Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»Canvas login portals hacked in mass ShinyHunters extortion campaign
    Cybersecurity

    Canvas login portals hacked in mass ShinyHunters extortion campaign

    adminBy adminMay 8, 2026No Comments4 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    Canvas
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Canvas

    The ShinyHunters extortion gang has breached education technology giant Instructure again, this time exploiting a vulnerability to deface Canvas login portals for hundreds of colleges and universities.

    The defacements, which were visible for roughly 30 minutes before being taken offline, displayed a message from ShinyHunters claiming responsibility for the earlier Instructure breach and threatening to leak stolen data if a ransom is not paid.

    The message warns that Instructure and schools have until May 12 to contact them to negotiate a ransom, or students’ data will be leaked.

    “ShinyHunters has breached Instructure (again). Instead of contacting us to resolve it they ignored us and did some ‘security patches’,” reads the defacement.

    “If any of the schools in the affected list are interested in preventing the release of their data, please consult with a cyber advisory firm and contact us privately at TOX to negotiate a settlement. You have till the end of the day by May 12 2026 before everything is leaked,” continued the message.

    Defaced University of Texas San Antonio Canvas login page
    Defaced University of Texas San Antonio Canvas login page

    BleepingComputer has learned that threat actors defaced the Canvas login portals for approximately 330 educational institutions, replacing the standard login pages with an extortion message. This defacement message also appeared in the Canvas app.

    The defacement was allegedly caused by a vulnerability in Instructure’s systems that allowed the threat actor to modify the login portals. Instructure has since taken Canvas offline while they respond to the latest cyberattack.

    Last week, Instructure disclosed that it was investigating a cyberattack after threat actors claimed to have stolen 280 million student and staff records tied to 8,809 schools, universities, and education platforms using its Canvas learning management system.

    The ShinyHunters gang later told BleepingComputer that the stolen data included user records, private messages, enrollment data, and other information allegedly gathered through Canvas data export features and APIs.

    Instructure confirmed that data was stolen during the attack but that they are continuing to investigate the incident.

    BleepingComputer has repeatedly contacted Instructure with questions about the attack, including today’s, and whether they plan on notifying students and staff about the data breach. However, our emails have so far remained unanswered.

    Canvas is one of the most widely used learning management systems in higher education and K-12 environments, helping schools manage coursework, assignments, grading, and communication between students and faculty.

    Who is ShinyHunters

    The name ShinyHunters has long been associated with numerous threat actors who have conducted data breaches since 2018.

    This year, threat actors using the ShinyHunters name have become among the most prolific groups conducting data theft and extortion attacks against companies worldwide.

    Primarily focusing on Salesforce and other cloud SaaS environments, the threat actors are linked to a growing number of breaches involving companies such as Google, Cisco, PornHub, and online dating giant Match Group.

    The extortion gang commonly breaches third-party integration companies and uses stolen authentication tokens to access connected SaaS environments and steal customer data.

    The threat actors are also known for conducting voice phishing (vishing) attacks targeting Okta, Microsoft, and Google single sign-on (SSO) accounts, impersonating IT support staff to trick employees into entering credentials and multi-factor authentication (MFA) codes on phishing sites.

    As BleepingComputer first reported, the ShinyHunters group has also recently adopted device code vishing attacks to obtain Microsoft Entra authentication tokens.

    After stealing credentials and authentication codes, the threat actors hijack SSO accounts to breach connected enterprise services such as Salesforce, Microsoft 365, Google Workspace, SAP, Slack, Adobe, Atlassian, Zendesk, and Dropbox.

    While members of the ShinyHunters gang are responsible for numerous attacks, they are also known to operate as an extortion-as-a-service group, conducting extortion on behalf of other threat actors in exchange for a share of ransom payments.

    There have been numerous arrests linked to the ShinyHunters name, including suspects connected to the Snowflake data-theft attacks, breaches at PowerSchool, and the operation of the Breached v2 hacking forum.

    Yet despite these arrests, companies continue to receive extortion emails signed with the message, “We are ShinyHunters.”


    article image

    AI chained four zero-days into one exploit that bypassed both renderer and OS sandboxes. A wave of new exploits is coming.

    At the Autonomous Validation Summit (May 12 & 14), see how autonomous, context-rich validation finds what’s exploitable, proves controls hold, and closes the remediation loop.

    Claim Your Spot

    Campaign Canvas extortion Hacked Login mass portals ShinyHunters
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleMicrosoft Ads expands custom columns to include all conversion metrics
    Next Article Your coworker might be selling company logins, and thinks it’s fine
    admin
    • Website

    Related Posts

    Encryption Consulting launches CertSecure Manager v3.3 with zero-touch certificate renewals

    May 20, 2026

    GitHub confirms breach of 3,800 repos via malicious VSCode extension

    May 20, 2026

    Grafana GitHub Breach Exposes Source Code via TanStack npm Attack

    May 20, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    Selector targets the network visibility gap in multi-cloud infrastructure

    May 20, 2026

    How to Persuade Your Boss to Send You to Ahrefs Evolve in San Diego

    May 20, 2026

    Key AEO & Content Trends for 2026

    May 20, 2026

    Google adds llms.txt check to Chrome Lighthouse

    May 20, 2026
    Categories
    • Blogging (82)
    • Cybersecurity (1,955)
    • Privacy & Online Earning (223)
    • SEO & Digital Marketing (1,210)
    • Tech Tools & Mobile / Apps (1,796)
    • WiFi / Internet & Networking (306)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    Selector targets the network visibility gap in multi-cloud infrastructure

    May 20, 2026

    How to Persuade Your Boss to Send You to Ahrefs Evolve in San Diego

    May 20, 2026

    Key AEO & Content Trends for 2026

    May 20, 2026
    Most Popular
    • Selector targets the network visibility gap in multi-cloud infrastructure
    • How to Persuade Your Boss to Send You to Ahrefs Evolve in San Diego
    • Key AEO & Content Trends for 2026
    • Google adds llms.txt check to Chrome Lighthouse
    • Riverbed expands autonomous AI capabilities for Aternity platform
    • What’s New in WordPress 7.0? (Features & Screenshots)
    • How Denis Yurchak Built Yadaphone to $17,500 a Month and 20,000 Users in Just Over a Year After the Skype Shut Down
    • How to do SEO for beginners
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.