Cybersecurity1 hr ago

Instructure Pays Hackers to Delete Stolen Canvas Data, Experts Warn Payment Doesn’t End Threat

Instructure agreed to pay hackers to delete stolen Canvas data; experts say payment does not end the threat as stolen data can still be exploited. Details on impact, response, and defenses.

Peter Olaleru/3 min/NG

Cybersecurity Editor

TweetLinkedIn
Instructure Pays Hackers to Delete Stolen Canvas Data, Experts Warn Payment Doesn’t End Threat
Source: Spectrumnews1Original source

Instructure agreed to pay hackers to delete stolen Canvas data, but experts warn the payment does not end the risk. The deal followed a ransom demand from ShinyHunters, who claimed access to records from about 9,000 schools and 275 million individuals.

Context

Instructure took its Canvas learning management system offline last week after detecting unauthorized access. The disruption locked out students and faculty during finals week, affecting institutions across the United States, including several Kentucky schools. The company said it worked with forensic vendors to investigate the breach and later announced it had received digital confirmation that the hackers destroyed copies of the data.

Key Facts

ShinyHunters claimed responsibility and said the breach exposed data from roughly 9,000 schools and 275 million people, demanding payment by May 6. Instructure confirmed it reached an agreement with the unauthorized actor, though it did not disclose payment details. Cybersecurity experts note that paying hackers does not guarantee data deletion, as stolen information can remain profitable for fraud or extortion.

What It Means

The incident shows that even when a victim obtains assurances of data destruction, the underlying risk persists because the data may have already been copied or sold. Educational institutions relying on Canvas should assume that exposed identifiers such as names, email addresses, and student IDs could be used in phishing or credential‑stuffing attacks. The breach also highlights the growing trend of ransom groups targeting education sectors for large‑scale data sets.

Mitigations

Organizations should reset passwords for any Canvas accounts and enforce multi‑factor authentication where possible. Monitor for phishing attempts that use leaked names and email addresses, and implement email authentication controls such as DMARC, SPF, and DKIM.

Review access logs for unusual authentication attempts (MITRE ATT&CK T1078 – Valid Accounts) and consider blocking known malicious IP addresses associated with ShinyHunters. Apply the latest security patches for Canvas and related integrations, and conduct regular tabletop exercises focused on ransomware response.

Watch for any resale of the exposed data on underground markets and for further extortion attempts targeting educational institutions.

TweetLinkedIn

More in this thread

Reader notes

Loading comments...