Canvas’ Instructure Paid Millions for ShinyHunters to Protect Student Data

Corporate ransomware attacks affected the Canvas platform of Instructure resulted in the theft of data from 275 million students.

On May 11, Edu-Tech giant, Instructure, capitulated to extortion group ShinyHunters’ demands, following one of the most devastating corporate ransomware attacks on its globally used learning management system, Canvas.  

Instructure ended up paying a multi-million-dollar ransom to prevent public leaks of sensitive student data, according to The Guardian

Imagine logging in to check your grades only to see that your classroom page has been hijacked. When corporate ransomware attacks affect platforms such as the Canvas platform, they result in students’ data theft, and in Instructure’s case, it was 275 million students’ data. 

The event shook academia, disrupting virtual classrooms and delaying assignments as hackers ruined log-in pages. By targeting a central software system used daily by millions, ShinyHunters cybercriminals disrupted universities and schools from the US to Australia.  

Connected classrooms have truly become extremely vulnerable to digital threats

Behind the Canva Data Breach 

The disruption exposed a security flaw within Instructure’s Free-for-Teacher environment. ShinyHunters exploited this loophole to hack into the company’s networks, stealing 3.65 terabytes of information.  

The Canva data breach entailed the theft of student IDs, emails, names, and millions of personal messages. When the security hole was targeted, cybercriminals fought back by seizing login pages in hundreds of institutes, demanding ransom by May 12. 

Under the threat of imminent exposure, Instructure opted for negotiations. The company informed that it signed a formal deal with the attackers. 

According to Instructure, the hackers handed back the data files and offered shred logs, which is a special kind of digital receipt that confirms that the data is permanently destroyed.  

Experts highlight that the event underscores the increasing threat of leakware ransomware, where cybercriminals lock systems and threaten to release data. However, the deal covers all affected educational institutions, guaranteeing safety from further ransomware extortion. 

“While there is never complete certainty when dealing with cybercriminals, we believe it was important to take every step within our control to give customers additional peace of mind, to the extent possible,” Instructure explained in a public statement. 

Tech analysts estimate the initial ransom demand was close to $10 million, though the final negotiated sum remains undisclosed. This case perfectly illustrates how multifaceted extortion attacks are being normalized, combining system destruction with data theft to pressure victims.  

The instance of corporate ransomware attacks has forced many organizations to rethink their entire security architecture. 

“ShinyHunters is an extortion group,” Darren Hopkins, a cyber forensics expert at McGrathNicol says. “This is what they do. What other agreement will they come up with?” 

The Ransomware Business Impact  

While the immediate corporate ransomware attacks threat was prevented, cooperating with cybercriminals raises ethical and practical questions for educational technology. Most global governments strongly discourage paying ransoms.  

Security experts highlight that payments funds future criminal activities, compounding the ransomware business impact across the tech sector with no legal guarantee stolen files remain safe. 

“Instructure is dealing with a criminal organization, and you are taking them at their word that they will commit to those outcomes,” Luke Irwin, Aegis Cybersecurity expert says. 

The reliance on criminals highlights a paradox where ransomware extortion groups protect their business model by destroying data once paid. If they leaked files anyway, future victims would refuse to cooperate.  

Yet, as Hopkins points warns boards of directors, relying on this honor system is incredibly dangerous. The true fallout of this breach extends far beyond the ransom itself.  

The widespread vulnerability emphasizes why organizations must maintain a robust business continuity plan to keep operations running during a crisis. Schools and parents are also urged to stay highly alert.  

Do schools have backup plans to protect student data when vendor sandboxes compromise legal compliance? Because modern education relies on massive cloud platforms, a solitary security flaw can instantly compromise hundreds of millions globally, illustrating how easily corporate ransomware attacks disrupt international infrastructure. 

This widespread vulnerability emphasizes why organizations must maintain a robust business continuity plan for ransomware to keep operations running during a crisis. Moving forward, schools and parents are being urged to stay highly alert.  

Security experts warn that even with data destruction logs, pieces of personal information could still be used to create highly convincing scam emails targeting students and faculty, demonstrating that the ransomware business impact lingers for years through ongoing phishing threats.  

For the global education sector, preventing another wave of corporate ransomware attacks is a reminder that protecting human beings behind the screens must become the highest priority. To prevent the impact of ransomware on businesses, organizations worldwide must refuse to fund the cybercriminal ecosystem and push for stronger defense mandates. 


Inside Telecom provides you with an extensive list of content covering all aspects of the tech industry. Keep an eye on our Cybersecurity sections to stay informed and up-to-date with our daily articles.

Join our WhatsApp Channel WhatsApp Channel