Key Takeaways
- A cyberattack on Instructure’s Canvas platform disrupted access for thousands of schools and universities worldwide, with the hacking group “Shiny‑Hunters” claiming billions of records were accessed.
- Instructure confirmed the breach stemmed from Free‑For‑Teacher accounts, shut those accounts down, revoked credentials, and restored the service by Friday morning.
- Federal agencies including the FBI and CISA have been notified; the company says no evidence remains that the threat actor retains access.
- Major Texas institutions—UT System campuses, Texas A&M, Rice, Texas Tech, Baylor—and numerous K‑12 districts (Katy ISD, Houston ISD, Austin ISD, Tyler ISD, etc.) reported outages.
- UT Tyler and other schools disclosed that exposed data may include names, email addresses, and student IDs, but passwords, Social Security numbers, and financial information were not compromised.
- Users are urged to access Canvas only via official links, avoid unsolicited messages, enable multi‑factor authentication, and report suspicious communications immediately.
Overview of the Cyberattack
A coordinated cyberattack targeted Instructure’s Canvas learning‑management system, causing widespread disruption for students and educators as they prepared for finals. The incident began early in the week and persisted until Instructure announced full restoration on Friday morning. During the outage, anyone attempting to log into Canvas encountered a message stating the system was under scheduled maintenance, which masked the underlying security breach. The attack affected thousands of institutions globally, highlighting the vulnerability of widely used cloud‑based educational platforms.
Scope and Impact on Schools
According to the hacking group “Shiny‑Hunters,” nearly 9,000 schools worldwide were compromised, with billions of private messages and other records allegedly accessed. While the exact number of affected users remains unverified, the scale of the claim prompted immediate concern among administrators, teachers, and learners. The disruption prevented access to course materials, assignment submissions, grades, and communication tools, forcing many educators to resort to alternative methods such as email or paper‑based work during the outage.
Details of the Hacking Group Claim
The group identified as “Shiny‑Hunters” posted online that they had gained access to vast quantities of data stored within Canvas, including personal information tied to user accounts. Their announcement amplified anxiety about potential identity theft and misuse of academic records. Instructure subsequently investigated the claim, confirming that unauthorized access had occurred but emphasizing that the breach did not expose certain highly sensitive data points such as passwords or financial details.
Instructure’s Response and Restoration Efforts
Instructure issued a statement confirming that Canvas was fully back online and available for use. The company explained that the breach was traced to a vulnerability associated with Free‑For‑Teacher accounts, which they promptly disabled to cut off the attacker’s entry point. In addition, they revoked privileged credentials and access tokens linked to the affected systems, rotated internal encryption keys, restricted token‑creation pathways, and deployed extra monitoring across their platforms. An external forensic partner reviewed the indicators and found no evidence that the threat actor retained access after the remediation steps.
Coordination with Federal Agencies
Following the discovery of the incident, Instructure notified the Federal Bureau of Investigation (FBI) and the U.S. Cybersecurity and Infrastructure Security Agency (CISA). These agencies were brought in to assist with the investigation, assess the broader implications, and help ensure that any remaining threats were mitigated. The involvement of federal authorities underscores the seriousness of the breach and the need for a coordinated response between private vendors and government cybersecurity entities.
Specific Impact on Texas Institutions
The outage reverberated strongly across Texas, affecting several major universities and numerous K‑12 districts. The University of Texas system—including campuses in Austin, Tyler, and San Antonio—reported that Canvas was inaccessible for students and faculty. Texas A&M University, Rice University, Texas Tech University, and Baylor University also experienced disruptions. The widespread nature of the outage forced many Texas‑based educators to adjust lesson plans and assessment timelines on short notice.
K‑12 Districts Affected
Beyond higher education, a variety of K‑12 school districts reported issues with Canvas. Katy ISD, Houston ISD, and Austin ISD were among the larger districts that encountered login problems. In East Texas, multiple districts, including Tyler ISD, relied on Canvas for daily instruction and were locked out during the incident. The disruption created challenges for teachers attempting to post assignments, for students trying to submit work, and for parents monitoring academic progress.
UT Tyler’s Communication and Guidance
UT Tyler issued an email statement to KLTV acknowledging that they had been notified by Instructure of a vendor‑level cybersecurity incident. While the university confirmed it was impacted, it noted that the investigation was ongoing and that the full scope of exposed information had not yet been finalized. UT Tyler’s Information Security office urged users to remain vigilant against phishing attempts, advising them not to share passwords, multi‑factor authentication codes, or personal information in response to unsolicited communications.
Recommendations for Users to Stay Safe
The university’s guidance included several best practices: access Canvas exclusively through official UT Tyler links, avoid clicking on suspicious links or opening unexpected attachments purporting to be from Canvas, Instructure, or the university, and report any doubtful messages using the “Report Suspicious” or “Report Phish” button in email clients. These measures aim to reduce the risk of secondary attacks that often follow high‑profile data breaches, such as credential‑harvesting phishing campaigns.
Data Exposed According to UT Tyler
UT Tyler’s Canvas webpage clarified that, while some user data may have been exposed, the compromised information appeared limited to names, email addresses, and student IDs. The university emphasized that no passwords, Social Security numbers, or financial information were found to be compromised based on Instructure’s investigation. This distinction is important because it reduces the immediate risk of financial fraud, although the exposure of personal identifiers still warrants caution against social‑engineering tactics.
Earlier District Notifications (Tyler ISD)
Prior to the restoration of service, Tyler ISD sent a message to families explaining that Instructure was responding to a nationwide cybersecurity incident affecting Canvas clients. The district acknowledged being locked out of the system while Instructure worked through its response process and noted that district‑specific details about the breach’s scope were still pending. Tyler ISD asked for patience and flexibility from staff and families as they navigated the temporary loss of access to assignments, grades, and course materials.
Ongoing Monitoring and Future Precautions
Both Instructure and the affected institutions have pledged to continue monitoring the situation closely. Instructure stated it would keep watch for any signs of renewed threat actor activity and maintain the additional protections put in place during the remediation. Schools and universities are encouraged to review their own security practices, reinforce multi‑factor authentication, and educate users about recognizing phishing attempts as part of a broader strategy to safeguard digital learning environments against future cyber threats.

