For Businesses of Every Size

The ShinyHunters Canvas Hack: What Every Business Should Take From the Largest Education Breach on Record

Published May 9, 2026 · 9 min read · By the ScamDrill Team
Editorial cover graphic titled ‘Quiet Compromise’ on a deep navy field with a single amber voice-phishing waveform, a ledger of prior ShinyHunters breaches, and a list of observed attack vectors

If you have a kid in college or a teacher in the family, you have probably already heard about the Canvas outage — the “security patch” banners since May 1, finals rescheduled at Penn, Harvard, and Duke, the “PAY OR LEAK” message that briefly replaced the Instructure splash screen. The reason that page went sideways is a name anyone in security has been hearing for five years now: ShinyHunters.

The headline numbers are staggering. ShinyHunters claim to have stolen 3.65 terabytes of data covering roughly 275 million users across 8,809 institutions — universities, K–12 districts, and entire national education ministries that route through Canvas. Wikipedia’s running summary calls it the largest education-sector breach on record. The deadline posted on the Canvas login page gives affected schools until May 12, 2026 to negotiate via Tox.

The story matters far beyond education. The way ShinyHunters got in is the same playbook that hit AT&T, Ticketmaster, Snowflake customers, PowerSchool, Google, and a long tail of Salesforce tenants. It is mostly a phone call. And almost every business now lives downstream of a SaaS vendor that could get the same call next week.

275M Records ShinyHunters claim were stolen from Instructure’s Canvas LMS, spanning 8,809 institutions worldwide. Instructure says passwords and financial data were not exposed; names, emails, student IDs, and private messages were.
Source: ShinyHunters extortion notice; Instructure customer notice, May 5, 2026; Wikipedia summary updated May 8, 2026.

What we know about the Canvas incident

Here is what is publicly confirmed. Instructure detected unauthorized activity on April 29, 2026 and pulled parts of Canvas offline on May 1. The company notified affected schools May 5. ShinyHunters publicly claimed responsibility on May 7, and that day the Canvas login page was changed to read “PAY OR LEAK” with negotiation instructions. CNN, TIME, and Inside Higher Ed all carried the same outline within hours of each other.

The exact entry point is still moving in the public reporting. Early Instructure statements pointed to a vulnerability tied to the platform’s Free-For-Teacher account tier. Mandiant’s commentary on the same window adds the part that is more useful to the rest of us: the attackers used voice-phishing calls and company-branded fake login pages to harvest employee credentials before pivoting to SaaS data. Times Higher Education flagged the secondary risk this week: stolen private messages between students and teachers are perfect raw material for personalized follow-on phishing.

Who ShinyHunters actually are

If the name conjures up a shadowy state-sponsored APT, recalibrate. ShinyHunters have been around since roughly 2020 and have always read more like a forum-grown extortion crew than a government operation. Emsisoft threat-intel analyst Luke Connolly described them this week as “a loose group of teenagers and young adults based in the US and the United Kingdom.” Mandiant tracks the cluster behind the 2025–2026 SaaS campaigns as UNC6040 and UNC6240.

Two arrests in 2024 are worth knowing about. Connor Riley Moucka, then 25, was arrested in Kitchener, Ontario in October 2024 and faces US charges including conspiracy, computer fraud, extortion, and identity theft. John Erin Binns, 24, was arrested in Turkey in May 2024 and is fighting extradition tied to the 2021 T-Mobile breach. Even with those two off the board, the brand keeps operating — ShinyHunters is less a fixed roster than a logo anyone with the right contacts can run a campaign under.

A Five-Year ShinyHunters Trail

FIG. 01 / FIVE-YEAR TRAIL / UNC6040 · UNC6240 ScamDrill scamdrill.com Major ShinyHunters incidents, by records exfiltrated. Each bar indexes the headline figure publicly attributed to the campaign. Bars are illustrative — some events compromised hundreds of organizations. RECORDS 600M 400M 200M 0 ~100M Emergence Tokopedia, Wishbone 2020 560M Ticketmaster via Snowflake May 2024 160 orgs Snowflake wave AT&T · Santander mid-2024 ~62M PowerSchool $2.85M ransom paid Dec 2024 dozens Salesforce Google · Cisco 2025 275M Canvas / Instructure 3.65 TB · 8,809 inst. MAY 2026 · ACTIVE Pre-SaaS-era extortion SaaS / OAuth campaign Active campaign Wikipedia · Mandiant · CNN · TIME · BleepingComputer

The tactics: why a phone call is the new zero-day

The thing that surprises most non-security people about ShinyHunters is how little of their playbook is technical. They are not, generally, finding new vulnerabilities in widely deployed software. They are calling the helpdesk.

