Skip to content
Tech News
← Back to articles

Instructure Breach Exposes Schools' Vendor Dependence

read original get Cybersecurity Awareness Kit → more articles
Why This Matters

The Instructure data breach highlights the vulnerabilities in educational technology platforms and underscores the importance of robust cybersecurity measures for schools and their vendors. As schools increasingly rely on digital tools, such breaches can compromise sensitive student and staff information, emphasizing the need for stronger data protection practices in the edtech industry.

Key Takeaways

The breach of a leading educational technology provider has raised fears and concerns regarding possible downstream implications for schools, their staff, and their students.

Instructure, which provides learning management system (LMS) software Canvas for K-12 and higher education clients, disclosed a data breach on May 1 in which a threat actor stole "certain identifying information of users at affected institutions," the company said on its status page. This identifying information includes names, emails, student ID numbers, and messages shared among users. There is no evidence passwords, dates of birth, government identifiers, or financial information were stolen, according to the disclosure.

When Instructure initially disclosed the incident, Canvas Data 2 and Canvas Beta were briefly taken offline for maintenance to facilitate the investigation, as was Canvas Test. Canvas Data 2 became available May 3, Beta on May 4; Test remains under maintenance.

Related:Attacks Abuse Windows Phone Link to Steal Texts & Bypass 2FA

ShinyHunters, a prolific data extortion threat actor, took responsibility for the hack, claiming it exfiltrated 3.65TB of data representing approximately 275 million users across 9,000 institutions. On its data leak site, ShinyHunters listed a deadline of today alongside a threat to Instructure of "PAY OR LEAK."

Steve Proud, chief information security officer at Instructure, said the company engaged outside forensics experts and took multiple incident response steps, including revoking privileged credentials and access tokens associated with affected systems, deployed patches to enhance security, rotated certain keys out of an abundance of caution (even though there was no evidence they were misused), and implemented increased monitoring across all platforms.

"Thank you for your patience as we work to resolve this matter," Proud wrote. "We sincerely regret any inconvenience or concern this may cause."

Dark Reading contacted Instructure for comment, but the company has not responded at press time.

The Canvas Breach: Threats to Academic Institutions

While some of the identifying information may not include passwords, government ID, or banking credentials, the messages sent between users (e.g., students, teachers, and other faculty) are potentially the most sensitive data compromised by ShinyHunters actors. One concern would be whether attackers could use information gained from these messages as an additional extortion lever against institutions or families. Specific identifying information like this would also be useful for follow-on phishing activity.

... continue reading