Canvas Data Breach Exposes Millions of Student Records

A massive cyberattack on the Canvas learning platform exposed millions of student records and disrupted final exams. Here is what families need to know.

Friday, May 8, 2026

Key Takeaways

  • ## Canvas Cyberattack Affects Millions
  • A cyberattack on the Canvas learning management system exposed the personal data and private messages of approximately 275 million users across 9,000 institutions.
  • The hacker group ShinyHunters used a vulnerability in the platform's Free-For-Teacher tier. Instructure responded by suspending those free accounts indefinitely.
  • Hackers defaced school login pages with ransom demands. This caused platform outages at major universities during final exams.
  • Instructure claims passwords and financial data remain secure. Despite this, cybersecurity experts advise families to update login credentials and enable multi-factor authentication.

A massive cyberattack on the Canvas learning management system exposed student data and blocked access to coursework during final exams. Hackers stole student information and posted extortion threats on school login pages. The platform temporarily shut down key services as a result.

What Happened

On May 1, 2026, a breach targeted Instructure, the parent company of Canvas. The hacker group ShinyHunters claims it stole 3.65 terabytes of data from approximately 275 million individuals at nearly 9,000 institutions. Instructure confirmed the compromised data includes names, email addresses, student ID numbers, and internal messages.

The breach escalated on May 7. As we previously reported, hackers defaced Canvas login pages with messages demanding that schools pay a ransom by May 12. Instructure confirmed the unauthorized actor used a vulnerability in its Free-For-Teacher accounts. The company announced a temporary shutdown of that service tier. While the main platform is online, some universities continue to restrict access while investigating the damage.

The Bigger Picture

This incident reflects a trend in educational technology security. It follows the December 2024 PowerSchool data breach, which exposed the records of 62 million students and 9.5 million teachers. Hackers target the education sector because student data has value on the black market. It is often used to generate fraudulent professional certifications or establish credit histories for identity theft.

There is a gap between corporate damage control and reality. Instructure maintains there is no evidence that passwords or financial information were involved. However, cybersecurity experts note that exposed metadata and internal communications are sensitive. Researchers advise users to change their passwords immediately, as the stolen data helps criminals design phishing attacks.

Instructure's suspension of its Free-For-Teacher tier also shifts its recent business strategy. The company previously used these free accounts to drive paid institutional adoptions. Now, educators using those accounts are locked out with no timeline for when their lesson materials will be available again.

What This Means for Families

For students, the breach caused disruptions during final exams. The lockout from Canvas stopped access to study materials and teacher communication. For educators, the shutdown creates concerns about the recovery of their curriculum.

Long-term, the exposure of email addresses and private messages leaves families vulnerable to scams. Hackers can use the context of stolen conversations to write convincing emails that appear to come from school administrators. Because the hackers changed the Canvas interface, parents should be skeptical of unusual prompts or links appearing within school platforms or emails. As school districts work to verify the impact, families should assume their data was exposed.

What You Can Do

  • Update login credentials: Change the passwords for all student and parent Canvas accounts immediately. If you reuse that password on other sites, change those as well.
  • Enable multi-factor authentication: Turn on two-step verification for all educational platforms and associated email accounts to block unauthorized access.
  • Verify school communications: Do not click on external links within the learning portal or in unexpected emails. Verify urgent requests or alerts through official school district websites or by calling the school office.
Share: