ShinyHunters - Source Feature - May 2026

The Canvas Extortion Case

What ShinyHunters claimed, what Instructure confirmed, and how cloud-account attacks work

In May 2026, attackers using the ShinyHunters name claimed they stole data from Instructure's Canvas platform. Instructure confirmed exposed user data, and some Canvas login pages later showed ransom messages. The case fits a broader pattern: attackers get cloud-account access, export data, and use public threats to demand payment.

Published May 8, 2026. Based on open reporting, OPTIC local extraction records, and Google/Mandiant reporting on ShinyHunters-linked cloud data theft. Attacker scale claims are treated as claims unless independently verified.
Current incident
May 2026

Instructure confirmed a Canvas data breach. Some Canvas login pages later displayed ransom messages.

Claimed scale
8.8K+

ShinyHunters claimed thousands of institutions were affected. That number should stay labeled as attacker-claimed.

Google tracking names
4

Google uses names such as UNC6040 and UNC6240 to separate related activity instead of treating every claim as one group.

The basic pattern

Attackers do not need malware when a stolen login gives them access to cloud data. Customer records, documents, emails, and messages can all become ransom material.

The naming problem

ShinyHunters is the name used in public claims and ransom messages. Google and Mandiant use separate UNC names to track specific activity.

Current Incident

When Canvas Login Pages Displayed Ransom Messages

Canvas / Instructure timeline

Reported sequence through May 8, 2026
Apr 30

Service disruption

Reporting tied early disruption to tools relying on API keys and Canvas Data 2 / Beta maintenance.

May 1

Incident disclosed

Instructure said a criminal actor was involved and brought in outside forensics support.

May 2

Containment actions

Reports describe credential and token revocation, reissued application keys, fixes, and additional monitoring.

May 3-5

Public claim

ShinyHunters claimed large-scale theft from thousands of schools. The exact scale remains unverified.

May 7

Login pages defaced

Canvas portals displayed a ransom message and a May 12 leak deadline.

May 8

Access restored

AP reported Canvas was available again for most users. Instructure also said it temporarily shut down Free-For-Teacher accounts tied to the issue.

The confirmed data categories matter: names, email addresses, student ID numbers, and user messages can support phishing, privacy abuse, and follow-on targeting even without passwords or financial records. SecurityWeek The Record

The defacement changed who saw the threat. A leak-site post reaches defenders and reporters. A ransom message on a classroom login page reaches students, faculty, and administrators. BC TechCrunch AP

Naming

ShinyHunters Is the Name Victims See

Names used in the reporting

Public claims and Google tracking names
Public name

ShinyHunters

The name used in public claims, leak-site posts, and ransom messages. It is the name most victims and readers will recognize.

public claimsransom
Google tracking name

UNC6040

Google uses this name for voice-phishing activity that targets Salesforce access and data exports.

phone scamsSalesforce
Google tracking name

UNC6240

Google uses this name for ransom activity after data theft, including messages that claim to be from ShinyHunters.

ransomleak site
Jan 2026

UNC6661

A January 2026 activity set involving phone calls, fake login pages, SSO credentials, MFA codes, and cloud-app access.

SSOMFA
Jan 2026

UNC6671

A similar January 2026 activity set that Google tracks separately because the infrastructure and ransom details differed.

separate casephone scams

The name ShinyHunters matters because it appears in public threats. The UNC names matter because they help defenders understand the access method: phone scams, fake login pages, app approvals, data exports, or ransom messages. Google

This article keeps those facts separate. Public claims explain what the attackers said. Google tracking names explain observed activity. Vendor statements explain what has been confirmed.

How the Attacks Work

A Stolen Login Can Be Enough

Common cloud-extortion chain

From phone call to ransom demand
1

Impersonate support

Attackers call as IT, help desk, or vendor support and create urgency around MFA, access, or account changes.

2

Capture identity

They collect SSO credentials and MFA codes, enroll a device, or get the user to approve a malicious app.

3

Reach cloud data

The stolen session opens Salesforce, Microsoft 365, Google Workspace, Slack, or other cloud applications.

4

Export records

Attackers use exports, APIs, connected apps, scripts, or misconfigured public portals to copy data.

5

Demand payment

Leak-site posts, emails, texts, harassment, outage threats, or defacements push the victim toward negotiation.

Google's January 2026 reporting describes attackers pretending to be IT staff, sending employees to fake company login pages, and capturing SSO credentials plus MFA codes. The stolen cloud session becomes the access path. Jan 2026

Salesforce-specific reporting shows the same kind of attack in another setting: a phone call, an approved app or export tool, and bulk access to business data. UNC6040

Cloud Data

The Data Is Already in the Apps

What attackers look for

Cloud systems mentioned in reporting
Salesforce

Customer records

Data Loader, malicious connected apps, Experience Cloud, and Aura access all relate to Salesforce data theft.

CRM records
Microsoft 365

Files and searches

Google observed document access, SharePoint downloads, and searches for strings such as confidential, internal, proposal, Salesforce, and VPN.

