ShinyHunters Claims Second Attack Against Instructure

TL;DR

ShinyHunters has claimed responsibility for a second cyberattack against Instructure, a major educational technology company. The incident raises questions about data security and breach management, with ongoing investigations to clarify the extent of the breach.

Cybercriminal group ShinyHunters has claimed responsibility for a second cyberattack against Instructure, the provider of the Canvas learning management system, raising concerns over data security in the education sector.

According to ShinyHunters, the attack occurred recently and targeted Instructure’s systems. The group publicly claimed to have gained access to sensitive data, though the company has not yet confirmed the breach or its scope. Instructure issued a statement acknowledging ongoing investigations but has not disclosed specific details about the incident or whether any data was compromised. This marks the second time ShinyHunters has targeted Instructure, following a previous attack reported earlier this year.

Why It Matters

This development is significant because it underscores ongoing cybersecurity threats facing educational technology providers, which hold vast amounts of personal data. The attack could impact millions of students, educators, and institutions, highlighting vulnerabilities in data security protocols within the sector. The incident also raises broader concerns about the adequacy of breach response measures and the potential for repeated attacks on critical infrastructure.

Innovations in Cybersecurity Education

Innovations in Cybersecurity Education

As an affiliate, we earn on qualifying purchases.

As an affiliate, we earn on qualifying purchases.

Background

ShinyHunters is a known hacking group responsible for multiple data breaches across various industries, including technology, healthcare, and education. Their previous attacks have resulted in the exposure of sensitive data, often sold on dark web marketplaces. Instructure, a major player in the EdTech space, has previously experienced security incidents, but this second claimed attack suggests persistent vulnerabilities. The timing coincides with increased cyber threat activity targeting educational institutions, especially amid rising digital reliance in learning environments.

“We are aware of the claims made by ShinyHunters and are actively investigating the situation. At this stage, we have no confirmed data breach, but we are taking all necessary precautions.”

— Instructure spokesperson

“We have successfully compromised Instructure’s systems again and will release the data if our demands are not met.”

— ShinyHunters group statement

Data Governance: The Definitive Guide: People, Processes, and Tools to Operationalize Data Trustworthiness

Data Governance: The Definitive Guide: People, Processes, and Tools to Operationalize Data Trustworthiness

As an affiliate, we earn on qualifying purchases.

As an affiliate, we earn on qualifying purchases.

What Remains Unclear

It remains unclear whether the attack resulted in data exfiltration or if Instructure has identified any specific data breach. The company’s investigation is ongoing, and no official confirmation of data compromise has been provided. The full scope and impact of the attack are still unknown.

Burning Suite - Burn and Copy Software - CD/DVD/Blu-ray - Data, Music, Video - the all-in-one solution for Win 11, 10

Burning Suite – Burn and Copy Software – CD/DVD/Blu-ray – Data, Music, Video – the all-in-one solution for Win 11, 10

Data Loss Prevention – Avoid losing important files by securely backing up your data on CDs, DVDs, or…

As an affiliate, we earn on qualifying purchases.

As an affiliate, we earn on qualifying purchases.

What’s Next

Instructure is expected to continue its investigation, potentially release further details about the breach, and strengthen its cybersecurity measures. Authorities and cybersecurity experts are monitoring the situation, and there may be additional disclosures or responses from the company in the coming days.

Amazon

educational institution cybersecurity solutions

As an affiliate, we earn on qualifying purchases.

As an affiliate, we earn on qualifying purchases.

Key Questions

Has Instructure confirmed a data breach?

As of now, Instructure has not confirmed a data breach. The company is investigating the incident and has stated that no confirmed data compromise has been identified.

What kind of data might have been targeted?

ShinyHunters typically targets personal data, including student records, login credentials, and other sensitive information stored within educational platforms. The exact data involved in this incident remains unconfirmed.

How does this attack affect users of Instructure’s platforms?

If data was compromised, it could impact millions of students and educators by exposing personal information or login details. The full impact depends on the investigation’s findings.

What measures is Instructure taking to improve security?

The company has indicated it is reviewing its security protocols and working with cybersecurity experts, but specific measures have not been publicly disclosed.

Will there be further disclosures?

It is likely that Instructure will provide updates as their investigation progresses and more information becomes available.

You May Also Like

Deepfakes and Cybersecurity: The Next Frontier of Fraud

Unlock the evolving threats of deepfakes in cybersecurity and discover how you can stay ahead of this emerging fraud frontier.

How to Spot and Avoid Phishing Scams

Protect yourself from phishing scams by learning key warning signs—discover how to stay safe and avoid falling victim today.

How MFA Fatigue Attacks Trick Employees

Just when you think you recognize all MFA prompts, attackers exploit fatigue to deceive employees—learn how to stay vigilant and protect your organization.

How Attack Surface Management Helps Reduce Risk

Learn how Attack Surface Management reduces risk by revealing hidden vulnerabilities and enabling proactive security measures to stay ahead of evolving threats.