Instructure Reaches Ransom Agreement with ShinyHunters to Stop 3.65TB Canvas Leak

The Hacker News
Actively Exploited

Overview

Instructure, the company behind the educational platform Canvas, has come to an agreement with the cybercrime group ShinyHunters after they breached Instructure's network. The attackers threatened to leak 3.65TB of sensitive information, which includes data from thousands of schools and universities. Instructure announced the agreement in an update, although specifics of the deal were not disclosed. This incident raises concerns about the security of educational institutions and the potential exposure of student and faculty information. The breach highlights the vulnerabilities that many organizations face in safeguarding their networks against cyber threats.

Key Takeaways

  • Active Exploitation: This vulnerability is being actively exploited by attackers. Immediate action is recommended.
  • Affected Systems: Canvas, Instructure, educational institutions
  • Timeline: Ongoing since [timeframe]

Original Article Summary

American educational technology company Instructure, the parent company of Canvas, said it reached an "agreement" with a decentralized cybercrime extortion group after it breached its network and threatened to leak stolen information from thousands of schools and universities. In an update shared on Monday, the Utah-based firm said it "reached an agreement with the unauthorized actor involved in

Impact

Canvas, Instructure, educational institutions

Exploitation Status

This vulnerability is confirmed to be actively exploited by attackers in real-world attacks. Organizations should prioritize patching or implementing workarounds immediately.

Timeline

Ongoing since [timeframe]

Remediation

Not specified

Additional Information

This threat intelligence is aggregated from trusted cybersecurity sources. For the most up-to-date information, technical details, and official vendor guidance, please refer to the original article linked below.

Related Topics: This incident relates to Update, Data Breach.

Related Coverage

TanStack, Mistral AI, UiPath Hit in Fresh Supply Chain Attack

SecurityWeek

A recent supply chain attack known as the Mini Shai-Hulud campaign has resulted in the release of over 400 malicious versions of 170 software packages. Companies like TanStack, Mistral AI, and UiPath have been affected by this incident. Researchers have noted that the attack targets developers by compromising popular package repositories, which could lead to the distribution of malware to unsuspecting users. This incident is concerning as it highlights the vulnerabilities in the software supply chain and raises alarms for organizations relying on third-party packages for their development processes. Companies must take immediate action to audit their dependencies and ensure they are using secure versions of software packages.

May 12, 2026

Malicious Hugging Face Repository Typosquats OpenAI

Infosecurity Magazine

Researchers from HiddenLayer have discovered a malicious repository on Hugging Face that contains an infostealer malware. This malware is designed to harvest sensitive information from users' systems, particularly targeting credentials and private data. The repository falsely mimics legitimate projects associated with OpenAI, tricking unsuspecting developers into downloading it. Users who have interacted with this repository may be at risk of data theft, underscoring the need for vigilance when downloading code from online repositories. The incident serves as a reminder for developers to verify the authenticity of resources before use, as attackers increasingly employ typosquatting techniques to compromise systems.

May 12, 2026

South Staffordshire Water Fined £1m After Data Breach

Infosecurity Magazine

South Staffordshire Water has been fined nearly £1 million by the Information Commissioner's Office (ICO) due to multiple data protection violations. The breaches stemmed from inadequate security measures that allowed unauthorized access to customer data, affecting thousands of individuals. This incident raises concerns about how utility companies manage sensitive customer information and the consequences of failing to protect that data. The fine serves as a reminder to organizations about the importance of maintaining robust data security practices to safeguard user privacy. With increasing scrutiny on data protection, companies must prioritize compliance to avoid similar penalties in the future.

May 12, 2026

State of ransomware in 2026

Securelist

Kaspersky researchers have identified key trends in ransomware for 2026, indicating a shift in tactics among cybercriminals. One notable trend is the emergence of EDR killers, tools designed to bypass endpoint detection and response systems, making it easier for attackers to operate undetected. Additionally, there is a growing focus on data leaks rather than just data encryption, meaning that attackers might threaten to expose sensitive information instead of simply locking it away. This change could lead to increased pressure on organizations to comply with ransom demands, as the risk of public exposure rises. These trends are significant as they suggest that companies will need to adapt their security strategies to combat evolving ransomware tactics effectively.

May 12, 2026

New GhostLock tool abuses Windows API to block file access

BleepingComputer

A security researcher has introduced a tool called GhostLock that exploits a legitimate Windows file API to prevent access to files on local systems and SMB network shares. This proof-of-concept tool demonstrates how attackers could potentially block users from accessing important files, which could lead to significant disruptions in both personal and organizational environments. The ability to manipulate file access raises concerns for businesses relying on shared network drives and highlights the need for improved security measures to protect against such attacks. As this tool becomes known, companies and users alike may need to reassess their file access protocols and security practices to mitigate risks. The implications of this vulnerability could affect a wide range of Windows systems and applications that utilize the Windows file API.

May 11, 2026

Tech Can't Stop These Threats — Your People Can

darkreading

The article discusses the limitations of technical security measures in preventing cyber attacks, emphasizing that employees often serve as the first line of defense. It outlines four specific types of attacks that target human vulnerabilities, such as phishing and social engineering. These attacks exploit the trust and behavior of employees rather than technical flaws in systems. This highlights the need for companies to invest in training and awareness programs for their staff to recognize and respond to potential threats effectively. As cyber threats continue to evolve, a well-informed workforce is crucial for enhancing overall security.

May 11, 2026