May 13, 2026

ShinyHunters / Instructure (Canvas) Incident: CISO Information Pack & Technical Details

Protos Labs Threat Intelligence

#ShinyHunters #Canvas #Instructure #ThreatIntelligence #CyberSecurity #Education #DataBreach
May 13, 2026
ShinyHunters / Instructure (Canvas) Incident

CISO Information Pack — Education Sector

A structured brief on the Canvas × ShinyHunters incident for CISOs and security leaders in the education sector. Built so a CISO can read the first two sections in five minutes and brief the executive team, then hand the rest to their security team for action.

Classification TLP:CLEAR
Prepared by Protos Labs Threat Intelligence
Version v3 — 13 May 2026
Audience CISOs & security leaders, education
Reporting window 25 Apr 2026 → 13 May 2026 (incident); broader actor profile draws on 2020–2026 reporting
Supersedes v2 edition, 10 May 2026
Companion document Technical details ↗
Distribution Share freely within and between organisations
§ 00 · Orientation

How to use this pack.

This pack is structured so a CISO can read the first two sections in five minutes and brief the executive team, then hand the rest to their security team for action. It is built from Protos Labs investigation work plus open-source corroboration as of 13 May 2026. Where claims are based on actor statements rather than vendor or independent confirmation, that distinction is preserved.

The pack covers four things:

  • Latest position — what is confirmed, what is claimed but unverified, and what changed in the last 72 hours.
  • What this means for your institution — risk framing for non-Instructure customers as well as direct ones.
  • Threat actor context — who ShinyHunters are, how they have evolved, and why the education sector is a recurring target.
  • Recommended actions and supporting technical material — contained in accompanying technical details document.
§ 01 · As of 13 May 2026

Latest position.

Timeline of the incident

25 Apr 2026
Initial intrusion (Instructure-stated incident date).
29 Apr 2026
Instructure detects unauthorized activity in Canvas; revokes attacker access.
30 Apr 2026
Additional suspicious access discovered; further revocations and "underlying vulnerability" addressed; Canvas Data 2 and Canvas Beta placed under maintenance after disruption to API-key-dependent tools.
1 May 2026
Instructure CISO Steve Proud publicly confirms a "cybersecurity incident perpetrated by a criminal threat actor"; outside forensics engaged (subsequently named as CrowdStrike, per The Register, 12 May 2026); Canvas Test also enters maintenance.
2 May 2026
Vendor states the incident is "contained"; exposed data categories disclosed.
3 May 2026
ShinyHunters lists Instructure on its Tor-based leak site with "PAY OR LEAK" and an initial 6 May deadline.
5 May 2026
Instructure begins notifying impacted schools.
6 May 2026
Instructure states it is "not seeing any ongoing unauthorized activity".
7 May 2026
Second-wave intrusion detected by Instructure — ShinyHunters defaces ~330 Canvas school login portals (The Register; Help Net Security) exploiting the same Free-For-Teacher issue. Canvas, Canvas Beta, and Canvas Test taken offline and placed in maintenance mode. FBI Cyber Division and CISA notified.
8 May 2026
Canvas fully restored; Free-For-Teacher account program permanently shut down. Bitdefender publishes Tier-1 Technical Advisory. Instructure removed from the ShinyHunters leak-site listing.
11 May 2026
Instructure announces "agreement with the unauthorized actor" to secure stolen data. Vendor states it received "digital confirmation of data destruction (shred logs)" and that "no Instructure customers will be extorted as a result of this incident, publicly or otherwise." The agreement is stated to cover all impacted customers; no individual customer engagement is required. Instructure has not used the word "ransom"; The Register, Help Net Security and Inside Higher Ed characterise this as a ransom payment. Amount not publicly disclosed.
12 May 2026
Original pay-or-leak final deadline (end-of-day 12 May). US Congressional investigation into the breach opened (The Register, 12 May 2026); Instructure CEO Steve Daly named for testimony. Multiple Tier-2 sources (HackRead, BleepingComputer, The Register) report ShinyHunters clearnet domain shinyhunte[.]rs is suspended / non-resolving; group announces a shift to onion-only leak infrastructure.
12–13 May 2026
Protos Labs 12-hour monitoring window (2026-05-12T12:00Z → 2026-05-13T00:00Z, TLP:CLEAR): independent technical checks confirm shinyhunte[.]rs did not resolve in public DNS and RDAP returned 404; no new clearnet replacement domains, paste links, IPs, or file hashes attributable to ShinyHunters surfaced in monitored RSS sources during the window. Authoritative registrar/registry confirmation of permanent suspension is still pending — current confidence Moderate that the domain is suspended (vs. transient outage).

Confirmed exposed data

Names, email addresses (mostly institutional .edu addresses), student ID numbers, and Canvas inbox messages between users.

Canvas breach confirmed by Instructure

  • Instructure, the company behind SaaS platform Canvas, stated the cyber incident date as 25 April 2026, with detection on 29 April.
  • The unauthorized actor exploited an issue related to Instructure's Free-For-Teacher account program — the same issue that enabled the second-wave 7 May intrusion. The program has now been permanently shut down.
  • Privileged credentials were revoked, API keys rotated, and law enforcement engaged. Instructure confirmed engagement of CrowdStrike for forensic analysis and incident response, and confirmed notification of the FBI and CISA.
  • Instructure confirmed only the following exposed data: names, email addresses (mostly institutional .edu addresses), student ID numbers, and Canvas inbox messages between users.
  • Per their most recent statement, no evidence that passwords, dates of birth, government identifiers, or financial information were exposed. This may be revised as the investigation continues.
  • Canvas was fully restored on 8 May 2026 following the Free-For-Teacher shutdown.
New — 11 May 2026

Ransom outcome

On 11 May 2026 Instructure stated it had "reached an agreement with the unauthorized actor involved in this incident" and had "secured stolen data." The company reported receipt of "digital confirmation of data destruction (shred logs)" and that "no Instructure customers will be extorted as a result of this incident, publicly or otherwise." The agreement is stated to cover all impacted customers, removing any requirement for individual institutions to negotiate directly.

