Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»Congress Puts Heat on Instructure After Canvas Outage
    Cybersecurity

    Congress Puts Heat on Instructure After Canvas Outage

    adminBy adminMay 16, 2026No Comments6 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    Congress Puts Heat on Instructure After Canvas Outage
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Lawmakers are seeking answers from educational technology vendor Instructure, following the high-profile compromise of the company’s Canvas learning management system (LMS) that left thousands of schools and universities without grade reporting and other functions this month. 

    The House Committee on Homeland Security this week requested Instructure appear before the committee for a briefing on the recent attacks against the edtech company. In a letter to Instructure CEO Steve Daly, the committee questioned why the company was breached twice in the span of a week by the infamous ShinyHunters cybercrime group. Also likely on the docket will be the questions of whether it paid a ransom to the cyberattackers, and whether the incident is related to another attack on its Salesforce environment last fall.

    “The recurrence of an intrusion within days of an initial breach disclosure, and Instructure’s apparent failure to fully remediate the underlying vulnerabilities during that window, raise serious questions about the company’s incident response capabilities and its obligations to the institutions and individuals whose data it holds,” committee chairman Andrew R. Garbarino (R-NY) wrote in the letter, requesting the company meet with members no later than May 21.

    Related:Cyber Pioneers Ponder Past as Prologue

    Instructure disclosed the initial breach May 1, acknowledging that threat actors had obtained “certain identifying information of users,” including names, emails, student ID numbers, and private messages. ShinyHunters, meanwhile, claimed it possessed more than 3TB of sensitive data from Instructure users representing more than 9,000 educational institutions.

    Instructure temporarily took Canvas offline to investigate, and then declared the intrusion “resolved” May 6 and that its LMS was “fully operational.” But the following day, ShinyHunters returned, compromising Canvas and posting a ransom demand on the platform login pages.

    The ongoing threat activity has raised questions from lawmakers about Instructure’s response to the initial attack, how the company resolved the matter, and —  perhaps most importantly — when it was first breached by ShinyHunters.

    Did Instructure Pay the ShinyHunters Ransom?

    In a similar letter to Instructure on Tuesday, the US Senate Committee on Health, Education, Labor, and Pensions said it was investigating the attacks and posed a litany of questions to Daly, including the types of data affected by the breach and the security improvements it has made in the aftermath. The committee’s letter pressed the edtech company about its May 11 statement in which Instructure said it “reached an agreement” with the threat actor behind the attacks. 

    Related:‘FrostyNeighbor’ APT Carefully Targets Govt Orgs in Poland, Ukraine

    “We have been informed that no Instructure customers will be extorted as a result of this incident, publicly or otherwise,” Instructure said in the update, adding that the stolen data was “returned” and attackers provided digital confirmation of its destruction. “This agreement covers all impacted Instructure customers, and there is no need for individual customers to attempt to engage with the unauthorized actor.”

    While the company did not admit to paying a ransom, that’s the most likely scenario, as ShinyHunters removed Instructure’s listing from its data leak site — a move ransomware and data extortion groups typically reserve for victim organizations that pay up. ShinyHunters also issued a statement May 13, saying the group had nothing more to add to the “recent situation at the LMS company” and there was no need for impacted organizations to contact ShinyHunters directly anymore. 

    The Senate committee’s letter also raised questions about “a previous cybersecurity incident in September 2025,” and what remedial steps were taken following that attack. The incident in question resulted from a compromise of the company’s Salesforce instance, which was disclosed Sept. 21, 2025. Scattered Lapsus$ Hunters, a cybercriminal collective apparently composed of members of Scattered Spider, Lapsus$, and ShinyHunters, listed Instructure on their leak site at the time, as part of a spate of Salesforce incursions last fall that also included companies like Chanel and Qantas Airways. But the culprit behind the attack, as well as many or the other Salesforce breaches, was UNC6040, a threat actor tied to ShinyHunters, according to Google Threat Intelligence Group researchers. 

    Related:Foxconn Attack Highlights Manufacturing’s Cyber Crisis

    Regardless, it all raises the question of whether data from the Salesforce attack was used to carry out this month’s offensive; the answer is unclear, but researchers are emphasizing that the company was clearly earmarked as a repeat target, which in and of itself is concerning.

