Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

980+ Articles
124+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. News
  3. Government to Scrutinize Instructure Over Canvas Disruption, Data Breach
Government to Scrutinize Instructure Over Canvas Disruption, Data Breach
NEWS

Government to Scrutinize Instructure Over Canvas Disruption, Data Breach

The House Committee on Homeland Security has demanded a briefing from Instructure, the company behind the Canvas LMS platform, after a ransomware attack by ShinYHunters disrupted universities nationwide and triggered a 365TB extortion threat.

Dylan H.

News Desk

May 13, 2026
4 min read

Congressional Scrutiny Follows Canvas LMS Breach

The House Committee on Homeland Security has formally requested a briefing from Instructure — the company behind Canvas, the most widely used learning management system in US higher education — following a ransomware attack that disrupted academic operations at colleges and universities nationwide in early May 2026.

The congressional action signals that the Canvas breach has crossed the threshold from an education sector IT incident into a matter of national security concern, given the scale of student and faculty data potentially exposed and the degree to which the attack disrupted federal financial aid processing and research institution operations.

Background: The Canvas Breach

The attack, attributed to the ShinYHunters ransomware group, first came to light in early May 2026 when Canvas login portals began returning errors and institutions reported mass login failures. The disruption forced dozens of universities to postpone or reschedule final examinations during a critical end-of-semester period.

ShinYHunters subsequently claimed responsibility, asserting they had exfiltrated 365 terabytes of data from Instructure's systems and threatened to release it unless a ransom demand was met. The group has a well-documented history of high-volume data theft attacks against major enterprises, having previously claimed responsibility for breaches at AT&T, Ticketmaster, and numerous other high-profile targets.

Reports indicated that Instructure ultimately reached a ransom agreement with ShinYHunters to prevent the public release of the stolen data — a decision that drew criticism from cybersecurity experts who argue that ransom payments incentivize further attacks.

Congressional Demands

The Committee on Homeland Security's letter to Instructure requested:

  • A comprehensive briefing on the nature and scope of the breach
  • Details on what data was exfiltrated and how many individuals were affected
  • An explanation of Instructure's security posture at the time of the attack and any known vulnerabilities exploited
  • A timeline of the incident response and notification to affected institutions
  • Information on remediation steps taken and planned to prevent recurrence

The committee has particular interest in whether the breach affected institutions that handle federal research data, FERPA-protected student records, or systems connected to the Department of Education's financial aid infrastructure.

Scale of Impact

Canvas is used by an estimated 30 million students and educators across thousands of institutions in the United States and internationally. The platform serves as the central hub for:

  • Course materials and assignments
  • Student grade records
  • Communications between students and faculty
  • Integration with institutional systems including financial aid portals and student information systems

The potential data exposure at this scale places Canvas among the most significant education sector breaches in recorded history, comparable to the 2023 MOVEit attacks that compromised student data at hundreds of institutions.

ShinYHunters' Growing Education Sector Focus

The Canvas attack is not an isolated incident. ShinYHunters has increasingly targeted education and ed-tech infrastructure in 2026, following earlier attacks on:

  • Infinite Campus (March 2026): 11 million student records threatened
  • Telus Digital (March 2026): Customer data exposed
  • ADT (April 2026): 5.5 million customer records

The group's pattern of high-volume data theft followed by extortion — rather than encryption-based ransomware — represents a shift in ransomware group TTPs that makes traditional backup-based recovery strategies insufficient.

Instructure's Response

Instructure has stated that it is cooperating with law enforcement and engaged third-party cybersecurity firms to conduct a forensic investigation. The company confirmed that certain customer data was accessed and has committed to notifying affected institutions and individuals.

The company's decision to pay the ransom — if confirmed — will likely face additional scrutiny from legislators who have been pushing for legislation that would restrict or require disclosure of ransom payments to federal authorities.

Broader Policy Implications

The Canvas breach adds momentum to ongoing legislative efforts to establish mandatory cybersecurity standards for education technology providers that handle student data. Proposed measures include:

  • Mandatory CISA reporting requirements for ed-tech platforms above certain user thresholds
  • Minimum security standards for platforms processing FERPA-covered data
  • Ransom payment disclosure requirements to federal law enforcement
  • Incident notification timelines mandating notification to affected institutions within 72 hours

The Homeland Security Committee's scrutiny of Instructure comes as part of a broader congressional push to apply more rigorous cybersecurity requirements to private sector entities operating critical digital infrastructure.


Source: SecurityWeek, May 13, 2026

#Data Breach#Ransomware#Education#ShinYHunters#Government

Related Articles

Instructure Reaches Ransom Agreement with ShinyHunters to Stop 3.65 TB Canvas Leak

Educational technology company Instructure, parent of Canvas LMS, has reached an undisclosed 'agreement' with the ShinyHunters extortion group after a breach of its network threatened to expose 3.65 TB of student and institutional data from thousands of schools and universities.

4 min read

Canvas Breach Disrupts Schools & Colleges Nationwide

A data extortion attack against Canvas LMS defaced login pages with a ransom demand, disrupting classes and coursework at school districts and universities across the United States.

4 min read

Conduent Breach Balloons to Tens of Millions of Americans

The January 2025 ransomware attack on government technology giant Conduent continues to expand in scope, now confirmed to affect 15.4 million in Texas and...

3 min read
Back to all News