Instructure has not used the word "ransom" in any public communication. The Register, Help Net Security and Inside Higher Ed have characterised the agreement as a ransom payment; the monetary amount has not been disclosed by either Instructure or the threat actor.

CISO-relevant caveats

  • Help Net Security and independent commentators have noted that paying threat actors does not guarantee data was not copied, redistributed, or shared with affiliates before destruction. The "shred logs" assurance is by the threat actor's word.
  • The FBI's standing public position remains: do not pay ransoms. Instructure's decision is described by The Register as a "risky approach."
  • The agreement covers Instructure-impacted customers as a class but does not prevent downstream use of any data the actor or affiliates may have retained or sold prior to the agreement.

Claimed by the threat actor (unverified)

  • An actor using the ShinyHunters name claimed responsibility on 3 May 2026 via its Tor-based leak site; the listing was reproduced by Ransomware.live.
  • The claim references approximately 3.65 TB of data, ~275 million records, and ~8,809 schools/institutions. These figures are actor-supplied and have not been independently verified. Historical ShinyHunters claims have frequently been inflated; one ShinyHunters representative subsequently told TechCrunch the unique email count is closer to 231 million.
  • The 7 May login-page defacement messages instructed schools to "contact us privately at TOX" — referring to Tox, a peer-to-peer encrypted messaging protocol used by the group for negotiation. The specific Tox ID is the actionable indicator; "TOX" itself is the channel, not a token.
  • ShinyHunters also claims a separate breach of Instructure's Salesforce instance in May 2026, and that individual organisations have already paid them directly. Neither claim is independently verified. The vendor-confirmed vector remains the Canvas Free-For-Teacher account program.

Confirmed second breach in eight months

This is Instructure's second ShinyHunters breach in eight months, but the attack surfaces differ:

September 2025

Salesforce (peripheral)

Vishing-led social engineering against Instructure's Salesforce instance — peripheral business infrastructure, no Canvas product data. Part of a broader campaign that allegedly exfiltrated ~1.5 billion Salesforce records from ~760 organisations via the Salesloft Drift supply-chain attack.

May 2026

Canvas (core product)

Direct exploitation of the Free-For-Teacher program in the Canvas platform itself — institutional course data, student information, and private communications.

CISOs evaluating Instructure (or any SaaS vendor) on this campaign should request documentation on what changed after September 2025 and why those controls did not prevent the May 2026 incident.

What is not yet known

  • Tenant-by-tenant scope. Each Canvas customer must confirm with Instructure which of its specific data, integrations, and users were affected.
  • Final dataset scale. The actor's 275M / 8,809-schools figures have not been independently corroborated; even with the 11 May agreement, no third-party forensic accounting has been published.
  • Whether further data was taken from the second-wave (7 May) login-page activity beyond the original intrusion.
  • Whether any portion of the dataset was sold, shared with affiliates, or redistributed prior to the 11 May "data destruction" claim.
  • Authoritative registrar/registry confirmation that shinyhunte[.]rs is permanently suspended (vs. temporary outage or migration).
  • The amount paid (if any) and what regulatory disclosures will follow the Congressional inquiry.
§ 02 · For executives

Executive summary for non-technical stakeholders.

The headline. Canvas — the learning management system used by 41% of higher-education institutions in North America and over 8,000 institutions globally — has been hit by a data-extortion group called ShinyHunters. Identity data and private messages are confirmed exposed. Instructure announced on 11 May that it had reached an agreement with the threat actor and received "digital confirmation of data destruction"; press reporting (The Register, Help Net Security, Inside Higher Ed) characterises this as a ransom payment, though Instructure has not used that word and has not disclosed an amount. The most realistic near-term threat to your institution is not encryption of your systems, and is no longer leak-site exposure — it is a wave of highly credible phishing emails and phone calls aimed at your students, faculty, and IT staff, using context that may have been copied before the agreement was reached.

Why the ransom development does not relax defences. Paying a criminal group secures their cooperation with their public timeline. It does not secure the data.

Any copy that left the group's primary infrastructure prior to 11 May — to affiliates, brokers, or other extortion actors — remains usable for phishing and credential-stuffing campaigns. Treat the data as exposed regardless of the agreement.

Why it matters even if you are not an Instructure customer

ShinyHunters has spent the last 18 months systematically targeting the education and edtech sector, and the broader SaaS ecosystem the sector depends on. Confirmed victims in this campaign series include Instructure (twice), McGraw Hill (April 2026, ~13.5M emails confirmed by Have I Been Pwned), Infinite Campus (March 2026, via its Salesforce instance), and individual universities including the University of Pennsylvania, Princeton, and Harvard (late 2025). The recurring infrastructure target is Salesforce — many edtech vendors run customer data on Salesforce, and a single Salesforce or analytics-vendor compromise has cascaded across the sector multiple times.

What to do this week

Brief your IT helpdesk and admin staff on a specific phone-based social-engineering technique (vishing) the group is using to bypass MFA. Inventory and rotate developer keys, OAuth tokens, and service-account credentials tied to Canvas and Salesforce. Scan code repositories for exposed credentials. Preserve logs. Issue a measured user notification that focuses on what is confirmed, not what the actor claims, and that does not over-rely on the 11 May agreement.

