ShinyHunters claims Utah data breach affecting student personal information

UpGuard Team
UpGuard Team
May 8, 2026

Key facts: Utah data breach

  • Date reported: May 6, 2026
  • Target entity: Utah
  • Source of breach: Threat actor group ShinyHunters
  • Data types: Names, email addresses, student ID numbers, messages
  • Status: Confirmed; reported on May 6, 2026.
  • Severity: Medium; the exposure of student identifiers and personal communications increases the risk of targeted phishing and social engineering attacks.

What happened in the Utah data breach?

The Utah State Board of Education (utah.gov) was impacted by a significant data breach involving the Canvas learning management system, which was publicly reported on May 6, 2026. The incident has been attributed to the threat actor group known as ShinyHunters. The Utah State Board of Education confirmed that the tool is used extensively across schools in the state, leading to the potential compromise of millions of users' personal information.

According to reports, the breach exposed names, email addresses, student ID numbers, and personal messages sent through the platform. While sensitive data such as Social Security numbers, passwords, and financial information were not compromised, the scale of the incident is substantial. The breach is classified as medium severity due to the exposure of personally identifiable information (PII) and private conversations. Such incidents often lead to heightened risks of identity theft and targeted phishing campaigns.

Who is behind the incident?

The threat actor group ShinyHunters has claimed responsibility for the attack. ShinyHunters is a well-known cybercriminal collective that has been active since at least 2020, specializing in the theft and sale of large-scale databases. The group often targets cloud-based services and third-party platforms to exfiltrate user data. In this specific campaign, the group claimed to have affected nearly 9,000 schools worldwide, allegedly impacting the data of 275 million individuals, including personal conversations and other PII stored within the Canvas ecosystem.

Impact and risks for Utah customers

For students, parents, and educators in Utah, the exposure of names, email addresses, and student ID numbers presents a credible risk of identity-based fraud. Attackers may use this information to conduct highly targeted phishing attacks, masquerading as school officials to solicit further sensitive data. The compromise of personal messages also introduces significant privacy risks, as private conversations could be exploited for social engineering or harassment.

Typically, victims of such breaches should monitor their accounts for any unauthorized activity. Recommended protective actions include enabling multi-factor authentication on all educational accounts, being skeptical of unsolicited communications, and utilizing password managers to maintain unique credentials. Transparency regarding the scope of the breach is essential for helping the affected community take appropriate defensive measures.

How to protect against similar security incidents

Following the data breach involving student information at Utah through the Canvas platform, users should take immediate steps to secure their accounts and monitor for potential phishing attempts.

  • Enhance email security and phishing awareness. Be extremely cautious of unsolicited emails that appear to come from school administrators or Canvas. Avoid clicking on links or downloading attachments from unverified senders. Verify the legitimacy of any requests for personal information through official school channels.
  • Implement phishing-resistant multi-factor authentication. Enable multi-factor authentication (MFA) on all educational and personal accounts where available. Use authenticator apps or hardware security keys rather than SMS-based codes for better protection. Ensure that student portals are secured with strong, unique passwords that are not reused elsewhere.
  • Monitor for unauthorized account activity. Regularly review login logs and account activity for student and staff portals. Report any suspicious messages or unexplained changes to account settings to the school IT department immediately. Keep software and security applications updated to the latest versions to protect against known vulnerabilities.
  • Utilize attack surface management. Educational institutions should deploy continuous monitoring tools to identify vulnerabilities in third-party software. Regularly audit the security permissions of integrated learning management systems. Ensure that all third-party vendors comply with robust data protection standards.

Proactive security measures and constant vigilance are the most effective ways to mitigate the risks associated with third-party data breaches.

Frequently asked questions

What happened in the Utah security breach?

ShinyHunters claimed responsibility for a security attack on Utah (utah.gov) in May 2026. The incident was first reported on May 6, 2026.

When did the Utah breach occur?

The Utah breach was publicly reported on May 6, 2026. ShinyHunters referenced the incident around that time, but the attack may have occurred earlier.

What data was exposed?

The types of data involved in the Utah incident include names, email addresses, student ID numbers, and platform messages. Financial information, dates of birth, and passwords were not compromised.

Is my personal information at risk?

If you interacted with Utah or used the Canvas platform, there's a possibility your personal information could be affected. Similar incidents often involve email addresses and student identifiers being used for phishing. Stay alert for updates and take precautionary measures to secure your accounts.

What steps should companies take after being breached?

The Utah State Board of Education is investigating the incident, working to secure systems, and providing guidance on protective actions. They have also reviewed the security measures of the third-party tool involved in the breach.

This cybersecurity news article is powered by UpGuard Breach Risk — continuous attack surface monitoring for your organisation and supply chain.

How secure is ?

  • Check icon
    View our free preliminary report on ’s security posture
  • Check icon
    13 risk factors, including email security, SSL, DNS health, open ports and common vulnerabilities
Security ratings
Deliver icon

Sign up for our newsletter

UpGuard's monthly newsletter cuts through the noise and brings you what matters most: our breaking research, in-depth analysis of emerging threats, and actionable strategic insights.

Latest news

Stay up-to-date with the latest news in cybersecurity.
UpGuard customer support teamUpGuard customer support teamUpGuard customer support team

Protect your organization

Get in touch or book a free demo.
Free instant security score

How secure is your organization?

Request a free cybersecurity report to discover key risks on your website, email, network, and brand.
  • Check icon
    Instant insights you can act on immediately
  • Check icon
    Hundreds of risk factors including email security, SSL, DNS health, open ports and common vulnerabilities
Website Security scan resultsWebsite Security scan rating