Morning Overview

The gang behind the 275-million-record school data heist just cut a ransom deal to stop the leak — after defacing login pages at 330 institutions

Sometime in late April 2026, students and staff at hundreds of U.S. colleges and K-12 districts opened their Canvas learning management system and found something wrong: login pages had been defaced, replaced with messages from hackers claiming to hold a massive trove of stolen educational records. Within weeks, the company behind Canvas, Instructure, told its customers it had reached an agreement with the attackers, a prolific cybercriminal group known as ShinyHunters, under which the stolen data would be destroyed and access logs shredded. The FBI, meanwhile, delivered a starkly different message: do not pay, do not respond, and do not assume the threat is over.

The breach and its aftermath have exposed a fault line in how American schools handle cyberattacks on the third-party platforms they depend on daily. As of early June 2026, federal agencies, campus IT departments, and Instructure itself are offering conflicting signals about whether the crisis is resolved or still unfolding.

What has been verified so far

The core sequence of events is now documented across federal advisories and institutional notices. According to Associated Press reporting and communications Instructure sent to its school customers, the company reached an agreement with ShinyHunters under which stolen data was returned and logs were destroyed. Instructure relayed this outcome directly to affected institutions, and several published their own notices echoing the company’s language.

The Utah System of Higher Education, for instance, posted a public notice stating that Instructure reported receiving confirmation of data destruction from the attackers. Princeton University’s Office of Information Technology published a separate incident update that repeated those assurances while providing detailed guidance for reporting suspicious messages that might stem from the breach.

Federal agencies moved in parallel. The FBI’s Internet Crime Complaint Center released a public service announcement confirming that the bureau is tracking ShinyHunters activity targeting a learning management system. The advisory describes the group’s pressure tactics, including follow-on extortion emails and phishing attempts aimed at people whose data was exposed. The FBI’s instruction to anyone who receives such messages is blunt: “Do not send payment or respond.”

The U.S. Department of Education’s Office of Federal Student Aid issued its own security alert, naming the Canvas platform explicitly and directing institutions to review authentication and integration logs covering April 25 through May 8, 2026. That two-week window represents the period federal officials believe is most relevant for detecting unauthorized access. Schools were told to look for anomalous logins, unexpected API integrations, and signs that credentials had been harvested.

A federal lawsuit related to the incident has been filed in Utah. Wire reporting references the filing, but court documents beyond the initial report have not been made publicly available for independent review. The specific case number, named plaintiffs, and court division have not been confirmed in any primary source reviewed for this report, so details about the legal theories being pursued and the relief being sought remain unknown.

The numbers that haven’t been nailed down

The figures that have drawn the most attention, 275 million compromised records and 330 defaced login pages, appear in secondary reporting and in claims attributed to ShinyHunters themselves. Neither number is corroborated by the FBI’s IC3 advisory, the Department of Education’s alert, or Instructure’s own customer communications. Until those figures surface in a primary government document or verified court filing, they should be treated as unconfirmed estimates rather than established fact.

Equally murky are the terms of the agreement between Instructure and ShinyHunters. No public document reviewed for this report specifies whether money changed hands, what form the deal took, or how Instructure verified that data was actually destroyed. A cybersecurity expert quoted in the AP’s coverage questioned whether any negotiation with a criminal group can guarantee that copies of stolen data are truly gone. That skepticism tracks with the broader history of ransomware and extortion cases, where attackers have repeatedly retained or resold data after claiming to delete it. Digital files, after all, can be copied without limit and at virtually no cost.

ShinyHunters is not an unknown quantity. The group was linked to major breaches at AT&T and Ticketmaster in 2024, incidents that exposed hundreds of millions of records and led to federal indictments. Its involvement here suggests a level of operational sophistication that makes blanket assurances about data destruction harder to accept at face value.

Also unclear is how the attackers gained access in the first place. The Department of Education’s alert references API integrations as something schools should audit, hinting at a possible vector, but no agency or company has publicly confirmed the method of intrusion. Nor have officials specified exactly what types of data were compromised: student grades, contact information, Social Security numbers, financial aid records, or some combination. That gap leaves millions of students, parents, and educators unable to assess their own exposure.

Conflicting guidance is creating real confusion

The sharpest tension in this story sits between two messages arriving at the same campus IT offices from different directions. Instructure told customers the situation was resolved and that stolen data had been destroyed. The FBI told the same audience that engaging with ShinyHunters typically leads to additional extortion, not closure.

How individual schools navigated that contradiction varied widely. Princeton emphasized phishing awareness and user vigilance. The Utah system focused on the timeline of Instructure’s statements and the scope of potentially affected data. Some campuses may have taken comfort in the vendor’s assurances and scaled back emergency measures. Others likely continued operating as though stolen data remained in hostile hands. Which approach each institution chose, and what consequences followed, is not yet documented in public records.

This fragmentation extends to the information itself. Instructure’s own public communications have largely been filtered through institutional intermediaries. Schools received vendor updates and then published their own versions, each with slightly different emphasis and levels of technical detail. No single document captures the full picture, and anyone trying to reconstruct the timeline must cross-reference multiple institutional notices to piece it together.

What people at affected schools should do right now

For anyone at an institution that uses Canvas, the safest posture is to treat this incident as an ongoing risk rather than a closed chapter. That means following the Department of Education’s directive to review authentication logs for the April 25 through May 8 window, enabling or enforcing multi-factor authentication on every account that touches the platform, and heeding the FBI’s instruction not to respond to extortion or phishing emails linked to the breach.

Students and staff should be cautious about any unsolicited message referencing Canvas, course materials, or account verification. Verify URLs before entering credentials. Report suspicious activity through your institution’s designated security channels, not by replying to the message itself.

Until there is stronger, independently verifiable evidence that stolen data cannot be misused, the working assumption should be that attackers may still have access to at least some of what they took. The FBI’s track record with ShinyHunters suggests that assumption is not paranoia. It is pattern recognition.

More from Morning Overview

*This article was researched with the help of AI, with human editors creating the final content.