Regulatory note

A US Congressional investigation into the breach opened on 12 May 2026 (The Register), with Instructure's CEO named for testimony. Education-sector regulators in the EU (GDPR), UK (DPA 2018) and Australia (Privacy Act) are likely to take an interest given the affected populations.

Risk level — High

This is driven by the combination of personally identifiable information, private message content, and educational context — not by ransomware, and not negated by the 11 May agreement. The follow-on phishing risk is the live threat.

§ 03 · Institutional impact

What this means for your institution.

If you are an Instructure customer

You are a directly affected party. Your immediate priorities are validating vendor guidance, inventorying your Canvas developer keys and LTI integrations, rotating or reauthorising affected credentials / tokens, hardening privileged access, preserving logs for forensic and regulatory needs, and preparing a measured user notification. See the technical details document for sequenced actions.

You should also specifically check whether your tenant ever used or interacted with Free-For-Teacher accounts — these have now been permanently shut down, and any data flows dependent on them need to be unwound.

On Instructure's 11 May agreement

Do not relax the credential-rotation, integration-reauthorisation, or phishing-defence work on the basis of the data-destruction claim. The shred-logs assurance is by the threat actor's word and does not address pre-agreement data redistribution.

If you are not an Instructure customer

You are still affected by the broader campaign in three ways:

  • Adjacent vendor exposure. Confirmed ShinyHunters victims also include McGraw Hill (April 2026), and Infinite Campus (March 2026, via its Salesforce instance). Most institutions hold student or staff data with at least one of these. Run the same key-rotation and integration-audit process against any edtech vendor that has disclosed an incident in the past 18 months, and pay particular attention to anything that touches Salesforce.
  • Indirect data exposure via partners. Affiliated schools, alumni systems, research partners, and third-party tutoring/proctoring services may be Canvas customers whose breach exposes your population indirectly.
  • Sector-wide phishing risk. The data exposed in this campaign — names, emails, student IDs, message content — fuels phishing campaigns targeted at the education sector generally, not just Canvas users. Expect attempts that reference plausible course names, instructor names, or message threads to surface across the sector for the next several months.

What will probably happen next

In order of likelihood:

  1. Targeted phishing emails referencing internal course or instructor names, sent to students and staff, attempting credential harvest or fraudulent payment requests.
  2. Vishing calls to IT helpdesks and finance/admin staff, using context from leaked data to appear legitimate.
  3. Impersonation of faculty in messages to students requesting urgent action (grade changes, fee payments, gift-card requests).
  4. Re-emergence of the dataset via secondary brokers or other extortion actors even after the 11 May "destruction" claim — particularly if affiliates retained copies.
  5. (Lower probability, longer time horizon) Follow-on intrusions where credentials harvested in this campaign are used to access other systems, particularly cloud services where the victim reused passwords.
FBI guidance

The FBI has publicly advised anyone who may be affected: do not engage with anyone claiming to have your data, do not respond to demands or send payments, and verify any unsolicited email, call, or text claiming to be from your school or learning management system through known channels before responding. This is useful framing to incorporate into your own user notifications.

§ 04 · Actor profile

Threat actor context: who ShinyHunters are.

Behavioural profile

ShinyHunters is a financially motivated data-extortion actor that emerged in 2020. The operating model emphasises public coercion rather than encryption: leak-site listings, staged sample releases, deadline-based negotiation pressure, and login-page defacement to amplify visibility. Until late 2025 ransomware was not part of the playbook (see "evolution" below).

The group has demonstrated effective tradecraft against SaaS and cloud-hosted environments, with particular skill at exploiting integration pathways — OAuth tokens, API keys, third-party connectors — rather than compromising endpoints.

Description of the actor in current reporting: a loose affiliation of teenagers and young adults based in the US and UK. Sebastien Raoult, an alleged member, was sentenced to three years' prison and over $5 million in restitution by the US Department of Justice in 2024.

Infrastructure status — May 2026

  • Clearnet domain shinyhunte[.]rs reported suspended / non-resolving as of 12 May 2026 (multiple Tier-2 sources; corroborated by Protos Labs 12-hour technical monitoring: DNS non-resolution, RDAP 404). Moderate confidence that this is a permanent suspension vs. transient outage pending registrar confirmation.
  • Onion leak infrastructure announced as the group's new primary distribution channel post-clearnet suspension. The pre-existing shinypogk4j…[.]onion site referenced in Bitdefender's 8 May Technical Advisory continues to be the principal observed onion address.
  • Operational impact for monitoring teams: shift to onion reduces visibility for organisations without lawfully-authorised dark-web monitoring. Closed-source feed coverage (VirusTotal, Censys, Shodan) and approved onion-monitoring services become more important; passive DNS and certificate-transparency monitoring for shinyhunte substrings should continue for replacement-domain discovery.

The SLSH alliance — important context

ShinyHunters now operates within Scattered LAPSUS$ Hunters (SLSH), a situational alliance fusing ShinyHunters, LAPSUS$, and Scattered Spider tradecraft. The umbrella sits inside the broader "Com" cybercrime ecosystem.

Mandiant currently tracks the activity across multiple UNC clusters that overlap with or feed ShinyHunters-branded extortion: UNC6040, UNC6240, UNC6661, and UNC6671. The Bling Libra cluster (Unit 42's designation for the same actor) is also part of this picture.

For CISOs, that means when you read about "ShinyHunters" in the press, you may be reading about several overlapping or affiliated clusters using shared infrastructure, branding, and extortion tooling. Defences calibrated to the brand alone may miss adjacent activity.

