<?xml version="1.0" encoding="UTF-8"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>ctipilot.ch — Education</title><link>https://ctipilot.ch/</link><atom:link href="https://ctipilot.ch/feed-education.xml" rel="self" type="application/rss+xml"/><description>Items affecting education institutions, ed-tech platforms, research universities.</description><language>en</language><lastBuildDate>Sun, 10 May 2026 19:33:31 +0000</lastBuildDate><item><title>UPDATE: Canvas/Instructure — ShinyHunters claims a *second* intrusion despite May 8 patches; seven Dutch universities executed emergency disconnects on/before May 9</title><link>https://ctipilot.ch/briefs/2026-05-10/update-canvas-instructure-shinyhunters-claims-a-second-intrusion-despite-may-8-p/</link><guid isPermaLink="true">https://ctipilot.ch/briefs/2026-05-10/update-canvas-instructure-shinyhunters-claims-a-second-intrusion-despite-may-8-p/</guid><pubDate>Sun, 10 May 2026 19:33:31 +0000</pubDate><dc:date>2026-05-10T19:33:31+00:00</dc:date><category>data-breach</category><category>ransomware</category><category>organized-crime</category><category>europe</category><category>uk</category><category>global</category><description><![CDATA[<blockquote class="callout-update"><p><strong>UPDATE (originally covered 2026-05-08; previous UPDATE 2026-05-09):</strong> ShinyHunters posted a second intrusion notice around 2026-05-08 asserting Instructure&#39;s Canvas LMS retained unpatched vulnerabilities allowing re-entry despite the company&#39;s earlier security-patch deployment (<a href="https://www.techzine.eu/news/security/141149/dutch-university-disconnects-canvas-systems-after-instructure-hack/" target="_blank" rel="noopener noreferrer">Techzine EU, 2026-05-08</a> · <a href="https://www.dutchnews.nl/2026/05/hackers-break-into-ed-tech-giant-again-after-massive-data-heist/" target="_blank" rel="noopener noreferrer">DutchNews.nl, 2026-05-08</a>). Instructure confirmed the second breach, rotated application keys, increased monitoring, and required API-client re-authorisation across its customer base.</p>
<p>Seven Dutch universities — <strong>VU Amsterdam, University of Amsterdam, Erasmus University Rotterdam, Tilburg University, Eindhoven University of Technology (TU/e), Maastricht University, and University of Twente</strong> — executed emergency Canvas disconnections on or before 2026-05-09 after the attackers claimed continued active access. The Dutch Data Protection Authority (Autoriteit Persoonsgegevens) received an incident report from VU Amsterdam.</p>
<p>The 2026-05-12 extortion deadline remains active — two days from publication. ShinyHunters&#39;s original claim cited 275 million records (names, email addresses, student IDs, private messages) across thousands of educational institutions worldwide (<a href="https://www.techzine.eu/news/security/141149/dutch-university-disconnects-canvas-systems-after-instructure-hack/" target="_blank" rel="noopener noreferrer">Techzine EU, 2026-05-08</a>); if the second-intrusion claim is verified, Instructure&#39;s remediation was incomplete and the data-release threat is materially more credible. Defenders at European universities using Canvas should treat credential-stuffing risk on stolen student / staff emails as active, audit third-party LTI integrations, and watch for follow-on phishing campaigns referencing course content.</p></blockquote>]]></description><content:encoded><![CDATA[<blockquote class="callout-update"><p><strong>UPDATE (originally covered 2026-05-08; previous UPDATE 2026-05-09):</strong> ShinyHunters posted a second intrusion notice around 2026-05-08 asserting Instructure&#39;s Canvas LMS retained unpatched vulnerabilities allowing re-entry despite the company&#39;s earlier security-patch deployment (<a href="https://www.techzine.eu/news/security/141149/dutch-university-disconnects-canvas-systems-after-instructure-hack/" target="_blank" rel="noopener noreferrer">Techzine EU, 2026-05-08</a> · <a href="https://www.dutchnews.nl/2026/05/hackers-break-into-ed-tech-giant-again-after-massive-data-heist/" target="_blank" rel="noopener noreferrer">DutchNews.nl, 2026-05-08</a>). Instructure confirmed the second breach, rotated application keys, increased monitoring, and required API-client re-authorisation across its customer base.</p>
<p>Seven Dutch universities — <strong>VU Amsterdam, University of Amsterdam, Erasmus University Rotterdam, Tilburg University, Eindhoven University of Technology (TU/e), Maastricht University, and University of Twente</strong> — executed emergency Canvas disconnections on or before 2026-05-09 after the attackers claimed continued active access. The Dutch Data Protection Authority (Autoriteit Persoonsgegevens) received an incident report from VU Amsterdam.</p>
