Canvas Goes Down: When a Single Cyberattack Grinds 8,800 Schools to a Halt

On Thursday afternoon, students at Harvard, Columbia, Rutgers, and Georgetown found themselves locked out of their digital learning platforms. Not because of a system upgrade or routine maintenance, but because one of the nation’s most critical education Technology companies had been hit with a ransomware attack so disruptive that it rippled across the entire country.

Canvas, the learning management platform used by thousands of schools, went into “maintenance mode” after its parent company Instructure suffered a data breach. The timing couldn’t have been worse. Students were in the middle of finals. Assignments were due. And suddenly, the digital infrastructure holding together American higher education simply wasn’t there.

The attackers, calling themselves ShinyHunters, had been making noise since May 1. They claimed to have breached Instructure and demanded a ransom. But for most of May, it felt like a problem playing out in the shadows of the internet. That changed when Thursday rolled around and Canvas went dark at the exact moment schools needed it most.

How Bad Was the Breach?

According to Steve Proud, Instructure’s chief information security officer, the breach exposed names, email addresses, student ID numbers, and messages exchanged by users on the platform. The hackers claim the breach affected more than 8,800 schools. That’s a staggering number, though the exact scope remains murky. What isn’t murky is that student data across dozens of states was potentially compromised.

Universities sent alert after alert to their students. School districts across at least a dozen states appeared to be impacted. And the Canvas downtime made the situation even messier because no one could verify exactly what had happened or what data was actually taken. Transparency became a casualty of the attack itself.

The incident update logs told a confusing story. On May 1 and 2, Instructure confirmed the breach and outlined what was exposed. By Wednesday, Proud wrote that “Canvas is fully operational, and we are not seeing any ongoing unauthorized activity.” The company had marked the situation as “Resolved.”

Then Thursday afternoon happened. Suddenly Canvas wasn’t operational anymore.

The Extortion Playbook Gets Uglier

Here’s where it gets interesting from a Business and security perspective. The attackers didn’t just breach Instructure and demand money. They did something far more disruptive: they defaced Canvas login pages at multiple schools, according to reporting from TechCrunch. Harvard’s Canvas portal, per The Harvard Crimson, displayed a message from the attackers listing schools they claimed to have breached and demanding negotiations by May 12 or face a data leak.

This is ransomware with a twist. Instead of just threatening to release stolen data, the attackers were actively disrupting service for thousands of institutions simultaneously. They were making the breach impossible to ignore, turning student frustration and institutional chaos into leverage.

Allison Nixon, chief research officer at cybersecurity firm Unit 221b, has tracked ShinyHunters and similar groups for years. She notes that the activity appears connected to a group sometimes referred to as ScatteredLapsus$Hunters. But here’s the thing: it’s genuinely unclear who’s actually behind the ShinyHunters name at any given time. The moniker has been recycled and reused by different actors over the years, making attribution messy and accountability even messier.

The Manipulation Never Stops

One detail from Nixon’s analysis is particularly revealing. By Thursday evening, references to Instructure disappeared from the hackers’ dark web site. The site later became unresponsive. Most people would assume this meant a ransom had been paid or law enforcement had intervened.

Nixon explains it differently. Removing victims from ransom sites is a manipulation tactic. Sometimes it’s because negotiations are ongoing. Sometimes it’s because a payment was made. But sometimes, according to Nixon, hackers remove victims specifically to encourage them to pay. It’s a psychological game designed to create the illusion of resolution where none exists.

She also notes that ShinyHunters and related groups have escalated beyond just threatening data leaks. They’ve launched distributed denial of service attacks, flooded companies with calls and emails, and even threatened executives’ families. “These kind of pressure tactics start to look a whole lot more just violent mafia rather than any kind of skilled hacker stuff,” Nixon told reporters.

That’s a striking observation. It suggests that ransomware gangs are becoming increasingly comfortable with tactics that have nothing to do with technical skill and everything to do with intimidation.

The Pattern Nobody’s Fixing

Nixon also warns that these groups have recycled old data before to exaggerate breach claims. The list of victims posted by ShinyHunters includes names like Rockstar Games, Amtrak, and Match. Some of those may be real breaches. Others may be padding a portfolio to look more dangerous than the group actually is.

Yet the Canvas attack is real. The disruption is real. And it represents an escalation. “It’s noteworthy that a tiny number of repeat offenders can escalate for years to reach this point,” Nixon says. “It speaks to the systemic international issue of cybercrime and the need for governments around the world to set geopolitics aside and cooperate to stop those who extort money and prey on kids.”

That last part sticks. Preying on kids. Not in a melodramatic sense, but literally: the attackers targeted a platform used by millions of students, disrupted their education during finals week, and leveraged that chaos to extract money. It’s the logical endpoint of an extortion model that’s been escalating unchecked for years.

American higher education has been a favorite target of ransomware gangs for a while now. But Canvas wasn’t just attacked. It was dismantled at a moment when thousands of schools depended on it most. And the fact that it took that level of disruption to make the story impossible to ignore suggests we’re still not taking this threat seriously enough, even when the disruption is playing out in real time across the entire country.

Written by

Adam Makins

I’m a published content creator, brand copywriter, photographer, and social media content creator and manager. I help brands connect with their customers by developing engaging content that entertains, educates, and offers value to their audience.