Targeting pattern

Recent ShinyHunters and SLSH activity shows recurring overlap with:

  • Salesforce — the central recurring infrastructure target. The Salesloft Drift supply-chain attack (August 2025), the Salesforce Aura campaign, and direct vishing-driven Salesforce intrusions are all linked to this group. The actor claims ~1.5 billion Salesforce records across ~760 organisations; independent reporting confirms at least ~400 affected Salesforce customers in the campaign cluster. The McGraw Hill, Infinite Campus, and ADT intrusions are Salesforce-rooted. ShinyHunters has also claimed that Instructure's Salesforce instance was breached in May 2026, but Instructure has not confirmed this; the vendor-confirmed vector is the Canvas Free-For-Teacher account program (see Section 1).
  • Analytics and data-pipeline supply-chain pivots. In April 2026 ShinyHunters compromised Anodot (a third-party analytics provider) and used stolen authentication tokens to pivot into customers' Snowflake and BigQuery environments. Vimeo is the publicly named victim of that pivot (~119,200 unique emails, 106GB leaked after extortion failed). ShinyHunters told BleepingComputer it had stolen data from "dozens of companies" via Anodot tokens. The earlier 2024 Snowflake customer campaign (Ticketmaster ~560M records, AT&T call/text metadata, Santander 30M, Neiman Marcus, and others) is also attributed to ShinyHunters.
  • Identity providers. Okta is the primary identity-provider target via vishing-driven AiTM attacks; the group has also moved laterally into Microsoft 365 and Google Workspace environments via stolen SSO sessions.
  • Education and edtech. Confirmed ShinyHunters victims: Instructure (September 2025 + May 2026), Infinite Campus (March 2026, via Salesforce), McGraw Hill (April 2026, via a Salesforce misconfiguration), and the late-2025 university intrusions at Penn, Princeton, and Harvard.
  • Datasets containing PII and communications content — the mix that makes downstream phishing more credible.

The overlap is at the level of shared target platforms and integration pathways, not shared C2 infrastructure. This means defences focused on Salesforce hygiene, analytics-vendor token management, identity-provider controls, and integration least-privilege transfer well across incidents.

Evolution: three phases

The threat has changed materially over the last 24 months. Defences calibrated to the 2024 version of this group will miss the 2026 version.

Phase 1 · Historical, 2020–2024

Stealing OAuth keys and AWS credentials from public GitHub repositories, using them to bulk-export cloud databases, and reselling on underground markets. The Tokopedia and Microsoft GitHub incidents are early examples. By mid-2024 the credential-theft model expanded into the Snowflake customer campaign (Ticketmaster, AT&T, Santander and others), using credentials harvested from infostealer logs rather than GitHub.

Phase 2 · Current, 2025–2026

A shift in initial access from technical exploitation to phone-based social engineering. The primary entry technique is now a vishing call: an attacker impersonates IT, creates urgency around an SSO reset or MFA update, and uses a real-time adversary-in-the-middle (AiTM) phishing kit to relay credentials and MFA codes. Documented post-compromise behaviour includes registering an attacker-controlled device for MFA, then immediately deleting the "Security method enrolled" notification email from the victim's mailbox to avoid detection. Mandiant, Okta, and Sophos have all published detailed analyses of this technique throughout late 2025 and early 2026.

Phase 3 · Emerging

A purpose-built ransomware family, ShinySp1d3r (also written Sh1nySp1d3r), tracked by Unit 42 under the Bling Libra cluster name, was first observed in November 2025. Discovered samples to date are Windows PE binaries; a Linux variant has been announced by the group but not yet observed in samples. The encryptor was reportedly built from scratch and is still under active development. This means the group is moving toward combined data-theft and encryption, which expands the relevant attack surface beyond pure SaaS data exfiltration.

§ 05 · References

Sources.

Vendor

Instructure status communications and incident update log (instructure.com/incident_update); CISO Steve Proud's update log; CEO Steve Daly's 11 May agreement statement; application-key timestamp notice; community posts.

Vendor research / threat intelligence (Tier 1)

  • Mandiant / Google Threat Intelligence Group — vishing campaign analysis, UNC cluster tracking (UNC6040, UNC6240, UNC6661, UNC6671), defensive guidance for ShinyHunters-branded data theft
  • Palo Alto Networks Unit 42 — Bling Libra coverage, ShinySp1d3r ransomware IOC feed (21 November 2025), Scattered LAPSUS$ Hunters updates
  • CrowdStrike — engaged by Instructure for forensic analysis and incident response (per The Register, 12 May 2026)
  • Okta Threat Intelligence — vishing-enabled phishing-kit analysis
  • Sophos Counter Threat Unit — campaign attribution and infrastructure analysis
  • Bitdefender — Technical Advisory: ShinyHunters Breach of Instructure Canvas LMS (8 May 2026) — Free-For-Teacher exploitation analysis and IOCs

Government

FBI Cyber Division (public advisory and social-media alert); US Cybersecurity and Infrastructure Security Agency (CISA) notification.

News reporting (Tier 2)

The Register (double-intrusion and ransom-agreement coverage, 12 May 2026; Congressional inquiry coverage, 12 May 2026); Help Net Security ("risky approach to recover stolen Canvas data," 12 May 2026); Inside Higher Ed ("Instructure Pays Ransom to Canvas Hackers," 11 May 2026); CNN; Time; BleepingComputer; HackRead; TechCrunch; KSL; WRAL; NBC; ABC News (Australia); CBS Sacramento; ABC15. Coverage from student newspapers including the Harvard Crimson, the Duke Chronicle, and the Daily Pennsylvanian.

OSINT and analysis (Tier 3 — leads require corroboration)

SOCRadar; Memeburn; Ogun Security; Ransomware.live; Halcyon ("Education Sector in the Crosshairs"); Have I Been Pwned breach ingestion records; the Wikipedia 2026 Canvas security incident article (which compiles primary sources).

