Forgot your password?
typodupeerror
Crime Security The Almighty Buck Education

Instructure Pays Canvas Hackers To Delete Students' Stolen Data (bbc.com) 83

Instructure, the company behind the widely used Canvas learning platform, says it reached an agreement with the hackers who stole 3.5 terabytes of student and university data. The company says it received "digital confirmation" that the information was destroyed and that affected schools and students would not be extorted. The BBC reports: Paying cyber criminals goes against the advice of law enforcement agencies around the world, as it can fuel further attacks and offers no guarantee the data has been deleted. In previous cases, criminals have accepted ransom payments but lied about destroying stolen data, instead keeping it for resale. For example, when the notorious LockBit ransomware group was hacked by the National Crime Agency, police found stolen data had not been deleted even after payments had been made.

Instructure said in a statement on its website that protecting students' and education staff data was its primary motivation. "While there is never complete certainty when dealing with cyber criminals, we believe it was important to take every step within our control to give customers additional peace of mind, to the extent possible," the company said. Instructure did not set out the terms of the agreement but said that it meant that:
- the data was returned to the company
- it received "digital confirmation of data destruction"
- it had been informed that no Instructure customers would be extorted as a result of the incident
- the agreement covers all affected customers, with no need for individuals to engage with the hackers

Instructure Pays Canvas Hackers To Delete Students' Stolen Data

Comments Filter:
  • by Locke2005 ( 849178 ) on Tuesday May 12, 2026 @06:02PM (#66140673)
    Personally, I subscribe to the 'Shoot the hostage" school of negotiating with criminals.
    • by Anonymous Coward
      I rather liked RoboCop's "shoot 'em in the balls" negotiation tactic.
    • Pop quiz, hotshot... oh shit, Canvas leaked all the quiz answers. Nevermind.

    • by AmiMoJo ( 196126 )

      They can't win. If they don't pay they get sued by students for not securing their data. If they do pay they encourage further attacks.

      The time to win was before the hack. Now all they can do is pay, and hope they picked the cheaper option.

      • by Anonymous Coward

        theyre getting sued either way dum dum.

    • by mjwx ( 966435 )

      Personally, I subscribe to the 'Shoot the hostage" school of negotiating with criminals.

      In this scenario, the hostage is the company who's data was stolen... the data is the gun being held to their head and the victims are the people identifiable by the data.

      Your negotiation strategy would kill both the hostage and irreparably harm the victims.

      A better strategy is to ensure that your dangerous gun is kept secure and away from children. Prevention is always better than cure.

    • Pretty sure you were going for Funny, but it's too dark and there are too many hostages in this situation.

      However I do think it's hilarious for them to believe the blackmailers didn't keep a backup copy. Also funny that they are involved in education and don't seem to understand the lesson to be learned here.

      Need some kind of anti-funny mod for the responses of the various police authorities, though in a sense it's hard to blame them. We are in a time of perfect crime. There should be a joke in here about "

  • SUCKERS (Score:5, Insightful)

    by JustAnotherOldGuy ( 4145623 ) on Tuesday May 12, 2026 @06:02PM (#66140675) Journal

    Sure they deleted it. Now, how long before the 'deleted data' starts showing up elsewhere? Any guesses?

    • Re:SUCKERS (Score:5, Funny)

      by pegr ( 46683 ) on Tuesday May 12, 2026 @06:46PM (#66140733) Homepage Journal

      But they have digital confirmation!

    • I agree with the sentiment but when the encryption viruses were the hot new thing my understanding was that they were actually pretty professional about selling the decryption key to incentivize people to just pay up instead of figuring out how to restore everything. Since these are organized criminals these days they run it like a business. A script kiddie might leak it for lulz but some Russian gang wants to be sure that they get paid by the next company they hack, so they want them to get what they pai
  • Hahaha (Score:5, Interesting)

    by liqu1d ( 4349325 ) on Tuesday May 12, 2026 @06:05PM (#66140681)
    I have deleted the data but you didn't pay to delete the backup
  • by Pseudonymous Powers ( 4097097 ) on Tuesday May 12, 2026 @06:12PM (#66140691)

    'The company says it received "digital confirmation" that the information was destroyed and that affected schools and students would not be extorted. The BBC reports.'

    For a company that makes education software, they sure must think their customers and users are pretty stupid.

    • by 93 Escort Wagon ( 326346 ) on Tuesday May 12, 2026 @06:50PM (#66140735)

      Well, odds are the people in charge at Instructure are relatively stupid themselves. It's like the old Sherlock Holmes quote: "Mediocrity knows nothing higher than itself" - the Instructure leadership probably can't fathom how anyone smarter than them could exist.

      Given how people keep stupidly paying these ransoms... maybe it's time to criminalize that act.

    • If they weren't they wouldn't buy their shit, so they KNOW they're stupid

    • Users get a pass! Functionality and security were not the drivers in the selection process. Users are trapped because the school administrators and school boards chose the educational product they received the biggest kick backs on.
      • I doubt the Canvas people are bribing educators and education administrators.

        The truth is likely far more banal: Canvas is one of those "crappy but checks the boxes" products, like Jira or Slack. In other words, it's a "no one ever got fired for buying IBM" kind of product.

    • For a company that makes education management software, people sure do assume they give a shit how stupid their customers turn out to be.

      FTFY.

    • by dwywit ( 1109409 )

      I think it's in the hackers' best interests to be honest about this.

