Responding to a Learning Management System Data Breach: A Step-by-Step Guide for Schools and Universities

By • min read

Overview

In early May 2025, the education technology platform Canvas, used by thousands of schools and universities worldwide, suffered a severe data breach and defacement attack orchestrated by the cybercrime group ShinyHunters. The attackers accessed and threatened to leak data from over 275 million students and faculty across nearly 9,000 institutions. They defaced the login page with a ransom demand, causing widespread disruption during final exam periods. This guide walks you through understanding the incident, responding to a similar breach in your own LMS, and implementing preventive measures. The goal is to help IT administrators, school leaders, and cybersecurity teams navigate such crises with clarity and confidence.

Responding to a Learning Management System Data Breach: A Step-by-Step Guide for Schools and Universities
Source: krebsonsecurity.com

Prerequisites

Before you begin, ensure you have the following:

Step-by-Step Instructions

Step 1: Identify and Confirm the Breach

The first sign of a breach may come from unusual system behavior, such as a defaced login page or ransom demand (as seen in the Canvas incident). To confirm:

  1. Check your LMS login portal from multiple networks (internal and external). If you see unauthorized messages, take screenshots immediately.
  2. Review security logs and alerts from your SIEM or monitoring tools. Look for unauthorized access patterns, especially from known malicious IPs or unusual geographic locations.
  3. Communicate with your IT team to ensure no one else triggered the change. Verify that the service is truly compromised, not just a misconfiguration.

Step 2: Isolate Affected Systems

To prevent further damage, quickly isolate the compromised LMS from the network. In the Canvas breach, Instructure disabled the platform entirely and replaced it with a maintenance message. Follow similar steps:

  1. Take the LMS offline by disabling public access (e.g., edit DNS records, disable web server). Use a temporary static page to inform users without revealing breach details.
  2. Disconnect the LMS from integrated systems (e.g., student information systems, email services) to prevent lateral movement.
  3. Capture forensic data before restarting: preserve logs, memory dumps, and disk images. Do not power down the system until you’ve collected evidence.

Step 3: Assess the Scope of Data Exposure

Determine what data was accessed and exfiltrated. According to Instructure’s investigation, the stolen data included names, email addresses, student IDs, and messages — but not passwords, dates of birth, or financial data. To assess your own breach:

  1. Search for indicators of compromise (IOCs) like unusual file accesses or large outbound data transfers. Use tools like Wireshark or your firewall logs.
  2. Scan for known attacker signatures (e.g., ShinyHunters’ typical tools) using threat intelligence feeds.
  3. Engage a third-party forensics team if your institution lacks in-house expertise. They can help identify the exact records impacted.

Step 4: Notify Relevant Stakeholders

Timely communication is critical. In the Canvas incident, the company issued a statement on May 6, then updated later during the defacement. Your notification should follow a structured path:

  1. Internal notification — Alert your executive team, legal counsel, and IT incident response group. Use a secure channel (e.g., Signal, encrypted email).
  2. Law enforcement reporting — Contact local cybercrime units and the FBI IC3 (if in the US). Provide all collected evidence.
  3. Affected user notification — Once the scope is clear, inform students and faculty via email or a dedicated webpage. Be transparent about the data types compromised (e.g., names and messages, but not SSNs).
  4. Media and regulators — If required by law (e.g., GDPR, state breach notification laws), issue a public statement. Use the same timeline as Instructure: acknowledge the breach, state containment measures, and provide updates.

Step 5: Implement Mitigation and Recovery

After containing the breach, restore services securely. Instructure’s approach—pulling the platform offline, then restoring with a maintenance message—can be adapted:

Responding to a Learning Management System Data Breach: A Step-by-Step Guide for Schools and Universities
Source: krebsonsecurity.com
  1. Patch the vulnerability that allowed the breach (e.g., SQL injection, weak API keys). Work with your vendor if it’s a software flaw.
  2. Reset passwords and force MFA for all affected users. Canvas data did not include passwords, but assume they could be derived.
  3. Restore from a clean backup taken before the compromise. Verify integrity.
  4. Bring the LMS back online gradually — start with a limited user group to test security.
  5. Monitor for residual attacker activity for at least 30 days post-restoration.

Step 6: Long-Term Prevention

Prevent future breaches by strengthening your LMS security posture:

Common Mistakes and How to Avoid Them

Summary

The Canvas breach by ShinyHunters exposed millions of student records and caused severe disruption during exams. By following this guide—identifying the breach, isolating systems, assessing data impact, notifying stakeholders, and implementing recovery steps—you can respond effectively to a similar LMS compromise. Remember: rapid containment, transparent communication, and long-term prevention are key. Stay vigilant, and update your incident response plans based on lessons from this attack.

Recommended

Discover More

AWS Sunset Decisions: WorkMail Ends, App Runner in MaintenanceMastering Google Maps: A Step-by-Step Guide to Overcoming Its Hidden FlawState’s First Integrated Hydrogen and Ammonia Facility Breaks Ground, Promising Relief for Local AgricultureYour Ultimate HBO Max Guide: Top Picks for a Productive Work Week (May 5–10)Decoding the Hidden Switch: How a Small RNA Determines Vibrio cholerae's Ability to Infect Humans