Underlying Protos Labs investigations

  • ShinyHunters / Instructure (Canvas) Incident — May 3–6, 2026
  • ShinyHunters — Threat Actor Dossier: Instructure/Canvas Campaign (Apr 06 → May 06 2026)
  • ShinyHunters Defense Advisory (university defensive layering)
  • ShinyHunters / Bling Libra — TTP & IOC Monitoring Reference
  • ShinyHunters 12-hour Monitoring Report (2026-05-12T12:00Z → 2026-05-13T00:00Z) — clearnet infrastructure status, new IOC monitoring (no new clearnet IOCs in window)

Prepared by Protos Labs Threat Intelligence. TLP:CLEAR — share freely within and between organisations to support sector defence.

This pack supersedes the 10 May 2026 v2 edition. Update as Instructure publishes additional forensic findings or as the dataset re-emerges via secondary distribution.

Part 2 of 2 · For IR teams
Technical Details
Prioritised actions · Detection rules · IOCs · MITRE ATT&CK · Evidence gaps
ShinyHunters / Instructure (Canvas) Incident

Technical Details — CISO Information Pack.

Technical companion to the CISO Information Pack. Structured for IT security and incident-response teams: prioritised remediation, detection guidance, defanged IOCs, MITRE ATT&CK mapping, and user-facing notification guidance.

Classification TLP:CLEAR
Prepared by Protos Labs Threat Intelligence
Version v3 — 13 May 2026
Audience IT Security / Incident Response teams
Reporting window 25 Apr 2026 → 13 May 2026 (incident); broader actor profile draws on 2020–2026 reporting
Supersedes v2 edition, 10 May 2026
Companion document Information pack ↗
Distribution Share freely within and between organisations
§ 00 · Orientation

How to use this document.

This technical details document is structured for the security team for action and is built from Protos Labs investigation work plus open-source corroboration as of 13 May 2026.

This document covers:

  • Latest position — what is confirmed, what is claimed but unverified, and what changed in the last 72 hours.
  • What this means for your institution — risk framing for non-Instructure customers as well as direct ones.
  • Recommended actions and supporting technical material — prioritised remediation, detection guidance, and TTP/IOC references for security teams.
  • Threat actor context — who ShinyHunters are, how they have evolved, and why the education sector is a recurring target.
§ 01 · As of 13 May 2026

Ransom outcome — Operational impact.

See Part 1

The incident timeline, confirmed data, actor claims, and situational context are covered in full in the CISO Information Pack above. This section continues with the operational impact for security teams.

Ransom outcome — operational impact

What it does and does not change for security operations

On 11 May 2026, Instructure publicly announced an agreement with the threat actor and reported receipt of "digital confirmation of data destruction (shred logs)." Operationally, security teams should treat the dataset as already exposed for the following reasons:

  • The destruction claim is by the threat actor's word; no independent forensic verification has been published.
  • SLSH operates as a federation of overlapping clusters (UNC6040, UNC6240, UNC6661, UNC6671, Bling Libra) with shared infrastructure but distinct affiliates; copies retained by affiliates fall outside the agreement's scope.
  • Help Net Security notes the "risky approach" framing — agreement does not preclude redistribution prior to 11 May.
  • The clearnet shinyhunte[.]rs suspension does not affect previously distributed samples or third-party rehosting of the leak listing.

Continue with credential rotation, integration reauthorisation, log preservation, and phishing-defence work irrespective of the agreement.

§ 02 · Sequenced response

Recommended actions.

Priority 1 — This week

# Action Why Owner
01 Validate vendor guidance and subscribe to official Instructure status updates Avoid amplifying unverified actor claims; align actions with forensic findings IT Security & Leadership
02 Inventory developer keys, LTI apps, and Canvas integrations; identify keys with reissue timestamps from the vendor; check any Free-For-Teacher account exposure Cannot prioritise rotation without knowing what is in scope Platform Admins
03 Rotate or reauthorise affected application keys, OAuth secrets, and service-account credentials; revoke obsolete keys; re-authorise LTI / OAuth / SAML integrations after Instructure's post-incident key rotation (Bitdefender Technical Advisory, 8 May 2026) Instructure rotated privileged API keys post-incident; third-party integrations require re-handshake Platform Admins
04 Brief IT helpdesk and admin staff on the vishing technique described in section 5, including a verbal verification protocol (call back via the directory, not a number provided on the call) Vishing is the primary 2026 initial-access technique; helpdesk staff are the primary target IT Security
05 Harden privileged accounts: verify MFA, review recent privileged activity, temporarily restrict unnecessary privileged API access Limits potential secondary abuse and lateral movement IT Security
06 Require out-of-band approval (manager or IT Security) for any new MFA device enrollment; alert on deletion of "Security method enrolled" notifications Single control that breaks the documented Mandiant-reported persistence pattern IT Security
07 Audit your Salesforce instance and any other SaaS connected to your IdP for anomalous OAuth grants, new connected apps, and bulk-export jobs in the last 30 days Salesforce is the recurring SLSH infrastructure target across this campaign series Platform Admins & IT Security
08 Preserve logs (API, access, messages, audit trails, IdP logs) and coordinate with Legal/Privacy on retention Required for forensic investigation and regulatory notification obligations IT Security & Legal
09 Issue user notification focused on confirmed facts, currently known affected data types, the absence of confirmed password/financial exposure (if vendor position holds), and concrete anti-phishing guidance. Do not over-rely on the 11 May "data destruction" claim in user-facing communications Calm, accurate, actionable communication reduces panic and improves user vigilance Communications & Legal
10 Check the ShinyHunters affected-schools list ONLY from a sandboxed/isolated environment (Bitdefender advisory) — never from production endpoints. If your institution is listed, escalate to step 2 immediately Validates direct exposure; threat-actor-controlled infrastructure IT Security
11 Visually inspect institutional Canvas login pages against a pre-30-April-2026 baseline screenshot; check Canvas Admin > Settings > Branding for unauthorised customisation; report tampering to Instructure support and law enforcement ~330 institutions had login pages defaced on 7 May; covert tampering may remain Platform Admins