      If they aren't, and release the data publicly or sell it, or release it in any form after promising to delete it, it tells the world that they can't be trusted, and future ransom demands with promises to delete the data won't be worth the electrons carrying said promises.

      They've proved themselves clever enough to crack the security on a relatively secure and trusted platform. They will be looking for the next platform to crack as we speak.

  • by david.emery ( 127135 ) on Tuesday May 12, 2026 @06:13PM (#66140693)

    I repeat my call for legal liability for companies that sell products or services with errors, including security vulnerabilities.

    • I repeat my call for legal liability for companies that sell products or services with errors, including security vulnerabilities.

      Sure. Right after we start the mandatory IT competency test for every new employee that validates the problem isn’t still manifesting in the form of the iPad Generation of touchscreen mouth-breathers who thoroughly enjoy defending their uncensored right to click on every-fucking-thing shoved in front of their face no matter how senseless it is.

      No software vulnerability has managed to defeat THE security vulnerability in the workplace. Not one.

  • This is Bad (Score:5, Insightful)

    by battingly ( 5065477 ) on Tuesday May 12, 2026 @06:19PM (#66140707)

    This all but guarantees an increase in ransomware attacks. There won't be any increase in defense against these kinds of attacks because it's easier and cheaper to pay the ransom. The losers here will be the users because of all the downtime and there will inevitably be leaks anyway.

    Paying the ransom is reprehensible since it will cause so much pain for other people in the future, and should be illegal.

    • I think there's a deeper story here.

      I ended up teaching at two colleges I previously attended. In both cases when I was granted Canvas access I came across everything from my previous enrollment, years later. I was able to find the very first messages and activities I submitted in Canvas my first week of college. Instructor hordes data it really should just delete. Consequently, I suspect Instructor paid the ransom because they know the breach exposed data of not just current students and faculty, but all p

  • Paying just makes them look bad twice, the first time was losing the data.. Now they just supported ransomware attacks to increase.
  • The next major ransomware victims will sue Instructure for encouraging ransomware attacks.

  • I mean, if you can't trust criminals, who can you trust?!?
  • "We never pay any-one Dane-geld,
    No matter how trifling the cost;
    For the end of that game is oppression and shame,
    And the nation that plays it is lost!"

    — Rudyard Kipling (1865-1936), Dane-geld, Stanzas 5-6

    There is a good reason that law "law enforcement agencies around the world" advise again paying cyber criminals. And it isn't because law enforcement is dumb, or that they like seeing you getting your data stolen.

  • by oldgraybeard ( 2939809 ) on Tuesday May 12, 2026 @08:00PM (#66140827)
    Guaranteeing more cyber crime when crime pays really well! Next time they will need to pay more. And everyone knows the data has already been sold.
  • "confirmation" (Score:5, Insightful)

    by daninaustin ( 985354 ) on Tuesday May 12, 2026 @10:01PM (#66140899)
    No wonder they got hacked, if they think they can get confirmation that it was deleted. It's not a serious company.
  • by felixrising ( 1135205 ) on Tuesday May 12, 2026 @11:28PM (#66140965)
    Honestly, what idiots to fall for the scam. I know my data is in there somewhere, but I have no doubt by paying the ransom, they've only perpetuated the business model further. There is no honour amongst thieves.
  • It's Over (Score:5, Informative)

    by DewDude ( 537374 ) on Wednesday May 13, 2026 @12:27AM (#66140993) Homepage

    They should just start the process of shutting down.

    They're going to get hit again...they're a mark.
    They're contributing to the problem...proving they've found an area they can get results.
    The trust is gone.

    The fact they believe anything the criminals say is pretty stupid. That right there is enough proof that they didn't handle it properly.

    There's no honor among thieves. They didn't delete it. They will use it later.

    This will only continue to get worse as morons cave.

  • Trust them I am sure they are outstanding people and will delete the data like they said
  • - it received "digital confirmation of data destruction"
    - it had been informed that no Instructure customers would be extorted as a result of the incident
    - the agreement covers all affected customers, with no need for individuals to engage with the hackers

    I'm 100% sure criminals would never lie. It's bad for business. I'm also 100% sure they didn't create any additional means for future compromise.

  • In some countries, it's illegal to pay ransoms. Those countries don't get ransomware attacked because there's zero chance of getting a single dollar. Also, the funds go to support terrorists, drug dealers, or criminal rackets in almost all cases. That alone is already illegal. Just pass a US law saying paying ransoms is illegal!
    • Even if it's not illegal, *if* it can be fairly clearly demonstrated (not just argued, no matter how logical or obvious) that it has an emboldening effect on the criminals that hurts other companies, even those that aren't later hit themselves, because of increased cost in hardening their systems, a good class action should be able to sue them out of existence, help fund said hardening, and discourage others from paying.

  • Paying ransom ought to be criminal. Moreover, they have zero guarantee that the data is really gone, no copies anywhere.
    • Agree! It should be illegal for a company to pay a ransom as it just incentivizes more attacks on other companies. If the company doesn't comply with these laws, then the people (CEO, officers, IT, accountant, etc.) responsible at the company should be subject to jail. Fines are not sufficient since it just the companies money that is being lost. Companies paying millions of dollars to a contractor to "solve" the problem (by paying the ransom) must also be illegal. Companies should also be required to repor
  • There should be a 100% excise tax on paid ransoms to fund state cyber security. And a five year prison sentence for not reporting on top of the tax fraud.

"Nature is very un-American. Nature never hurries." -- William George Jordan

Working...