Security Experts Question Claim That Canvas Hackers Deleted Stolen Student Data

0
10

Key Takeaways

  • Instructure announced it “reached an agreement” with the ShinyHunters extortion group, claiming data destruction and no further extortion, but security experts doubt the claim.
  • The breach allegedly exposed personal information of roughly 275 million students, teachers, and staff, including private chats and email addresses.
  • Analysts describe the situation as an illustration of the “ransomware trust paradox”: criminals claim to delete data to encourage payment, yet often retain or reuse it.
  • ShinyHunters has a track record of recycling stolen data and escalating pressure through school‑by‑school extortion, phishing campaigns, and harassment.
  • Paying a ransom does not guarantee data recovery or prevent future attacks; many organizations that pay are hit again.
  • The education sector is especially vulnerable due to the sensitivity of minor data, locked‑in contracts with few large vendors, and operational pressure during critical periods like finals week.
  • Experts warn that the Canvas breach will likely spawn additional phishing, extortion, and reputational harm for months or years to come.
  • Despite public statements against paying ransoms, institutions often choose payment as the “least bad” option to avoid immediate harm to students and staff.
  • The pattern of successful extortion against major ed‑tech providers (PowerSchool, Infinite Campus, Canvas) suggests future attacks on similar platforms are likely.

Background of the Canvas Breach
In late April 2025, the ransomware‑affiliated group ShinyHunters compromised Instructure’s Canvas learning‑management system. The attackers claimed to have exfiltrated data tied to approximately 275 million students, teachers, and staff across nearly 9,000 universities and K‑12 schools. The stolen dataset reportedly included private chat logs, email addresses, and other personally identifiable information. Shortly after the intrusion, ShinyHunters issued a pay‑or‑leak ultimatum, setting an initial deadline of May 6 for payment.


Instructure’s Public Response
On the day the deadline passed, Instructure released a statement saying it had “reached an agreement” with ShinyHunters. The company asserted that it had received digital confirmation of data destruction (shred logs) and promised that no customer would be extorted publicly or otherwise. Instructure’s executives avoided confirming a direct payment, but industry observers interpreted “reached an agreement” as a euphemism for paying the ransom.


Expert Skepticism About Data Destruction
Security professionals uniformly dismissed Instructure’s claim that the stolen data had been destroyed. Allan Liska of Recorded Future, nicknamed the Ransomware Sommelier, said he does not believe the criminals deleted the data, noting that ransomware groups rely on the perception of deletion to encourage future payments. Cynthia Kaiser, SVP of the Halcyon Ransomware Research Center and former FBI analyst, added that no reputable researcher trusts such promises, citing ShinyHunters’ history of recycling and reselling previously “destroyed” data.


The Ransomware Trust Paradox
Liska framed the situation within Max Smeets’ concept of the “ransomware trust paradox.” Criminal groups must, at a minimum, appear to delete data after a payment; otherwise, victims would refuse to pay in future incidents. However, this appearance is often a ruse: the data is retained, repackaged, or sold later, undermining trust while still extracting profit. The Canvas case exemplifies this dynamic, as ShinyHunters has previously resurfaced data from earlier intrusions on criminal forums months or even years after claiming deletion.


Post‑Payment Tactics and Escalation
After the May 6 deadline passed without a publicly confirmed payment, ShinyHunters shifted to school‑by‑school extortion. The group injected ransom messages into roughly 330 Canvas school login portals, forcing Instructure to take the platform offline for a day—disrupting finals week and Advanced Placement testing for many institutions. Beyond portal messages, the gang has employed psychological pressure tactics such as SIM‑swapping executives’ relatives, leaking sensitive personal images, and threatening swatting attacks to coercively extract further payments.


Risk Calculus for Educational Institutions
Victims face a complex decision matrix: paying a ransom may reduce the immediate risk of data exposure but funds criminal activity and offers no guarantee of data recovery or immunity from future attacks. Conversely, refusing to pay raises the likelihood that stolen data will be published or used for secondary extortion, potentially leading to lawsuits, reputational damage, and direct harm to students and staff. Doug Thompson of Tanium noted that the intense operational pressure during periods like enrollment season or finals often tips the balance toward payment, despite formal policies against it.


Why the Education Sector Is Particularly Susceptible
Education‑technology providers hold exceptionally sensitive data, especially concerning minors, which makes them lucrative targets for extortion. Moreover, the market is highly concentrated: a handful of vendors—PowerSchool, Infinite Campus, Canvas, and Blackboard—manage records for virtually every American student. This concentration means a single breach can impact massive portions of the education system, increasing the leverage attackers hold. Thompson observed that the sector’s reliance on multi‑year contracts and the high cost of switching learning‑management systems further lock institutions into vulnerable positions.


Historical Precedents and Emerging Patterns
The Canvas incident follows a string of similar attacks on ed‑tech firms. In December 2024, PowerSchool suffered a breach affecting tens of millions of users; the company allegedly paid about $2.85 million in bitcoin for a purported video of data destruction, only to face renewed extortion threats months later. Early 2025 saw ShinyHunters claim data theft from Infinite Campus amid a broader wave of Salesforce‑related intrusions. These repeated successes have created a predictable pattern: attackers extort, victims often pay, and the cycle reinforces the perception that payment is a viable—if undesirable—response.


Future Outlook and Recommendations
Luke Connolly of Emsisoft warned that affected institutions should not consider their data safe, regardless of Instructure’s assurances or the criminals’ promises. He anticipates additional phishing waves, targeted harassment, and potential resale of the stolen Canvas data over the next six to twelve months. Thompson expects further attacks on major education platforms, given the financial incentive demonstrated by recent payouts. To mitigate risk, experts urge stronger segmentation of data, regular offline backups, incident‑response planning that excludes reliance on attacker promises, and industry‑wide discussions about establishing a ban on ransomware payments—though they acknowledge that without regulatory pressure, many institutions will continue to weigh the immediate safety of students against the long‑term costs of funding cybercrime.

SignUpSignUp form

LEAVE A REPLY

Please enter your comment!
Please enter your name here