ctipilot.chSwitzerland · Europe · Public sector

Instructure (Canvas LMS) data breach — student and educator data

incident · incident:instructure-canvas-2026

Coverage timeline
4
first 2026-05-06 → last 2026-05-09
Briefs
4
4 distinct
Sources cited
8
8 hosts
Sections touched
2
incidents, updates
Co-occurring entities
3
see Related entities below

Story timeline

  1. 2026-05-09CTI Daily Brief — 2026-05-09
    updatesUPDATE: Oxford, Cambridge, Liverpool issued public statements. 44 Dutch institutions confirmed by UNL. WorldLeaks May 12 extortion deadline active. No payment or data dump as of window close. Instructure confirmed breach vector: compromised LTI integration service account.
  2. 2026-05-08CTI Daily Brief — 2026-05-08
    updatesUPDATE: Threat actor now claims 330 institutions across 6 countries; 44 Dutch institutions confirmed by SURF; 2026-05-12 extortion deadline; Canvas taken offline again 2026-05-07 for emergency patching; Dutch and German DPAs opened preliminary inquiries.
  3. 2026-05-07CTI Daily Brief — 2026-05-07
    updatesUPDATE: Individual universities (U Nevada Reno, U Penn) issuing direct student/staff notifications from 2026-05-06. Institutional scale now surfacing in downstream disclosures.
  4. 2026-05-06CTI Daily Brief — 2026-05-06
    incidentsFirst coverage. Victim confirmed names, email addresses, student IDs, messages accessed; ShinyHunters claimed ~9,000 institutions affected (victim scale unconfirmed); API key revocation response.

Where this entity is cited

  • updates3
  • incidents1

Source distribution

  • bleepingcomputer.com1 (12%)
  • dutchnews.nl1 (12%)
  • surf.nl1 (12%)
  • techzine.eu1 (12%)
  • securityweek.com1 (12%)
  • techcrunch.com1 (12%)
  • thedp.com1 (12%)
  • unr.edu1 (12%)

Related entities

Items in briefs about Instructure (Canvas LMS) data breach — student and educator data (3)

UPDATE: Canvas/Instructure — ShinyHunters claims a *second* intrusion despite May 8 patches; seven Dutch universities executed emergency disconnects on/before May 9

From CTI Daily Brief — 2026-05-10 · published 2026-05-10 · view item permalink →

UPDATE (originally covered 2026-05-08; previous UPDATE 2026-05-09): ShinyHunters posted a second intrusion notice around 2026-05-08 asserting Instructure's Canvas LMS retained unpatched vulnerabilities allowing re-entry despite the company's earlier security-patch deployment (Techzine EU, 2026-05-08 · DutchNews.nl, 2026-05-08). Instructure confirmed the second breach, rotated application keys, increased monitoring, and required API-client re-authorisation across its customer base.

Seven Dutch universities — VU Amsterdam, University of Amsterdam, Erasmus University Rotterdam, Tilburg University, Eindhoven University of Technology (TU/e), Maastricht University, and University of Twente — executed emergency Canvas disconnections on or before 2026-05-09 after the attackers claimed continued active access. The Dutch Data Protection Authority (Autoriteit Persoonsgegevens) received an incident report from VU Amsterdam.

The 2026-05-12 extortion deadline remains active — two days from publication. ShinyHunters's original claim cited 275 million records (names, email addresses, student IDs, private messages) across thousands of educational institutions worldwide (Techzine EU, 2026-05-08); if the second-intrusion claim is verified, Instructure's remediation was incomplete and the data-release threat is materially more credible. Defenders at European universities using Canvas should treat credential-stuffing risk on stolen student / staff emails as active, audit third-party LTI integrations, and watch for follow-on phishing campaigns referencing course content.

UPDATE: Canvas/Instructure extortion — Oxford, Cambridge, Liverpool issue public statements; 44 Dutch universities confirmed; May 12 deadline active

From CTI Daily Brief — 2026-05-09 · published 2026-05-10 · view item permalink →

UPDATE (originally covered 2026-05-08):

As of the window close (2026-05-09 06:00 UTC), no ransom payment has been made and no further data dump has been published. Three major UK universities issued public statements: University of Oxford confirmed it is working with Instructure and the NCSC-UK; University of Cambridge issued a statement acknowledging that "student and staff data may have been affected" and referred staff to the National Cyber Security Centre guidance; University of Liverpool confirmed it had notified the Information Commissioner's Office under Article 33 GDPR and is conducting a forensic investigation. Universiteiten van Nederland (UNL) confirmed that 44 member institutions are potentially affected, representing all Dutch research universities and applied science universities; the Dutch DPA (Autoriteit Persoonsgegevens) has opened a preliminary investigation.

The threat actor (WorldLeaks) set a 2026-05-12 payment deadline; the extortion amount was stated as €3.2 million. WorldLeaks previously published a 3 GB sample dataset on 2026-05-07 containing course-IDs, student email addresses, assignment metadata, and grade records across four UK institutions. No passwords, payment data, or national identification numbers were present in the sample. Instructure issued a public statement on 2026-05-08 confirming the breach vector was a compromised integration service account for a third-party LTI tool provider (not Canvas core infrastructure), and that the issue was isolated. Instructure stated it notified affected institutions on 2026-05-01 and has been working with law enforcement.

UPDATE — Instructure/Canvas extortion: 330 institutions across six countries; May 12 extortion deadline; 44 Dutch institutions confirmed

From CTI Daily Brief — 2026-05-08 · published 2026-05-10 · view item permalink →

(First covered 2026-05-06.) The Instructure/Canvas breach has expanded significantly in scope. The threat actor now claims access affecting 330 institutions across six countries, threatening to publish 16 million student and staff records. SURF (the Dutch National Research and Education Network) has confirmed 44 Dutch institutions among the victims. The attacker posted portal defacements at multiple universities and established a 2026-05-12 extortion deadline for ransom payment. Canvas services were taken offline again on 2026-05-07 for emergency patching. European DPAs in the Netherlands and Germany have opened preliminary inquiries into notification timing. Institutions using Canvas should assess GDPR Article 33/34 breach notification obligations before the May 12 deadline.