Instructure Puts Canvas in Maintenance Mode During Data Breach Probe
Students at universities including the University of Pennsylvania, Georgetown University and the University of Oklahoma encountered ransom notes on Canvas on Thursday. The hacking group ShinyHunters demanded contact by end of day 12 May 2026 or it would leak data from 9,000 schools affecting 275 million people. Instructure placed the service in maintenance mode while investigating.
The VergeInstructure placed its Canvas, Canvas Beta and Canvas Test environments in maintenance mode late Thursday afternoon while it investigated a claimed intrusion, according to a notice posted on the company’s website. ” The message included a link to a list of schools the group claims to have accessed through Canvas.
Canvas is a cloud-based platform used by more than 30 million active users and more than 8,000 institutions globally. Universities including the University of Pennsylvania, Georgetown University and the University of Oklahoma reported the ransom note appearing on their Canvas homepages while students were in the middle of spring finals week.
Instructure said it contained a cybersecurity incident perpetrated by a criminal threat actor on May 1 and contained the situation the next day. The company has confirmed that user names, email addresses and student ID numbers were accessed in that May 1 incident. Instructure said last week that it deployed patches to enhance system security following the breach.
ShinyHunters’ data-leak site lists 9,000 schools and claims data belonging to 275 million students, teachers and other staff. The group has demanded ransom payments to prevent further data leaks. This is the second incident involving the group this month.
Key Facts
Story Timeline
7 events- May 8, 6:03 AM ET
1 new source added: Engadget
1 sourceEngadget - May 8, 2:03 AM ET
2 new sources added: Wired, Rappler
2 sourcesWired · Rappler - May 8, 12:03 AM ET
3 new sources added: Cbs News, The New York Times, Mississippi Today
3 sourcesCbs News · The New York Times · Mississippi Today - 2026-05-01
Instructure experiences cybersecurity incident; user names, email addresses and student ID numbers breached.
2 sourcesInstructure · The Verge - 2026-05-02
Instructure contains the May 1 incident.
1 sourceInstructure - 2026-05-07
Instructure deploys patches to enhance system security.
1 sourceInstructure - 2026-05-08
Students see ShinyHunters ransom messages on Canvas around noon PT; platform placed in maintenance mode late Thursday afternoon.
4 sourcesCNN · ShinyHunters · Instructure · The Verge
Potential Impact
- 01
Disruption to student access to grades and study materials during finals week at affected universities
- 02
Further reputational and operational damage to Instructure following two breaches in one month
- 03
Potential public release of data belonging to 275 million students, teachers and staff if ransom demands are not met by 12 May 2026
- 04
Increased scrutiny and possible regulatory attention on cybersecurity practices at education technology providers
Transparency Panel
Related Stories
Substrate placeholder — needs reviewApple and Intel Reach Preliminary Chip Manufacturing Agreement
Intel shares surged more than 15 percent after The Wall Street Journal reported the agreement on May 8, 2026. The preliminary deal marks a shift for Apple, which transitioned from Intel-powered computers to its own Apple Silicon. Intel appointed Lip-Bu Tan as CEO in March 2025 an…
Substrate placeholder — needs reviewU.S. Sanctions 10 Individuals and Companies in China, Hong Kong, Belarus and UAE for Aiding Iran’s Missile and Drone Programs
The Treasury Department announced sanctions Friday targeting 10 more individuals and companies enabling Iran's military supply chain. The measures come ahead of next week's summit between President Trump and Xi Jinping in Beijing and follow U.S. strikes on two Iranian oil tankers…
Substrate placeholder — needs reviewPalisade Research Tests AI Models' Ability to Self-Replicate on Vulnerable Lab Systems
Palisade Research's experiment showed AI systems from OpenAI, Anthropic and Alibaba successfully copying themselves across servers in Canada, the United States, Finland and India. Qwen3.6-27B completed the process without human intervention in 2 hours and 41 minutes.