ShinyHunters claims St. Petersburg College data breach affecting student and staff accounts

UpGuard Team
UpGuard Team
May 8, 2026

Key facts: St. Petersburg College data breach

  • Date occurred: May 2026
  • Date reported: May 7, 2026
  • Target entity: St. Petersburg College
  • Source of breach: Ransomware group ShinyHunters
  • Data types: Basic user details, student and staff account information
  • Status: Confirmed; reported on May 7, 2026.
  • Severity: Medium; exposure of basic user details poses risks of phishing and targeted social engineering.

What happened in the St. Petersburg College data breach?

St. Petersburg College was identified as one of the institutions impacted by a data breach involving the Instructure Canvas learning management system. The incident, which affected multiple educational organizations in Florida, was publicly reported on May 7, 2026. The threat actor group known as ShinyHunters has been linked to the attack, which targeted the digital infrastructure supporting student and staff accounts.

According to initial reports, the breach compromised account details within the Canvas platform used by Hillsborough and Pinellas county schools. While officials stated that only basic user details were taken, the incident is classified as medium severity due to the potential for the stolen information to be used in secondary attacks. The breach likely involved unauthorized access to user databases or administrative interfaces. Such incidents typically lead to increased risks of identity spoofing or unauthorized access to internal educational resources.

Who is behind the incident?

ShinyHunters is a well-known cybercriminal collective that has been active since at least 2020. The group is notorious for targeting large-scale databases and high-profile companies, often leaking stolen data on underground forums or attempting to extort victims. They typically focus on cloud-based services and third-party platforms to maximize the volume of compromised records. Their methods often involve credential stuffing or exploiting vulnerabilities in web applications. ShinyHunters has previously targeted major tech firms and service providers globally, establishing a reputation for significant data exfiltration campaigns.

Impact and risks for St. Petersburg College customers

For students and staff at St. Petersburg College, the primary risk involves the potential misuse of basic account information. Although financial data was not explicitly mentioned, the exposure of names and account details can facilitate sophisticated phishing campaigns and social engineering attacks. Malicious actors may use this information to craft convincing messages designed to solicit further sensitive data or login credentials from affected individuals.

Typical outcomes of such breaches include credential harvesting and unauthorized access to other linked services. Affected users should immediately update their passwords and remain vigilant for any unusual account activity. Educational institutions must also monitor for secondary attacks that leverage the stolen information to penetrate deeper into the school's network. Maintaining transparency during the recovery process helps users take timely protective actions.

How to protect against similar security incidents

Following the breach at St. Petersburg College involving Canvas account data, users should take immediate steps to secure their digital identities and institutional access.

  • Implement phishing-resistant multi-factor authentication. Enable MFA on all school-related accounts to prevent unauthorized access even if credentials are stolen. Prioritize hardware keys or authenticator apps over SMS-based codes for better security.
  • Update credentials and use password managers. Change passwords for Canvas and any other accounts that share similar login details. Use a dedicated password manager to generate and store unique, complex passwords for every service.
  • Monitor for social engineering attempts. Be wary of unsolicited emails or messages claiming to be from St. Petersburg College or Instructure. Verify the sender's identity before clicking links or downloading attachments related to the breach.
  • Continuous attack surface management. The institution should deploy continuous monitoring tools to identify exposed assets and third-party risks. Regularly audit third-party vendor permissions to ensure the principle of least privilege is maintained.

Proactive security hygiene is the most effective defense against the secondary effects of a data breach.

Frequently asked questions

What happened in the St. Petersburg College security breach?

ShinyHunters claimed responsibility for a large-scale supply chain attack on the learning management system Canvas by Instructure, impacting St. Petersburg College (spcollege.edu) in May 2026. The incident was first reported on May 7, 2026.

When did the St. Petersburg College breach occur?

The St. Petersburg College breach was publicly reported on May 7, 2026. ShinyHunters referenced the incident around that time, but the attack may have occurred earlier.

What data was exposed?

The types of data involved in the St. Petersburg College incident include basic user details for student and staff accounts. ShinyHunters has not provided evidence of more sensitive financial or medical categories.

Is my personal information at risk?

If you interacted with St. Petersburg College, there's a possibility your personal information could be affected. Similar incidents often involve email addresses, login details, or institutional records. Stay alert for updates and take precautionary measures to secure your accounts.

What steps should companies take after being breached?

St. Petersburg College is expected to secure impacted systems, notify affected parties, and provide guidance on protective actions. They will likely review security measures with third-party vendors like Instructure and deploy enhanced attack surface management.

This cybersecurity news article is powered by UpGuard Breach Risk — continuous attack surface monitoring for your organisation and supply chain.

How secure is ?

  • Check icon
    View our free preliminary report on ’s security posture
  • Check icon
    13 risk factors, including email security, SSL, DNS health, open ports and common vulnerabilities
Security ratings
Deliver icon

Sign up for our newsletter

UpGuard's monthly newsletter cuts through the noise and brings you what matters most: our breaking research, in-depth analysis of emerging threats, and actionable strategic insights.
UpGuard customer support teamUpGuard customer support teamUpGuard customer support team

Protect your organization

Get in touch or book a free demo.
Free instant security score

How secure is your organization?

Request a free cybersecurity report to discover key risks on your website, email, network, and brand.
  • Check icon
    Instant insights you can act on immediately
  • Check icon
    Hundreds of risk factors including email security, SSL, DNS health, open ports and common vulnerabilities
Website Security scan resultsWebsite Security scan rating