Instructure Reaches Deal with Hackers After Massive Canvas Data Breach

by Ahmed Ibrahim World Editor

Instructure, the U.S.-based parent company of the Canvas learning management system, has announced it has “reached an agreement” with a cybercriminal gang following a massive data breach that compromised the personal information of an estimated 275 million users worldwide. The breach, which is believed to be the largest in the history of the education sector, crippled the platform during the critical final weeks of the first semester for hundreds of thousands of students and teachers.

The company confirmed early Wednesday that it had settled terms with the “unauthorised actor” responsible for stealing roughly 3.65 terabytes of student and staff records. While Instructure stopped short of explicitly confirming a ransom payment, the company stated that the stolen data has been returned along with “shred logs”—digital certificates intended to prove that the hackers have destroyed all remaining copies of the stolen information.

The scale of the intrusion is vast, affecting 8,809 educational institutions across the globe. In Australia, at least 122 institutions were impacted, ranging from major research universities to state education departments and elite private schools. The incident has reignited a fierce debate over the security of third-party educational software and the ethical implications of negotiating with cybercriminals to protect the data of millions of children.

The ‘Code’ for Ransom Payments

The ambiguity of Instructure’s language has drawn sharp criticism from cybersecurity experts. Alastair MacGibbon, Australia’s former cyber tsar, suggested that the phrase “reached an agreement” is almost certainly corporate shorthand for a financial settlement. In his view, the lack of transparency regarding the payment is unacceptable given the vulnerability of the victims.

The 'Code' for Ransom Payments
The 'Code' for Ransom Payments

“Reaching an agreement, I would suggest, is code for paid,” MacGibbon said, noting that while payment can be justified in life-or-death scenarios—such as the locking of hospital systems or power grids—it is far more questionable in this context. He argued that the involvement of children’s data might provide a “semi-valid” reason for negotiation, but that the company owes the public a clear justification for its decision.

MacGibbon warned that “shred logs” provide a false sense of security. He noted that criminal assurances regarding the deletion of data have been proven inaccurate repeatedly. Once data is exfiltrated, there is no absolute guarantee that the hackers have not maintained “shadow copies” to be sold or leveraged at a later date.

Mapping the Australian Impact

The breach hit the Australian education system with significant force, affecting a broad spectrum of learners and administrators. The stolen data included student identification numbers, email addresses, names, and—perhaps most sensitively—private Canvas messages. Instructure maintains that passwords, dates of birth, government identifiers and financial information were not accessed.

The list of affected Australian institutions includes some of the country’s most prominent academic bodies:

  • Higher Education: The University of Melbourne, University of Sydney, University of Technology Sydney (UTS), RMIT, Western Sydney University, the University of Newcastle, and Australian Catholic University.
  • Government Bodies: The Victorian Department of Education and the Queensland Department of Education.
  • Private Schools: Melbourne Grammar, Cranbrook School in Sydney, and Brisbane Grammar.

For students, the theft of private messages is particularly concerning, as these communications often contain personal struggles, academic appeals, or sensitive discussions between students and mentors that were intended to remain confidential.

Metric Detail
Total Users Affected ~275 Million
Data Exfiltrated 3.65 Terabytes
Global Institutions 8,809
Australian Institutions 122+
Primary Attacker ShinyHunters

A Systemic Failure in the Supply Chain

The breach was not the result of a sophisticated “zero-day” exploit, but rather a failure in basic verification processes. The hacking group, known as ShinyHunters, exploited a flaw in Canvas’ “Free-for-Teacher” program. This feature allowed educators to sign up for the service without requiring institutional verification, creating a backdoor that the attackers used to gain entry into the broader system.

Canvas Hack: Instructure Reaches Deal With Hackers

Here’s not the first time Instructure has fallen victim to ShinyHunters. the group previously breached the company in early 2024 through third-party software. The recurrence of these attacks has led to a class-action lawsuit filed in a U.S. Federal court in Utah, which alleges that Instructure failed to implement adequate protections and made itself “easy prey” for cybercriminals.

The incident highlights a growing risk in the global education “supply chain.” As schools move away from local servers and toward centralized, overseas SaaS (Software as a Service) platforms, a single point of failure can now compromise the data of millions. Luke Irwin, a cybersecurity consultant at Aegis Cybersecurity, noted that because Instructure is owned by the U.S. Private equity giant KKR, the full financial details of the breach may eventually emerge through mandatory SEC disclosures or investor reporting.

Irwin estimated that while the hackers initially sought a ransom of approximately $13 million (roughly $US10 million), the final settlement was likely “in the high single-digit millions,” following the standard pattern of negotiated discounts in ransomware cases.

Disclaimer: This article discusses ongoing legal proceedings, including a class-action lawsuit in the United States. The allegations contained in the lawsuit have not been proven in court.

The focus now shifts to the regulatory response and the transparency of the recovery process. The next critical checkpoint will be the upcoming mandatory cyber-incident disclosures required by the U.S. Securities and Exchange Commission (SEC) and potential reporting within KKR’s investor updates, which may finally clarify the exact amount paid to the hackers.

Do you believe companies should be prohibited from paying ransoms to protect student data? Share your thoughts in the comments below.

You may also like

Leave a Comment