Priority 2 — Next 30 days

  • Coordinate with third-party LTI vendors integrated with your Canvas tenant to confirm integration status and reauthorisation steps. Common categories include content publishers, video platforms, plagiarism-detection services, proctoring tools, and external authoring tools.
  • Hunt for anomalous bulk exports from Canvas Data 2, analytics connectors, and Salesforce. A single account generating multiple full-dataset exports in a 24-hour window is the canonical signal.
  • Reset OAuth client secrets where advised and adopt least-privilege/scoped credentials where the vendor supports them.
  • Scan all code repositories — including private ones — for exposed AWS keys, OAuth tokens, API secrets, and service-account credentials. Tools: GitGuardian, truffleHog, GitHub native secret scanning. Rotate anything found, including historical exposures.
  • Increase monitoring for phishing, enrollment changes, grade changes, and anomalous API activity for at least 90 days (Bitdefender advisory — stolen data remains usable beyond the breach window).
  • Search dark-web feeds (via vetted partners or law enforcement) for leak-post metadata, sample files, and negotiation contacts. Continued onion monitoring is more important than before given the clearnet shutdown.
  • Assess your exposure to any other ShinyHunters-targeted edtech vendor (McGraw Hill, Infinite Campus) and request their post-incident control attestations.

Priority 3 — Strategic improvements

  • Phishing-resistant MFA. Move from TOTP and SMS to FIDO2/WebAuthn passkeys or certificate-based authentication for privileged users at minimum. AiTM proxies can relay TOTP and SMS in real time; they cannot relay cryptographically domain-bound authenticators.
  • Automated app-consent inventory and expiry for third-party integrations, particularly OAuth grants into Salesforce and your IdP.
  • Session limits and anomaly scoring on API usage patterns for high-value data endpoints.
  • Network segmentation and Zero Trust access between research data, student records, financial systems, and administrative systems.
  • Data minimisation on SaaS platforms — audit what data each vendor actually needs and stop sending what is not operationally necessary. The Free-For-Teacher exposure illustrates how freemium / lower-friction tenants on shared infrastructure can become an attack vector for the rest of the multi-tenant platform.
  • Backup integrity for research data. With ShinySp1d3r in development and a Linux variant announced, confirm offline or immutable backups exist for HPC and research-computing assets, and test restoration end-to-end.
  • Tabletop exercises specifically simulating third-party SaaS-vendor incidents and vishing-driven account takeover.
  • Vendor concentration review. This incident is, structurally, a vendor-concentration failure — a single SaaS provider holding records on hundreds of millions of users across thousands of institutions, compromised through one path, exposes every dependent institution simultaneously. Map your critical SaaS vendors and the blast radius of a compromise of each.
  • Threat intelligence subscriptions covering ShinyHunters / Bling Libra / SLSH IOCs; establish direct channels with Palo Alto Unit 42, Mandiant, CrowdStrike, and (for Singapore institutions) CSA SingCERT.
§ 03 · Hunt & detect

Detection and hunt guidance.

Priority hunt areas

  • OAuth and API token abuse. Anomalous token refreshes, unexpected application consents, service principal activity outside maintenance windows.
  • Identity provider anomalies. New device enrollments, especially from unfamiliar IPs or outside business hours; impossible-travel events; token replay indicators.
  • Notification suppression. Email rules created or login-notification emails (particularly Okta "Security method enrolled" emails) deleted within 10 minutes of a new authentication event from an unfamiliar IP — documented ShinyHunters post-compromise behaviour from Mandiant's UNC6661 analysis.
  • Bulk data movement. Compressed export jobs, elevated bytes_out, repeated full-dataset pulls — particularly for education-related datasets.
  • User-facing defacement / extortion artifacts. Login-page text injection, HTTP 200 responses serving anomalous messages, maintenance-page modifications. The 7 May Canvas wave used login-page defacement at ~330 institutions specifically.

Detection rules (adapt to your environment)

These map directly to Mandiant- and Unit 42-published TTPs:

  • AiTM MFA bypass: Successful MFA authentication followed within 5 minutes by a new MFA device enrollment, from an IP not previously seen for that user.
  • Notification suppression post-login: Email rule created or login-notification email deleted within 10 minutes of authentication from an unfamiliar IP.
  • OAuth token anomaly: OAuth token used from an IP or user-agent inconsistent with the token's registration context.
  • Bulk export from LMS/CRM: Single account generating more than 3 full-dataset exports in 24 hours, or any export exceeding a defined row/size threshold.
  • GitHub secret exposure: Any commit to an institution-affiliated repository containing patterns matching AKIA[0-9A-Z]{16}, private key headers, or OAuth token formats.
  • Vishing-correlated authentication: Authentication event from an unfamiliar IP within 30 minutes of an inbound call to an IT-helpdesk number, where the helpdesk ticketing system shows no corresponding ticket. Requires phone-system + ticketing + IdP correlation.
  • Linux mass file modification: Process on a Linux server modifying more than 500 files within 60 seconds — pre-encryption signal in case ShinySp1d3r Linux variant is released.
  • Canvas login-page integrity: Hash or content-diff alarm on institutional Canvas login pages against a known-good baseline; alert on unexpected text injection, branding changes, or contact-string substitutions referencing "TOX" or "ShinyHunters."

