ShinyHunters Defaces Canvas Login Portals in Mass Extortion Campaign
The ShinyHunters extortion gang has once again breached Instructure, the education technology giant behind Canvas. BleepingComputer reports that the attackers exploited a new vulnerability to deface login portals for hundreds of colleges and universities utilizing the Canvas platform, leveraging this access for an extortion campaign.
This isn’t ShinyHunters’ first rodeo with Instructure; they previously targeted the company. The current campaign impacts a vast swathe of the education sector, specifically higher education institutions that rely on Canvas for their learning management systems. The defacement of login portals is a direct attack on trust and operational continuity, forcing institutions into a reactive scramble.
For defenders in education, this means immediate action is required. While the primary goal appears to be extortion, the access gained to defface login portals raises serious questions about potential lateral movement or data exfiltration that may not be immediately apparent. Institutions must assume compromise and conduct thorough forensics.
What This Means For You
- If your institution uses Canvas, assume your login portals were targeted. Immediately check for any signs of tampering, unauthorized access, or unusual activity on your Canvas instances. Prioritize patching any newly released updates from Instructure and review your incident response plan for portal defacement and extortion scenarios.
Related ATT&CK Techniques
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| ShinyHunters-Canvas-Defacement | Defacement | Instructure Canvas login portals |
| ShinyHunters-Canvas-Defacement | Exploitation | Vulnerability in Instructure Canvas |