Documents and searches
Google Workspace

Mail and OAuth

OAuth authorizations and deleted MFA enrollment emails show how attackers can use normal collaboration tools.

Mail and app access
Canvas

Education identity

Names, emails, student IDs, messages, and enrollment context turn a classroom platform into a privacy and phishing risk.

Student and staff data
Integrations

Tokens and APIs

Snowflake and Salesforce-linked incidents show why third-party cloud integrations can expose data through tokens and APIs.

Token and API access

These attacks work because important records already live inside cloud applications. A customer database and a classroom platform hold different information, but both can create real harm when copied. Aura CyberScoop

The Canvas incident belongs beside the Salesforce cases as a comparison, not as a confirmed linked campaign. Both show the same risk: one account or app permission can expose a large store of records.

Defensive Takeaways

What Organizations Should Check

01

Verify the caller before changing identity state.

MFA resets, device enrollments, app approvals, and vendor-support requests should require a second verification step through a trusted channel.

02

Treat cloud apps like major databases.

Audit connected apps, guest profiles, API permissions, OAuth grants, data exports, and public portals. Business applications need logs and alerts.

03

Look for signs before the ransom note.

Watch for bulk exports, unusual user agents, deleted MFA emails, new app approvals, leak-site outreach, employee harassment, and defacement attempts.

Mandiant's hardening guidance is clear on identity checks: caller-provided facts, public data, and easy identifiers are weak proof when someone asks to change account access. Hardening

Detection should reach beyond malware alerts. The important traces often live in identity-provider events, cloud-app audit logs, API activity, export patterns, and help-desk workflows.

Source Record

What Is Confirmed, Claimed, and Tracked

Jun 4, 2025
Core analytic source

The Cost of a Call: From Voice Phishing to Data Extortion

Google baseline on UNC6040, Salesforce phone scams, Data Loader / custom app abuse, and UNC6240 ransom messages claiming ShinyHunters.

Sep 30, 2025
Defensive source

UNC6040 Proactive Hardening Recommendations

Control guidance for identity checks, cloud-app settings, programmatic credentials, and logging.

Jan 30, 2026
Core analytic source

Vishing for Access: Tracking the Expansion of ShinyHunters-Branded SaaS Data Theft

Google's expansion report covering UNC6661, UNC6671, UNC6240, cloud-app targeting, harassment, and leak-site threats.

Mar 9, 2026
Salesforce context

ShinyHunters claims ongoing Salesforce Aura data theft attacks

Context on Experience Cloud / Aura exposure and attacker claims around public-facing Salesforce sites.

Mar 11, 2026
Salesforce context

Salesforce issues new security alert tied to third customer attack spree in six months

Frames the campaign as another Salesforce customer attack wave associated with ShinyHunters-linked activity.

May 4, 2026
Canvas context

Edtech Firm Instructure Discloses Data Breach Amid Hacker Leak Threats

Early summary of confirmed data categories, containment steps, and ShinyHunters' attacker-claimed scale.

May 5, 2026
Attacker claim layer

Instructure hacker claims data theft from 8,800 schools, universities

Documents the claimed affected-institution list and attacker explanation of export/API access paths.

May 7, 2026
Canvas defacement

Canvas login portals hacked in mass ShinyHunters extortion campaign

Defacement phase, May 12 deadline, and extortion escalation against educational institutions.

May 7, 2026
Canvas follow-up

Hackers deface school login pages after claiming another Instructure hack

Includes Instructure spokesperson comments on Canvas being taken offline and the Free-For-Teacher account issue.

May 8, 2026
Service restoration

A Canvas outage tied to a cyberattack has wreaked havoc on colleges' final exam season

Same-day AP update: Canvas was available again for most users, some schools kept access blocked, and Instructure/Canvas no longer appeared on ShinyHunters' target site.

May 7-8, 2026
Mainstream hook

Canvas is online again after ShinyHunters threaten to leak schools' data

Restoration framing and current-news summary of the Canvas outage and extortion message.

Publication Note

OPTIC corpus use and current-news caveats

This article combines current reporting with local OPTIC extraction files, especially `extraction_results/expansion-shinyhunters-saas-data-theft.json` and the Mandiant normalized records for UNC6040, Salesforce data theft, Aura exposure, and Snowflake-style cloud extortion. The public Postgres snapshot in `opticlab/release-assets/optic-postgres-2026-04-07.dump` predates the May 2026 Canvas incident, so Canvas sits in the current-news section outside the April 7 database snapshot.

Confirmed facts

Use vendor statements and reputable reporting for data categories, service status, and containment actions.

Attacker claims

Scale numbers, school counts, and theft mechanics should stay explicitly labeled unless independently confirmed.

Google tracking names

Use UNC names when describing specific activity. Use ShinyHunters when describing public claims and ransom messages.

Current-news caveat

This story may need updates after the May 12 deadline, leak-site changes, or any final Instructure incident report.