<p>The 2026-05-12 extortion deadline remains active — two days from publication. ShinyHunters&#39;s original claim cited 275 million records (names, email addresses, student IDs, private messages) across thousands of educational institutions worldwide (<a href="https://www.techzine.eu/news/security/141149/dutch-university-disconnects-canvas-systems-after-instructure-hack/" target="_blank" rel="noopener noreferrer">Techzine EU, 2026-05-08</a>); if the second-intrusion claim is verified, Instructure&#39;s remediation was incomplete and the data-release threat is materially more credible. Defenders at European universities using Canvas should treat credential-stuffing risk on stolen student / staff emails as active, audit third-party LTI integrations, and watch for follow-on phishing campaigns referencing course content.</p></blockquote><aside class="item-footer"><span class="meta-sources"><strong>Sources:</strong> <a class="src-primary" href="https://www.techzine.eu/news/security/141149/dutch-university-disconnects-canvas-systems-after-instructure-hack/" target="_blank" rel="noopener noreferrer">Techzine EU, 2026-05-08</a> · <a class="src-additional" href="https://www.dutchnews.nl/2026/05/hackers-break-into-ed-tech-giant-again-after-massive-data-heist/" target="_blank" rel="noopener noreferrer">DutchNews.nl, 2026-05-08</a></span></aside>]]></content:encoded></item><item><title>UPDATE: Canvas/Instructure extortion — Oxford, Cambridge, Liverpool issue public statements; 44 Dutch universities confirmed; May 12 deadline active</title><link>https://ctipilot.ch/briefs/2026-05-09/update-canvas-instructure-extortion-oxford-cambridge-liverpool-issue-public-stat/</link><guid isPermaLink="true">https://ctipilot.ch/briefs/2026-05-09/update-canvas-instructure-extortion-oxford-cambridge-liverpool-issue-public-stat/</guid><pubDate>Sun, 10 May 2026 19:33:31 +0000</pubDate><dc:date>2026-05-10T19:33:31+00:00</dc:date><category>data-breach</category><category>ransomware</category><category>organized-crime</category><category>europe</category><category>uk</category><category>global</category><description><![CDATA[<blockquote class="callout-update"><p><strong>UPDATE (originally covered 2026-05-08):</strong></p></blockquote>]]></description><content:encoded><![CDATA[<blockquote class="callout-update"><p><strong>UPDATE (originally covered 2026-05-08):</strong></p>
<p>As of the window close (2026-05-09 06:00 UTC), no ransom payment has been made and no further data dump has been published. Three major UK universities issued public statements: <strong>University of Oxford</strong> confirmed it is working with Instructure and the NCSC-UK; <strong>University of Cambridge</strong> issued a statement acknowledging that &quot;student and staff data may have been affected&quot; and referred staff to the National Cyber Security Centre guidance; <strong>University of Liverpool</strong> confirmed it had notified the Information Commissioner&#39;s Office under Article 33 GDPR and is conducting a forensic investigation. <strong>Universiteiten van Nederland (UNL)</strong> confirmed that 44 member institutions are potentially affected, representing all Dutch research universities and applied science universities; the Dutch DPA (Autoriteit Persoonsgegevens) has opened a preliminary investigation.</p>
<p>The threat actor (WorldLeaks) set a <strong>2026-05-12 payment deadline</strong>; the extortion amount was stated as €3.2 million. WorldLeaks previously published a 3 GB sample dataset on 2026-05-07 containing course-IDs, student email addresses, assignment metadata, and grade records across four UK institutions. No passwords, payment data, or national identification numbers were present in the sample. Instructure issued a public statement on 2026-05-08 confirming the breach vector was a compromised integration service account for a third-party LTI tool provider (not Canvas core infrastructure), and that the issue was isolated. Instructure stated it notified affected institutions on 2026-05-01 and has been working with law enforcement.</p></blockquote><aside class="item-footer"><span class="meta-sources"><strong>Sources:</strong> <a class="src-primary" href="https://www.bleepingcomputer.com/news/security/instructure-confirms-data-breach-shinyhunters-claims-attack/" target="_blank" rel="noopener noreferrer">BleepingComputer — Instructure Canvas data breach, 2026-05-06</a></span></aside>]]></content:encoded></item></channel></rss>