Platform-specific guidance

  • Splunk: Build searches for OAuth/API dark-signal patterns and large-export detection.
  • Microsoft Sentinel (KQL): Monitor SigninLogs and AuditLogs for suspicious app changes and new credentials being added or rotated.
  • Sigma: High-level rules for suspicious SaaS token or application credential changes (rotate key, add credentials, authorize application).

Monitoring tier order

Given that most education-sector security teams are capacity-constrained, prioritise in this order:

  • Tier 1 (continuous): SSO/IdP authentication logs, MFA device enrollment events, Salesforce admin/audit logs, GitHub and code-repository activity.
  • Tier 2 (daily review): LMS and CRM bulk-export logs, VPN authentication from new devices, outbound data-transfer volumes.
  • Tier 3 (weekly review): Staff credential exposure in breach databases, Linux server cron/systemd changes, network connections to low-reputation domains.
§ 04 · Indicators of compromise

Indicators of compromise (defanged).

Operational note

All malicious infrastructure is defanged. Do not re-fang or visit these from production endpoints. Reference for detection rules and blocklists only.

Most ShinyHunters tradecraft this campaign series is identity-led rather than network-led, so behavioural detections (section 4) are higher-yield than network-blocking IOCs. Investigators should rely on vendor-reported developer-key timestamps, integration inventories, IdP logs, and Salesforce audit trails first.

Network indicators

From Bitdefender Technical Advisory, 8 May 2026, and Protos Labs monitoring.

Type Indicator First seen Status (13 May 2026) Confidence
Domain shinyhunte[.]rs Pre-May 2026 (clearnet leak/announcement domain) Reported suspended / non-resolving; RDAP 404; DNS non-resolution confirmed by Protos Labs monitoring window 2026-05-12T12:00Z–2026-05-13T00:00Z Moderate
URL hxxp[:]//91[.]215[.]85[.]103/pay_or_leak/instructure_affected_schools_list[.]txt ~7–8 May 2026 Active per Bitdefender (8 May); status post-clearnet-suspension unverified — do not test from production High
IP 91[.]215[.]85[.]103 ~7–8 May 2026 Hosting affected-schools list; treat as actor-controlled infrastructure High
Onion URL hxxp[:]//shinypogk4jjniry5qi7247tznop6mxdrdte2k6pdu5cyo43vdzmrwid[.]onion/ Pre-May 2026 ShinyHunters primary onion data leak site — now announced as primary distribution channel post-clearnet suspension High

Observable artifacts from the Canvas incident

Type Indicator Context Risk
Login-page defacement message
7 MAY WAVE · ~330 INSTITUTIONS
"ShinyHunters has breached Instructure (again)… contact us privately at TOX" with 12 May 2026 deadline Reproduced by TechCrunch, CNN, Time, NBC, Harvard Crimson, Duke Chronicle High — confirms visibility
Negotiation channel Tox messaging protocol; specific Tox ID associated with UNC6240/ShinyHunters Tox is a peer-to-peer encrypted chat protocol — not a token. The actionable indicator is the specific Tox ID string Medium
Claimed dataset size (actor claim) "3.65 TB / ~275M records / ~8,809 schools" — one ShinyHunters representative later cited ~231M unique emails Actor leak-site claim, unverified Low–Medium
Leak site listing Tor-based "SHINYHUNTERS" DLS that emerged in late January 2026; Instructure listing removed from leak site as of 8 May 2026 following negotiation/agreement Reproduced by Ransomware.live Reference only
ShinyHunters / UNC6240 contact addresses
MANDIANT-PUBLISHED
shinycorp@tutanota[.]com, shinygroup@onionmail[.]com Associated with UNC6240 / ShinyHunters extortion in Mandiant reporting. Not tied to one specific incident; appearance in inbound communications is a strong signal High

ShinySp1d3r ransomware family

Unit 42, November 2025.

  • Embedded Tor stub URL (defanged): hxxp://sh1nysp1d3rxyz123456789abcdefghijklmnopqrstuvwxyz[.]onion/
  • Current observed samples are Windows PE; a Linux variant has been announced but not yet observed in samples.
  • ELF binaries on Linux exhibiting mass file rename / extension append behaviour (forward-looking signature for the announced Linux variant).
  • Unusual cron job creation or systemd service installation on Linux servers (forward-looking).
  • README filename: README_SH1NYSP1D3R.txt

Sample SHA-256 hashes from Unit 42's published IOC feed (November 2025)

DEFANGED — DO NOT VISIT
SHA-256 · ShinySp1d3r samples
d12e44a6c04ab4cafda1471a1204fbe3b6f0d01ca4017e3d8ae13fa8870c7689
e41dd341f317cb674ff12c83a17365e5c5aa3240d912ab3801ff4cf09a00ccb2
50d18f4b11c5d9de7fc16cbc6ca71e65c5e8e9df7d8f3fb192565f035e5adf8a

(Full Unit 42 IOC list at: github.com/PaloAltoNetworks/Unit42-timely-threat-intel)

Behavioural IOC freshness note

The clearnet shinyhunte[.]rs suspension and shift to onion infrastructure mean atomic indicators (clearnet IPs, domains) age faster than behavioural ones (vishing patterns, MFA-enrollment timing, OAuth-grant anomalies, bulk-export signatures). Prioritise behavioural detections.

§ 05 · Communications

User-facing notification guidance.

