Morning Overview

Hackers stole 3.65 terabytes of student data from 9,000 schools — and the deadline before they leak it all has passed

When Canvas went dark on the morning of May 7, 2026, students at thousands of colleges and universities lost access to their assignments, grades, and course materials at the worst possible moment: finals week. Within hours, a hacking group called ShinyHunters claimed responsibility, saying it had stolen 3.65 terabytes of student records from roughly 9,000 schools that rely on the platform. The group set a deadline for Instructure, the company behind Canvas, to pay up or watch the data go public. That deadline has now passed, and as of late May 2026, the fallout is still unfolding.

What happened on May 7

Canvas is one of the most widely used learning management systems in North American higher education, hosting everything from lecture slides to grade books to disability accommodation records. On the morning of May 7, users across the country reported they could not log in. Instructure confirmed that “an unauthorized actor made changes to pages that appeared when some users were logged in,” a statement first reported by the Associated Press. That language suggests the attackers did more than knock the system offline; they injected or altered content inside the platform, raising questions about how deeply they penetrated Instructure’s infrastructure.

The disruption rippled across campuses within minutes. At the University of California, Irvine, the Office of Information Technology published a detailed advisory describing a nationwide outage and cybersecurity incident. Faculty were told to email students directly, with the advisory even noting messaging limits for Gmail and Outlook accounts. Instructors extended exam windows, accepted emailed submissions, and in some cases reverted to paper.

Harvard University’s IT department issued its own notice confirming awareness of the incident and clarifying that the disruption was worldwide, not limited to Harvard’s campus. That detail matters: it signals the breach targeted shared infrastructure rather than any single institution. Harvard reported that Canvas access was restored by the evening of May 7.

Behind the scenes, security teams at large research universities scrambled to coordinate with Instructure, review their own logs for anomalies, and prepare for potential account resets. UC Irvine activated contingency plans, directing faculty to post critical information through alternative channels and to build flexibility into assignment deadlines. Similar responses played out at peer institutions across the country.

Who is ShinyHunters

ShinyHunters is not an unknown entity. The group has been linked to high-profile breaches at AT&T, Ticketmaster, and the Indonesian e-commerce platform Tokopedia, among others. Its playbook typically involves targeting cloud-hosted platforms, exfiltrating large volumes of data, and pressuring victims with extortion deadlines. Brett Callow, a threat analyst at the cybersecurity firm Emsisoft, discussed ShinyHunters’ claimed responsibility for the Canvas breach in comments reported by the AP.

The group’s track record lends weight to its claims, but it also has an obvious incentive to exaggerate. Inflating the volume of stolen data or the number of affected organizations increases pressure on a target to pay and burnishes the group’s reputation in criminal marketplaces. Until an independent forensic review or a government agency corroborates the 3.65-terabyte figure and the count of 9,000 schools, those numbers should be understood as the attackers’ assertions, not confirmed facts.

What remains unknown

Several critical questions are still unanswered weeks after the attack.

What data was actually taken? No institutional source or Instructure itself has published a verified inventory of compromised records. Student data inside a learning management system can range from names and email addresses to grades, financial aid identifiers, and sensitive accommodation records. Without that inventory, students and families have no reliable way to gauge their exposure to identity theft.

Were schools outside the United States affected? UC Irvine called the incident nationwide; Harvard called it worldwide. Both could be accurate if Canvas servers handle domestic and international institutions on shared infrastructure, but no official statement has clarified whether non-U.S. schools suffered data exposure or simply experienced collateral downtime. The distinction determines which data protection laws apply and which regulators have jurisdiction.

How did the attackers get in? Instructure has not released a technical postmortem describing the attack vector. Security researchers cannot yet say whether ShinyHunters exploited a previously unknown vulnerability in Canvas, leveraged stolen credentials, or took advantage of a misconfiguration in surrounding systems. Universities have not reported parallel compromises in their own identity platforms tied to the outage.

Has the stolen data been leaked? ShinyHunters’ stated deadline has passed, yet as of late May 2026, no confirmed mass dump has surfaced on known dark-web marketplaces, according to threat-intelligence monitoring. That silence could mean private negotiations are ongoing, that the claimed data volume was overstated, or that a release is still being prepared. None of these possibilities can be ruled out.

Are law enforcement agencies involved? Neither the FBI nor the Cybersecurity and Infrastructure Security Agency (CISA) has issued a public statement confirming or denying an investigation. Instructure has not disclosed whether it is cooperating with federal authorities, though companies targeted by extortion groups of this scale typically do.

What students and faculty should do now

Schools affected by the breach are subject to the Family Educational Rights and Privacy Act (FERPA), which requires institutions to protect education records and, in many cases, to notify students when unauthorized access occurs. Students should watch for official notifications from their own universities and from Instructure, which has not yet announced whether it will offer credit monitoring or other protective services.

In the meantime, security professionals recommend several immediate steps:

  • Change your Canvas password and any other accounts where you used the same password. Choose a strong, unique replacement.
  • Enable multi-factor authentication on Canvas and on the email account linked to it. MFA remains one of the most effective barriers against credential-based attacks.
  • Watch for phishing emails that impersonate Canvas or your university’s IT department. Attackers who possess student email addresses and institutional affiliations can craft convincing lures. Do not click links in unexpected messages; go directly to your school’s IT website instead.
  • Monitor your financial accounts and consider placing a free credit freeze through the three major bureaus (Equifax, Experian, TransUnion) if your school confirms that sensitive identifiers were exposed.

Treat unverified claims circulating on social media with caution, especially purported “samples” of leaked data. Clicking on or downloading such files can itself be a vector for malware.

Why this breach hits differently

Large-scale data breaches have become grimly routine, but the Canvas incident stands apart for several reasons. The platform is not a retailer or a social network; it is core academic infrastructure. Millions of students depend on it not just for convenience but for degree completion. The attack landed during finals, when the stakes for access were highest and the tolerance for disruption was lowest.

The centralized nature of Canvas also concentrates risk in a way that individual campus systems do not. A single successful intrusion at Instructure can expose records from thousands of institutions simultaneously, spanning K-12 districts and major research universities alike. That model delivers efficiency and cost savings in normal times, but it creates a single point of failure that attackers clearly recognized.

Instructure’s next moves will shape how this story ends. A transparent postmortem, clear communication about what data was compromised, and concrete support for affected users would go a long way toward rebuilding trust. Continued silence will leave students, parents, and institutions to fill the gaps with speculation, and ShinyHunters to control the narrative. As forensic investigations continue into June 2026, the millions of people whose records may be at stake deserve answers that, so far, have not arrived.

More from Morning Overview

*This article was researched with the help of AI, with human editors creating the final content.