1. Vishing as the front door. The signature ShinyHunters move is a phone call from someone claiming to be IT support — sometimes the company’s actual IT support, sometimes a SaaS vendor like Salesforce or Okta. Varonis’s analysis of UNC6040 and Google’s Threat Intelligence team both describe the same script: caller has the employee’s name, role, and a plausible reason to be calling, then walks them through approving an OAuth app, entering credentials on a real-looking Salesforce or Okta page, or installing what they say is the “official” Data Loader tool. The branded login page is the trick — it uses your company logo, your colors, your subdomain pattern. By the time the employee notices the extra URL character, the OAuth token has already been issued.

2. AI-assisted helpdesk impersonation. Google’s 2026 follow-up describes the group layering legitimate AI voice platforms on top of vishing — automated agents that handle the early script before handing off to a human if the target hesitates. Three seconds of voice training is enough to clone a vendor’s real account manager, which is the same dynamic we’ve been writing about in neo-phishing and AI voice cloning. The crew that used to be a human reading from a script is now a human plus a voice clone plus a translation model.

3. Stolen credentials from infostealer logs. The 2024 Snowflake wave that hit AT&T and Ticketmaster did not involve a Snowflake vulnerability. The attackers bought infostealer logs — bundles of credentials harvested from random employees’ personal devices by malware like Lumma, Vidar, and Redline — and reused them against corporate Snowflake tenants that had no MFA enforcement. The sheer cheapness of the input (a few dollars per log) is what made 160 organizations possible.

4. Branded extortion sites and dark-web pressure. Once data is out, ShinyHunters do not just email the CISO. They post samples on a leak site, alert reporters, and increasingly, as in the Canvas case, deface the victim’s own product so that customers see the ransom note before the legal team does. That is a deliberately public threat model, and it is hard to stay quiet through.

What this means by company size

The Canvas incident is dominating the headlines because of who got hit. The lesson, though, has very little to do with education. It has to do with the dependency graph almost every business now runs on top of.

Small businesses (under ~50 employees)

You do not have a CISO. You probably do not have an IT team large enough to staff a real helpdesk. That is fine, and it is also exactly what ShinyHunters operators count on. The two changes that are worth the time this week are an honest SaaS inventory — literally a Google Sheet listing every tool that holds customer or employee data, who owns it, and whether MFA is on — and a callback rule for any password reset, MFA reset, or banking-detail change. Anyone, internal or external, who calls and asks for one of those gets a callback to a number you already have. Our social engineering guide for SMBs walks through both in detail; the 30-day phishing-simulation plan is a good follow-up if you want to make this a habit, not a memo.

Mid-size businesses (50–1,000 employees)

This is where the ShinyHunters pattern stings the most. Mid-market companies have enough SaaS tools to be interesting (Salesforce, Workday, NetSuite, Zendesk, a couple of CRMs nobody is sure who owns) and not enough security headcount to police OAuth grants and conditional-access policies in any of them. Two non-negotiables for this segment: review every OAuth app connected to your major SaaS tenants, and add conditional-access rules that block logins from unmanaged devices or anomalous geographies. Add a tabletop exercise in which a “Salesforce support” vishing call is the kickoff event, and watch how quickly the gaps surface. The 2026 AI cybersecurity landscape post has more on what is realistic for a team of five to actually defend.

Large enterprises (1,000+ employees)

You already have an OAuth policy. The Canvas incident, like the Salesforce wave before it, is the case that the policy you have is not enough. Treat third-party SaaS like you treat employees: just-in-time access, not standing OAuth grants; phishing-resistant MFA (FIDO2, hardware keys) for any account that can extract data; helpdesk verification scripts that explicitly assume the caller is lying about who they are; and a shared-services-style detection feed for OAuth grant anomalies across tenants. The Arup deepfake CFO case from 2024 and the Canvas vishing chain in 2026 are the same shape of attack, scaled differently. The defense is also the same shape: change the channel any time money, access, or confidentiality is on the line.

Anatomy of a ShinyHunters Vishing Attack

FIG. 02 / VISHING-TO-EXTORTION KILL-CHAIN / UNC6040 ScamDrill scamdrill.com Anatomy of a vishing-to- extortion attack. How a single phone call becomes a multi-million-record breach — the five stages observed across Salesforce, PowerSchool, and the May 2026 Canvas campaign. SEVERITY · LOW CRITICAL 01 Recon LinkedIn, leaked org charts, vendor listings FINANCE / IT 02 The call “IT support” or “Salesforce” phones the target AI-ASSISTED 03 Branded page Target enters creds on a fake login that copies the real brand BRAND-PERFECT 04 OAuth grant Malicious Data Loader / app gets approved — refresh token issued BACK DOOR 05 Exfil + extort Bulk pull from Salesforce / LMS, then ransom timer 5–7 DAY DEADLINE Defensive break-points: Out-of-band callback at 02. Phishing-resistant MFA at 03. OAuth review at 04. Source: Mandiant / Google Threat Intelligence (UNC6040, UNC6240) · Varonis, 2025 scamdrill.com / blog

