The group that is responsible for the 2026 Canvas breach is:
ShinyHunters
Hackers stole credit card data from millions of holiday shoppers at this retailer in 2013
Target
The general term for any software designed to harm or gain unauthorized access to a system
Malware
Someone sends an email pretending to be someone you trust
Phishing
This attack tries every possible password until the hacker finds the right one
Brute Force Attack
A type of attack that demands money to prevent stolen data from being released
Ransomware / Extortion
This social media company had 87 million users' data harvested without consent by a political consulting firm
This login method requires you to verify your identity in 2 different ways
2FA
A phishing attack aimed at one specific high-profile target, like a CEO
Spear Phishing
This type of malicious code is hidden inside a normal-looking program to trick you into running it
Trojan Horse
This company owns Canvas
Instructure
ShinyHunters previously breached this live music and ticketing giant, exposing 560 million customers' data
Ticketmaster
This attack floods a server with so much traffic that it crashes and goes offline
DDoS Attack
An attacker leaves a malware-loaded USB in a parking lot, hoping someone plugs it into their computer. This is called:
Baiting
This software secretly records every key you type to steal passwords
Keylogger
This was the deadline given for when the ransom had to be paid before the data was leaked (hint, it's a specific date)
Before May 12th
In 2013, this search engine had all 3 billion of its user accounts compromised
Yahoo
A network of secretly infected computers, all controlled by one hacker
Botnet
ShinyHunters used this phone-based trick to breach Instructure's systems
Vishing (Voice Phishing)
Scanning a network to find open ports that might be vulnerable is called this:
Port Scanning
Beyond names and emails, hackers stole the students' communications - including sensitive messages about mental health and medical issues. What is the term for what was stolen?
Private Messages
This credit reporting agency exposed the Social Security numbers of 147 million Americans in 2017
Equifax
When a hacker secretly intercepts messages between 2 people without either of them knowing
Man-in-the-Middle Attack
A hacker pretends to be IT support to get an employee's password. This technique is called:
Pretexting
This type of attack exploits a software vulnerability that the developer doesn't know about yet, giving hackers a head start before any patch exists. This is called a:
Zero-Day Attack