    Instructure Fails to Keep Attackers at Bay After Salesforce

    Following the Salesforce breach in September 2025, which Instructure said stemmed from a social engineering attack, the edtech company said it “moved quickly to contain the activity” and conducted a thorough investigation with third-party experts. “Subsequently, we have implemented additional security measures to help prevent similar incidents in the future,” the company said in the disclosure. Dark Reading contacted Instructure for comment on whether Salesforce breach was connected to the recent attacks, but the company did not respond at press time. 

    In a blog post this week, Abbas Kudrati, chief identity security advisor at Silverfort, wrote that ShinyHunters’ recent activity was “categorically different” compared to the September attack, which was limited to the Salesforce instance. However, “This shows that ShinyHunters views Instructure as a high-value target worth revisiting — and any institution relying on Canvas should assume the same targeting could happen again,” Kudrati wrote.

    Roy Akerman, vice president of identity security strategy at Silverfort, tells Dark Reading that it’s typical for threat actors like ShinyHunters to collect as much data as possible from a compromise and use it to their full advantage for a follow-up attack. But the bigger question for Instructure, he says, is what the company did once it detected malicious activity inside its environment.

    “The story to me is that attackers are persistent, and it doesn’t really matter if they found one piece [of data] that was re-used or not,” Akerman says. “Maybe for the legislators, it will matter because it will show negligence or something like that. But I believe at the end of the day, if you’re under attack then you need to get yourself into a different mode, and you need to assume that one day they’ll place a foothold in your organization. And what’s your play then?”

    Presumably, Instructure will appear before lawmakers in the near future, although it’s unclear if the briefings will be public. In the meantime, Silverfort urged customers to monitor their environments in real time for anomalous authentication behavior and other signs of lateral movement. “The window between initial compromise and significant damage is often hours,” Kudrati said.

    Don’t miss the latest Dark Reading Confidential podcast, How the Story of a USB Penetration Test Went Viral. Two decades ago Dark Reading posted its first blockbuster piece — a column by a pen tester who sprinkled rigged thumb drives around a credit union parking lot and let curious employees do the rest. This episode looks back at the history-making piece with its author, Steve Stasiukonis. Listen now!

    Canvas Congress heat Instructure outage puts
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleDean Kadi talks clients ignoring performance data
    Next Article OpenAI Hit by TanStack Supply Chain Attack
    admin
    • Website

    Related Posts

    Encryption Consulting launches CertSecure Manager v3.3 with zero-touch certificate renewals

    May 20, 2026

    GitHub confirms breach of 3,800 repos via malicious VSCode extension

    May 20, 2026

    Grafana GitHub Breach Exposes Source Code via TanStack npm Attack

    May 20, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    Google adds llms.txt check to Chrome Lighthouse

    May 20, 2026

    Riverbed expands autonomous AI capabilities for Aternity platform

    May 20, 2026

    What’s New in WordPress 7.0? (Features & Screenshots)

    May 20, 2026

    How Denis Yurchak Built Yadaphone to $17,500 a Month and 20,000 Users in Just Over a Year After the Skype Shut Down

    May 20, 2026
    Categories
    • Blogging (82)
    • Cybersecurity (1,955)
    • Privacy & Online Earning (223)
    • SEO & Digital Marketing (1,208)
    • Tech Tools & Mobile / Apps (1,796)
    • WiFi / Internet & Networking (305)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    Google adds llms.txt check to Chrome Lighthouse

    May 20, 2026

    Riverbed expands autonomous AI capabilities for Aternity platform

    May 20, 2026

    What’s New in WordPress 7.0? (Features & Screenshots)

    May 20, 2026
    Most Popular
    • Google adds llms.txt check to Chrome Lighthouse
    • Riverbed expands autonomous AI capabilities for Aternity platform
    • What’s New in WordPress 7.0? (Features & Screenshots)
    • How Denis Yurchak Built Yadaphone to $17,500 a Month and 20,000 Users in Just Over a Year After the Skype Shut Down
    • How to do SEO for beginners
    • Google Introduces New Ad Formats In AI Mode
    • AI reshapes cybersecurity workforce priorities as IT teams brace for new risks
    • How to stand out in AI search when every business sounds the same
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.