this post was submitted on 08 May 2026
21 points (100.0% liked)

news

24760 readers
734 users here now

Welcome to c/news! We aim to foster a book-club type environment for discussion and critical analysis of the news. Our policy objectives are:

We ask community members to appreciate the uncertainty inherent in critical analysis of current events, the need to constantly learn, and take part in the community with humility. None of us are the One True Leftist, not even you, the reader.

Newcomm and Newsmega Rules:

The Hexbear Code of Conduct and Terms of Service apply here.

  1. Link titles: Please use informative link titles. Overly editorialized titles, particularly if they link to opinion pieces, may get your post removed.

  2. Content warnings: Posts on the newscomm and top-level replies on the newsmega should use content warnings appropriately. Please be thoughtful about wording and triggers when describing awful things in post titles.

  3. Fake news: No fake news posts ever, including April 1st. Deliberate fake news posting is a bannable offense. If you mistakenly post fake news the mod team may ask you to delete/modify the post or we may delete it ourselves.

  4. Link sources: All posts must include a link to their source. Screenshots are fine IF you include the link in the post body. If you are citing a Twitter post as news, please include the Xcancel.com (or another Nitter instance) or at least strip out identifier information from the twitter link. There is also a Firefox extension that can redirect Twitter links to a Nitter instance, such as Libredirect or archive them as you would any other reactionary source.

  5. Archive sites: We highly encourage use of non-paywalled archive sites (i.e. archive.is, web.archive.org, ghostarchive.org) so that links are widely accessible to the community and so that reactionary sources don’t derive data/ad revenue from Hexbear users. If you see a link without an archive link, please archive it yourself and add it to the thread, ask the OP to fix it, or report to mods. Including text of articles in threads is welcome.

  6. Low effort material: Avoid memes/jokes/shitposts in newscomm posts and top-level replies to the newsmega. This kind of content is OK in post replies and in newsmega sub-threads. We encourage the community to balance their contribution of low effort material with effort posts, links to real news/analysis, and meaningful engagement with material posted in the community.

  7. American politics: Discussion and effort posts on the (potential) material impacts of American electoral politics is welcome, but the never-ending circus of American Politics© Brought to You by Mountain Dew™ is not welcome. This refers to polling, pundit reactions, electoral horse races, rumors of who might run, etc.

  8. Electoralism: Please try to avoid struggle sessions about the value of voting/taking part in the electoral system in the West. c/electoralism is right over there.

  9. AI Slop: Don't post AI generated content. Posts about AI race/chip wars/data centers are fine.

founded 5 years ago
MODERATORS
 

spoilerWASHINGTON — A cybersecurity attack on the nation's most widely used classroom software has potentially exposed the personal data of millions of students and educators across the country.

Instructure, the company that runs the Canvas learning management system used by more than 7,000 universities, K-12 districts and education ministries worldwide, disclosed the breach to affected institutions this week. The company confirmed names, email addresses, student ID numbers and private messages between users had been accessed before the breach was contained.

Canvas is used by 41% of higher education institutions across North America to deliver courses. Millions of K-12 students rely on it as well. In North Carolina alone, the state Department of Public Instruction has used Canvas across all public K-12 schools since 2015.

The criminal extortion group ShinyHunters claimed responsibility for the attack. On a dark web leak site, the group alleged it had stolen more than 3.65 terabytes of data and threatened to release it unless its demands were met. The group said it stole roughly 275 million records tied to students, teachers and staff, and shared a list of 8,809 school districts, universities and online education platforms it claims were affected.

ShinyHunters warned that a failure to pay could result in the release of "several billions of private messages among students and teachers." A ransom message on the platform appears to give Infrastructure until May 12 to respond and "negotiate a settlement" before the hackers leak information.

The company stated that the affected data might have included full names, email addresses, student ID numbers and messages, but that there is no evidence passwords, dates of birth, government identifiers or financial information were exposed.

The sensitivity of Canvas messages compounds the concern. The platform is used by students to disclose medical and mental health information to academic advisers, to request accommodations and to communicate with Title IX advocates.

Notably, this is Instructure's second confirmed breach in approximately eight months. In September 2025, the same ShinyHunters group exploited a social engineering attack against the company's Salesforce environment.

Officials across the country are advising students, parents and staff to be cautious of unsolicited emails or messages that appear to come from Canvas, particularly those requesting personal information or password resets. Monitoring accounts for unusual activity is also encouraged.

Instructure said it has engaged outside forensic cybersecurity experts and law enforcement. The investigation is ongoing, and the full scope of the breach has not yet been determined.

When will Canvas be back online?

Canvas was offline Thursday evening as the company placed the app in maintenance mode after earlier reports of users encountering issues logging into student ePortfolios.

"We anticipate being up soon, and will provide updates as soon as possible," Infrastructure wrote on its website.

The company is providing updates on its status page.

you are viewing a single comment's thread
view the rest of the comments
[–] happybadger@hexbear.net 19 points 5 hours ago* (last edited 3 hours ago) (1 children)

Doing this attack during finals week is something. Canvas is used for almost every online part of classes. You turn your assignments in, do quizzes, communicate to professors- everything except video conferencing. It's very cool that they trust such shitty software that this has happened twice.


[–] Goferking0@ttrpg.network 14 points 4 hours ago

It's makes sense from the hackers view. More likely to have them pay when clients will also be extremely upset