HomeIntelligenceBrief
BREACH BRIEF🔴 Critical Breach

ShinyHunters Claims Second Data Breach Exposing Hundreds of Millions of Instructure Users' PII

ShinyHunters announced a second intrusion into Instructure’s Canvas platform, exposing personal data of hundreds of millions of students and educators. The breach underscores persistent security gaps in a critical EdTech SaaS provider, raising urgent TPRM concerns for any organization that relies on the service.

LiveThreat™ Intelligence · 📅 May 09, 2026· 📰 darkreading.com
🔴
Severity
Critical
BR
Type
Breach
🎯
Confidence
High
🏢
Affected
2 sector(s)
Actions
3 recommended
📰
Source
darkreading.com

ShinyHunters Claims Second Data Breach Exposing Hundreds of Millions of Instructure Users' PII

What Happened — ShinyHunters announced a follow‑up intrusion against Instructure, the provider of the Canvas learning‑management system. The group says it has accessed personally‑identifiable information (PII) belonging to hundreds of millions of students, educators and staff worldwide.

Why It Matters for TPRM

  • Massive PII exposure creates regulatory, reputational, and financial risk for any organization that relies on Instructure’s SaaS platform.
  • A repeat breach suggests persistent weaknesses in Instructure’s security posture and supply‑chain hygiene.
  • Third‑party risk programs must reassess Instructure’s controls and any downstream integrations that may inherit the compromised data.

Who Is Affected — Education institutions (K‑12, higher education), EdTech service providers, and any organization that contracts Instructure for LMS services.

Recommended Actions

  • Review contracts and security questionnaires for Instructure; demand evidence of remediation and updated controls.
  • Conduct a rapid data‑loss assessment to determine if any of your organization’s users appear in the disclosed data set.
  • Implement additional monitoring for credential reuse and enforce MFA for all Instructure accounts.

Technical Notes — The breach appears to stem from compromised credentials, possibly obtained via credential‑stuffing or phishing, leading to unauthorized access to Instructure’s backend APIs. No specific CVE was disclosed. Exfiltrated data includes names, email addresses, usernames, and course enrollment details. Source: Dark Reading

📰 Original Source
https://www.darkreading.com/cyberattacks-data-breaches/shinyhunters-second-attack-instructure

This LiveThreat Intelligence Brief is an independent analysis. Read the original reporting at the link above.

Monitor Your Vendor Risk with LiveThreat™

Get automated breach alerts, security scorecards, and intelligence briefs when your vendors are compromised.