Anyone even a little familiar with how higher education is done these days has dealt with what are called "learning management systems" (LMS for short). Basically, an LMS is what has replaced paper homework, paper gradebooks, and in many cases, paper exams that used to be shuffled back and forth between students, graders, and faculty members.
Like many other universities around the world, several years ago my university switched from the LMS they were using to something called Canvas. Once I learned its ins and outs, it has proved to be a useful, flexible, and mostly easy-to-use tool. I can send out emails to everyone in a particular class, I can record grades that instantly show up on students' phones, and while I don't personally use the test-administering feature, many professors do.
Canvas is so good, in fact, that its parent company, a privately-held outfit called Instructure, now has a plurality of all LMS customers in the world, serving over 8,000 institutions in dozens of countries.
A lot of confidential data is stored in Canvas. For example, it turns out to be a violation of a Federal law for me to post a list of grades on my door, even if I anonymized them with Social Security numbers. So if anybody other than the student concerned manages to find out what a person's grade is, a whole lot of people can be in trouble.
Last month, these facts plus a fairly behind-the-times security posture made Instructure a prime target for the loosely-organized but highly effective ransomware ring known as ShinyHunters. These criminals are thought to be concentrated in Canada and France, and are known to have committed numerous ransomware attacks on organizations whose wide-ranging databases make them particularly juicy targets, such as Ticketmaster and AT&T.
According to a report on thenextweb.com and the Wikipedia website "2026 Canvas security incident," on April 30, ShinyHunters breached Instructure's security and posted a ransom note on May 3. On May 6, Instructure, which had publicly acknowledged the breach on May 1, notified its users that everything was back to normal.
But according to ShinyHunters, Instructure ignored their ransom demand and simply doubled down on security measures. In retaliation, ShinyHunters put their ransom notice on every user's webpage, prompting Instructure to pull most of the system down and replace it with an "under maintenance" notice on 8 PM May 7 Eastern Standard Time.
Unfortunately, this was just when a lot of schools were relying heavily on Canvas for exams, grading, and other end-of-semester activities. I was fortunate to have my last necessary interaction of the semester with Canvas just a few hours before it crashed, but a lot of other professors and students weren't so fortunate. Our provost sent out a notice during the outage asking toleration and understanding on the part of both students and faculty members.
According to Hacker News, Instructure eventually reached a ransom agreement with ShinyHunters on May 11, averting release of some 3.6 terabytes of stolen data. Since then, Canvas has apparently been running normally, although after this experience one wonders how reliable it will be in the future.
The days when universities developed their own custom software for large-scale applications such as LMS are long past. But farming out important tasks to vendors places the responsibility for security squarely on the vendor's shoulders. And bigness, however attractive it is profit-wise, attracts the attention of hackers as well. So we shouldn't be too surprised that an outfit like ShinyHunters picked Canvas for their next target.
Ransomware hackers are the modern pirates of the Internet. During the heroic age of global exploration and trade from the 1200s AD onward to 1800 and later, the ocean became a network of trade routes over which the world's valuables flowed. The prospect of siphoning off some of those valuables for their own purposes, or of extorting money to allow their uninhibited flow, attracted pirates such as the ones based on the Barbary Coast region of North Africa in the years leading up to and following the American Revolution. In what was the United States' first major foreign military action, President Thomas Jefferson decided he was through with paying off the pirates, and sent the Marines in a series of expeditions that ultimately broke the stranglehold they held on U. S. maritime trade in regions they controlled.
Jefferson had the advantage that the pirates sailed physical ships and could be tracked back to specific ports, where plans could be made to attack them. The power that the internet gives to put the world at your Ethernet port also makes it possible for criminals to hide literally anywhere there is an internet connection, which these days means pretty much anywhere. Tracking them down is a costly, slow, and uncertain enterprise at best. And as soon as some bad actors are rounded up and thrown in jail, their uncaught associates rise up to take their place.
It's hard to imagine a modern-day Jefferson scaring ransomware hackers enough for them to lay off an entire country. As the ShinyHunters' actions showed, national borders mean little to them. They were attracted to Instructure because it formed one of the largest data-holders on the planet, not because it was a particularly large or rich country.
The only thing that may lead to something like what Jefferson did to the pirates of 1800 is if a particular organization goes after the hackers with determination and even a kind of vengeance. Perhaps something along the lines of a trade organization of large data-holders could fund a multinational policing effort that would make every ransomware hacker sorry they ever messed with a company that is a member of the organization.
That may require international and inter-company cooperation that simply doesn't exist today. But if the problem gets bad enough, maybe firms will overcome their reluctance to put their money and efforts together and do something truly effective. Until then, however, outfits like Instructure can look forward to more attacks, and users will just have to deal with it.
Sources: I referred to reports at https://thenextweb.com/news/the-largest-education-data-breach-in-history-was-not-an-attack-on-a-school-it-was-an-attack-on-a-vendor, https://thehackernews.com/2026/05/instructure-reaches-ransom-agreement.html, and the Wikipedia article "2026 Canvas security incident."