What to include in a notification to your community

  • The confirmed incident (Instructure / Canvas, late April / early May 2026, with the Free-For-Teacher account program identified as the vector and now permanently shut down by the vendor) and that your institution is investigating its specific exposure.
  • The currently known affected data categories (names, email addresses, student IDs, Canvas inbox messages), framed as "based on the vendor's current findings, which may be revised."
  • The absence of confirmed password or financial-data exposure as of the reporting date — if Instructure's position still holds when you publish.
  • A neutral framing of Instructure's 11 May agreement: that the vendor reports receipt of data-destruction confirmation, without endorsing the assurance. The community should be told to treat their data as exposed.
  • The FBI's public guidance: do not engage with anyone claiming to have your data, do not respond to demands or send payments, and verify any unsolicited communication that references your school or Canvas through known channels before responding.
  • Practical anti-phishing guidance: verify any email referencing course or instructor names, never act on urgent payment or credential requests without independent verification, report suspicious calls to IT.
  • A clear contact channel for questions and for reporting suspicious messages.
  • A commitment to provide updates as the investigation continues.

What to avoid

  • Repeating the actor's unverified scope claims (record counts, terabytes, number of institutions). These figures are actor-supplied and amplifying them aids the extortion strategy.
  • Categorical reassurances about exposure that the vendor has not confirmed.
  • Treating Instructure's "data destruction" announcement as proof the data is no longer in circulation.
  • Direct linking or referencing of the leak portal, the affected-schools list URL, or Tox contact details.
§ 06 · MITRE ATT&CK

MITRE ATT&CK mapping.

Instructure / Canvas May 2026 campaign. ATT&CK version: v14. Behavioural profile, SLSH alliance, targeting pattern, and evolution phases are covered in the Threat Actor Context section of the CISO Information Pack above.

MITRE ATT&CK mapping

Tactic Technique Confidence Evidence
Initial AccessT1190 Exploit Public-Facing ApplicationHighVendor-confirmed exploitation of an issue in the Free-For-Teacher account program
Initial AccessT1078 Valid AccountsHighPrivileged credentials revoked; API keys rotated
Defense Evasion / DiscoveryT1671 Cloud Application AbuseHighAbuse of legitimate Canvas APIs and connected applications
Defense EvasionT1491.001 Internal DefacementHighLogin-page defacement at ~330 institutions during 7 May second-wave intrusion
CollectionT1530 Data from Cloud StorageMediumBulk extraction from Canvas tenant data
ExfiltrationT1567 Exfiltration over Web ServicesHighAligned to ShinyHunters Campaign C0059 reference profile
ExfiltrationT1020 Automated Data ExtractionMediumScale of extraction implies automated tooling
ImpactT1657 Financial Theft (extortion)HighPay-or-leak listing; 11 May vendor agreement reported by The Register
Kill chain status

The operation reached Actions on Objectives — public extortion, login-page defacement, vendor-reported agreement and data-destruction claim. There is no public evidence of persistent endpoint malware, backdoors, or ransomware deployment in the Canvas incident.

§ 07 · Calibration

Evidence gaps and confidence assessment.

Confidence Findings
High Vendor-confirmed incident; Free-For-Teacher account exploitation as the access vector; exposed data categories (names, emails, student IDs, Canvas messages); ShinyHunters' extortion behaviour and leak-site tactics; SLSH alliance and UNC cluster mapping; vishing-led initial access via AiTM phishing kits; ShinySp1d3r Windows samples confirmed by Unit 42; defacement of ~330 institutional login portals (The Register; Help Net Security); CrowdStrike engagement; FBI and CISA notification; Bitdefender Technical Advisory IOCs.
Moderate Tenant-by-tenant scope; whether the 7 May login-page defacement campaign yielded additional data beyond the original intrusion; ShinySp1d3r Linux variant status (announced, not observed); permanent suspension of shinyhunte[.]rs (vs. transient outage) — Protos Labs technical checks consistent with suspension but registrar confirmation outstanding; characterisation of the 11 May Instructure agreement as a ransom payment (vendor has not used the word).
Low / Unverified Actor-supplied numeric claims (3.65 TB / 275M records / 8,809 schools); the alternative ~231M unique email figure cited to TechCrunch; whether the same Free-For-Teacher issue exposed any additional Canvas tenant boundaries; ShinyHunters' claim that Instructure's Salesforce instance was also breached in May 2026; whether the dataset was redistributed prior to the 11 May agreement; actual monetary value of the agreement.

Information gaps

  • Final dataset scale: no third-party forensic accounting has been published; the 11 May agreement removes the leak-driven public disclosure path but does not constitute independent verification.
  • Tenant-specific exposure varies; each Canvas customer must independently confirm scope with Instructure.
  • Outcomes of the US Congressional inquiry (opened 12 May 2026 per The Register); regulatory disclosure positions in the EU (GDPR), UK (DPA 2018), and Australia (Privacy Act).
  • Whether further legal action follows similar to the 2024 DoJ prosecution of Sebastien Raoult.
Methodology note

This pack is built on open-source reporting, vendor statements, Protos Labs investigation work, and the Protos Labs 12-hour monitoring report (2026-05-12T12:00Z → 2026-05-13T00:00Z) as of 13 May 2026. Update this pack as Instructure publishes further findings, as the dataset re-emerges via secondary distribution, or as the Congressional inquiry produces testimony.

EXPERIENCE PROTOS AI

Want to do a Deep Dive Analysis with Protos AI for Free?

Everything you need to run your first AI-powered CTI investigation. Leverage OSINT with Protos AI's Agentic AI capability.

Download Full Report

ShinyHunters / Instructure (Canvas) Incident: CISO Information Pack & Technical Details


Inquire Now
Inquire Now
Oops! Something went wrong while submitting the form.