If you are downstream of the Canvas breach

If your school, district, or company uses Canvas, treat this as an active campaign — not a finished incident. The data ShinyHunters claim to have (names, emails, student IDs, full message threads) is the perfect input for a follow-on personalized phishing wave. Times Higher Education flagged the same risk this week: expect emails that quote a real conversation a student had with a real professor, sent from a domain that looks identical to your registrar’s.

This week’s checklist

“The defense isn’t fancy. It’s the same one that would have stopped Ticketmaster, Snowflake, and PowerSchool: assume the caller is lying about who they are, and verify out-of-band before you click anything.”

The bigger picture

The thing that should keep founders and CISOs up at night is not the size of the Canvas number. It’s the unit economics. A loose collective of teenagers and twenty-somethings, with no zero-days, has now stitched together at least four nine-figure breaches over five years, almost entirely on the back of phone calls and infostealer logs. The Salesforce Data Loader trick alone has hit Google. The Snowflake credential reuse has hit AT&T. The ed-tech vendor pattern has now hit PowerSchool and Instructure within 18 months of each other.

If you run a business of any size, the practical takeaway is the same one we have been writing about all spring: the attack surface is no longer your perimeter. It is your people, your vendors, and the trust between them. Hardening the helpdesk — both yours and the ones your SaaS vendors run on your behalf — is the highest-leverage thing you can do this quarter. Everything else is downstream of that.

Drill the moment of doubt before it costs you a quarter.

ScamDrill sends realistic mock vishing calls, BEC emails, and OAuth-style phishing prompts to your team on a rotating schedule — with a friendly teachable moment when someone hands over credentials they shouldn’t have. Build the “hang up and call back” reflex.

Start free →

Frequently asked questions

Who are ShinyHunters?

ShinyHunters is a financially motivated extortion group active since around 2020. Mandiant tracks the cluster involved in recent SaaS campaigns as UNC6040 and UNC6240. Emsisoft analyst Luke Connolly has described the group as a loose collective of teenagers and young adults based largely in the US and the UK. They steal data, post samples on dark-web forums, and demand ransom in exchange for not publishing the rest.

What happened in the May 2026 Canvas hack?

Instructure detected unauthorized activity on April 29, 2026 and shut down parts of Canvas on May 1. ShinyHunters claimed responsibility on May 7 and posted a ransom message on Canvas login pages giving affected schools until May 12, 2026 to negotiate via Tox. They claim to have stolen 3.65 TB of data covering roughly 275 million users across 8,809 institutions, including names, emails, student IDs, and private messages between students and teachers. Instructure has said passwords and financial information were not compromised.

What tactics do ShinyHunters use?

Their playbook is overwhelmingly social engineering, not zero-day exploits. The signature move is a voice phishing (vishing) call from someone impersonating IT support, walking the employee into approving a malicious OAuth app, entering credentials on a fake but company-branded login page, or installing a tampered version of a real tool like Salesforce Data Loader. They have also been observed using AI voice tools to automate the helpdesk impersonation, and they harvest credentials from infostealer logs to pivot into SaaS environments like Snowflake.

What past breaches are tied to ShinyHunters?

ShinyHunters have been linked to or claimed credit for some of the largest data thefts of the past five years — the 2024 Snowflake wave that hit AT&T, Ticketmaster (560 million records), Santander, LendingTree, Advance Auto Parts and Neiman Marcus; the December 2024 PowerSchool breach (which paid a $2.85 million ransom); and a 2025 Salesforce-focused campaign that affected Google, Cisco, and dozens of other enterprise customers. The May 2026 Canvas/Instructure incident is the latest chapter.

How should small, mid-size, and large businesses respond?

Small businesses should focus on a SaaS inventory and a callback rule for any password, MFA, or banking-detail change. Mid-size businesses should add OAuth app review and conditional-access policies that block logins from unmanaged devices or unusual geographies. Large enterprises should treat third-party SaaS access the way they treat employee access — just-in-time permissions instead of standing OAuth grants, phishing-resistant MFA, and tabletop exercises that include a vishing scenario. The common thread is that the front door is now a phone call, so the phone call has to be the thing you harden.

Join our free newsletter to stay ahead of the scammers

Receive updates on monthly scam trends, along with best practices to protect yourself and those you care about.