilities in the software supply chain and raises alarms for organizations relying on third-party packages for their development processes. Companies must take immediate action to audit their dependencies and ensure they are using secure versions of software packages.

May 12, 2026

Malicious Hugging Face Repository Typosquats OpenAI

Infosecurity Magazine

Researchers from HiddenLayer have discovered a malicious repository on Hugging Face that contains an infostealer malware. This malware is designed to harvest sensitive information from users' systems, particularly targeting credentials and private data. The repository falsely mimics legitimate projects associated with OpenAI, tricking unsuspecting developers into downloading it. Users who have interacted with this repository may be at risk of data theft, underscoring the need for vigilance when downloading code from online repositories. The incident serves as a reminder for developers to verify the authenticity of resources before use, as attackers increasingly employ typosquatting techniques to compromise systems.

May 12, 2026

South Staffordshire Water Fined £1m After Data Breach

Infosecurity Magazine

South Staffordshire Water has been fined nearly £1 million by the Information Commissioner's Office (ICO) due to multiple data protection violations. The breaches stemmed from inadequate security measures that allowed unauthorized access to customer data, affecting thousands of individuals. This incident raises concerns about how utility companies manage sensitive customer information and the consequences of failing to protect that data. The fine serves as a reminder to organizations about the importance of maintaining robust data security practices to safeguard user privacy. With increasing scrutiny on data protection, companies must prioritize compliance to avoid similar penalties in the future.

May 12, 2026

Instructure Reaches Ransom Agreement with ShinyHunters to Stop 3.65TB Canvas Leak

The Hacker News

Instructure, the company behind the educational platform Canvas, has come to an agreement with the cybercrime group ShinyHunters after they breached Instructure's network. The attackers threatened to leak 3.65TB of sensitive information, which includes data from thousands of schools and universities. Instructure announced the agreement in an update, although specifics of the deal were not disclosed. This incident raises concerns about the security of educational institutions and the potential exposure of student and faculty information. The breach highlights the vulnerabilities that many organizations face in safeguarding their networks against cyber threats.

May 12, 2026

State of ransomware in 2026

Securelist

Kaspersky researchers have identified key trends in ransomware for 2026, indicating a shift in tactics among cybercriminals. One notable trend is the emergence of EDR killers, tools designed to bypass endpoint detection and response systems, making it easier for attackers to operate undetected. Additionally, there is a growing focus on data leaks rather than just data encryption, meaning that attackers might threaten to expose sensitive information instead of simply locking it away. This change could lead to increased pressure on organizations to comply with ransom demands, as the risk of public exposure rises. These trends are significant as they suggest that companies will need to adapt their security strategies to combat evolving ransomware tactics effectively.

May 12, 2026

New GhostLock tool abuses Windows API to block file access

BleepingComputer

A security researcher has introduced a tool called GhostLock that exploits a legitimate Windows file API to prevent access to files on local systems and SMB network shares. This proof-of-concept tool demonstrates how attackers could potentially block users from accessing important files, which could lead to significant disruptions in both personal and organizational environments. The ability to manipulate file access raises concerns for businesses relying on shared network drives and highlights the need for improved security measures to protect against such attacks. As this tool becomes known, companies and users alike may need to reassess their file access protocols and security practices to mitigate risks. The implications of this vulnerability could affect a wide range of Windows systems and applications that utilize the Windows file API.

May 11, 2026