8 May 2026

7 min read

Global impact following Canvas system breach | Cyber Intelligence Briefing – 8 May 2026

May 2026
Global impact following Canvas system breach | Cyber Intelligence Briefing – 8 May 2026 placeholder thumbnail

Top news stories this week

  1. Grade A breach.  Global impact following Canvas learning management system breach. 
  2. Critical warning.  Multiple vulnerabilities announced impacting Linux, MOVEit file transfer, Palo Alto firewall, and Apache HTTP server. 
  3. Loco-motivated. Taiwanese hacker triggers emergency brakes on high-speed rail network.
  4. Ad‑versaries. Top search results lead to backdoors and breaches in recent campaigns.  
  5. From leaks to locks. Ransomware negotiator sentenced to lengthy prison sentence. 
  6. Double trouble. Two ransomware groups claim Cushman & Wakefield as victim.

1. Global impact following Canvas learning management system breach 

Instructure, the developer of the Canvas learning management system, confirmed a data breach after the extortion group ShinyHunters added the company to its leak site and defaced Canvas login pages with a ransom note. ShinyHunters has claimed the breach affects a dataset covering 275 million individuals and nearly 9,000 schools worldwide and has threatened to release data on 12 May.

So what?

Organisations using the Canvas system should engage specialist support to determine their risk exposure and set up monitoring for data leaks.

[Researcher: Milda Petraityte]  


2. Palo Alto, Progress Software, Linux and Apache respond to security flaws 

Palo Alto is urging customers to restrict access or disable use of the User-ID Authentication service following the discovery of a critical zero day vulnerability (CVE-2026-0300). Until a patch is developed over 5,800 PAN-OS VM-series firewalls are potentially exposed.  

Separately, researchers have uncovered a new ‘Copy Fail’ vulnerability (CVE-2026-31431) which enables privilege escalation on most Linux distributions. Progress Software also disclosed new security flaws (CVE-2026-4670 and CVE-2026-5174) which affect the MOVEit automation tool and allow for unauthorised access.  

Additionally, Apache released security updates to address the critical HTTP/2 vulnerability (CVE-2026-23918) which could lead to remote code. 

So what?

It is crucial to have a robust patching program in place as AI accelerates the discovery of vulnerabilities. Ensuring there is a defined and implemented process for vulnerability identification, remediation, and tracking reduces the likelihood of compromise via unpatched systems. 

[Researcher: Adelaide Parker]  


3. Taiwanese hacker triggers emergency brakes on high-speed rail system 

A Taiwanese student has been arrested for triggering the emergency brakes on trains servicing Taiwan’s high-speed rail network. The individual purchased commercially available radio equipment, which he used to broadcast a “high-priority” general alert, halting all the trains. A subsequent investigation revealed that the signalling protocol for this alert had not been rotated for nearly 20 years. 

So what?

This incident demonstrates how operational negligence can inadvertently create an attack surface. Critical equipment which pre-date modern security standards and frameworks should be reviewed for legacy protocols. 

[Researcher: Lester Lim]


New call-to-action

 

4. Top search results lead to backdoors and breaches in recent campaigns 

Threat actors are abusing sponsored search results and trusted brands to deliver malware and steal credentials. A fake Claude AI site was recently discovered that deploys backdoor malware.  

Separately, malicious Google Ads are being used to direct users to fake login pages that capture credentials and 2FA codes for website management sites.  

SO WHAT? 

Top search results and sponsored ads cannot be trusted by default. Users should always verify they are on a legitimate domain before downloading software or entering credentials, and avoid relying on search results alone.

[Researcher: Jenny Eysert]


5. Ransomware negotiator sentenced to lengthy prison sentence.

A Latvian member of the prominent Karakurt extortion gang who was extradited from Georgia, Eastern Europe, has been given an 8.5-year prison term in the US. Deniss Zolotarjovs, operating online as "Sforza_cesarini", acted as a ransomware negotiator for Karakurt, who are believed to have blackmailed organisations out of hundreds of millions of dollars

So What?

Extradition is a threat for high-profile ransomware operators.   

[Researcher: Jack Woods]

 New call-to-action 


6. Two ransomware groups claim Cushman & Wakefield as victim

ShinyHunters and Qilin both claim to have breached real estate giant Cushman & Wakefield (C&W). ShinyHunters claimed to have stolen over 500,000 Salesforce records containing PII and internal corporate data, while Qilin has also added C&W to its own leak site, but without providing further information. There is no known link between the two groups. C&W has confirmed a "limited" data security incident caused by a vishing attack.  

SO WHAT? 

Being claimed by two unrelated actors forces defenders to run parallel workstreams to assess credibility and manage competing extortion timelines without losing message consistency to regulators, customers and staff. 

[Researcher: Ayo Olayinka]

SUBSCRIBE TO RECEIVE OUR WEEKLY CYBER THREAT INTELLIGENCE BRIEFING VIA EMAIL

The S-RM Cyber Intelligence Briefing is a weekly round-up of the latest cyber security news, trends, and indicators, curated by our intelligence specialists.

To discuss this briefing or other industry developments, please reach out to one of our experts.

Editors

Share this post

Subscribe to our insights

Get industry news and expert insights straight to your inbox.