When a company that manages data for millions of students gets breached not once, but twice within a single year, the situation demands serious attention. Instructure, the company behind the widely used Canvas learning management system, recently found itself in this exact predicament. Instead of continuing a public standoff, the company chose to negotiate with the cybercriminals responsible. This decision, often referred to as the instructure hacker deal, has sparked heated debate among security experts, school administrators, and parents alike. Was paying the ransom a pragmatic move to protect student privacy, or a dangerous gamble that could encourage more attacks?

The Scope of the Canvas Data Breach
The incident began in late April when a group known as ShinyHunters claimed responsibility for a significant data breach. The hackers stated they had accessed and stolen data belonging to roughly 275 million individuals, primarily students and staff from schools using the Canvas platform. This is not a small number. To put it into perspective, that figure is larger than the entire population of Brazil. Nearly 9,000 educational institutions rely on Canvas to manage coursework, grades, and communication. A breach of this magnitude meant that a substantial portion of the K-12 and higher education sector in the United States was potentially exposed.
The stolen data, portions of which were verified by security researchers, included student names, personal email addresses, and private messages exchanged between teachers and students. This type of information is particularly sensitive. Unlike credit card numbers, which can be canceled and reissued, personal identifiers and private communications are permanent. A student’s name and email address, once leaked, can fuel phishing campaigns, identity theft, and social engineering attacks for years to come.
A Second Breach Raises the Stakes
What made this incident even more alarming was the follow-up attack. Just days after the initial breach was disclosed, ShinyHunters struck again. This time, they defaced the Canvas login pages on actual school websites. This act of digital vandalism was not just a technical nuisance; it was a direct message to Instructure and its customers. The hackers were demonstrating their continued access and willingness to cause disruption until their demands were met. This second breach forced the company into a difficult corner, leading to the instructure hacker deal that would follow.
What the Instructure Hacker Deal Actually Involved
On a Tuesday in late May, Instructure publicly announced that it had “reached an agreement” with the hackers. The terms were not disclosed, but the outcomes were clearly stated. As part of the agreement, the hackers provided what they claimed was evidence that the stolen data had been destroyed. The listing on ShinyHunters’ leak site, which had previously threatened to publish the data, was removed. A representative from the hacking group even stated that the data was “deleted, gone” and that customers would not be further targeted.
On the surface, this sounds like a successful resolution. The company avoided a massive public data dump. Schools could tell parents that the immediate threat of exposure had passed. However, the company also acknowledged a critical caveat: there is “never complete certainty” when negotiating with cybercriminals. This single sentence from Instructure’s incident page captures the fundamental tension at the heart of the instructure hacker deal. You are trusting an entity that has already proven it cannot be trusted.
The Financial Mystery
Instructure did not disclose how much money changed hands. This lack of transparency is a common point of frustration for security researchers. Without knowing the price tag, other education technology companies cannot fully assess the risk-reward calculus of paying a ransom. If the amount was small relative to the cost of litigation, public relations damage, and potential regulatory fines, the deal might be seen as a calculated business decision. If it was a large sum, it sets a lucrative precedent for other cybercriminal groups targeting the education sector.
Why the FBI and Security Experts Warn Against Paying
The decision to pay directly contradicts long-standing advice from the United States government. The FBI has repeatedly stated that victims of cyber extortion should not send payment or respond to demands. The reasoning is twofold. First, paying a ransom funds the criminal infrastructure. The money often goes toward buying better hacking tools, renting server space, and financing future attacks. Second, there is no guarantee of compliance. A hacker who promises to delete data after being paid has no incentive to keep that promise, especially if they can extort the same victim again later.
A real-world example of this risk comes from a similar incident involving PowerSchool, another major education software provider. In 2024, PowerSchool suffered a breach affecting roughly 70 million students and staff. The company paid the hackers to return the stolen data. However, several of PowerSchool’s customers were later extorted by a different criminal group that had obtained a copy of the data that was supposedly destroyed. This case study serves as a stark warning for anyone considering a deal like the instructure hacker deal. Once data is copied and distributed among criminal networks, it is virtually impossible to ensure its complete deletion.
The Practical Dilemma for Schools
Despite the government’s warnings, the reality for school IT administrators is brutal. Imagine being the person responsible for informing hundreds of thousands of parents that their children’s private messages could be published online tomorrow. The pressure is immense. The immediate goal becomes containment and prevention of public harm. In this high-stress environment, the promise of deletion—even from a known criminal—can feel like the only viable option. The FBI’s advice is sound in principle, but it does not offer a practical solution for a school district facing a Friday afternoon deadline from a hacker holding student data.
What Schools Should Do After the Instructure Hacker Deal
For the thousands of schools that rely on Canvas, the deal does not mean the crisis is over. It means the immediate threat of a public leak has been mitigated, but the underlying security vulnerabilities and data exposure risks remain. Schools must take proactive steps to protect their communities.
Conduct an Internal Audit of Exposed Data
School districts should work with their IT teams to determine exactly what data was accessible through Canvas during the breach window. This is not just about student names and emails. It includes private messages, assessment results, and any files uploaded to the system. Understanding the scope of what was potentially taken is the first step in preparing a response plan. If a student’s private message to a counselor was exposed, that requires a different notification than a leaked email address.
Notify Parents with Clear, Actionable Guidance
Communication is critical. Schools should send a notice to parents that is honest about the breach but does not cause unnecessary panic. The message should include specific steps parents can take, such as monitoring their child’s email for phishing attempts, enabling multi-factor authentication on school accounts, and being cautious about unsolicited messages that reference personal information. Parents need to know that the instructure hacker deal does not guarantee their child’s data is safe from future misuse.
Reevaluate Third-Party Vendor Security
This breach is a textbook example of third-party risk. The school itself may have excellent cybersecurity practices, but a vulnerability in a vendor like Instructure can bypass all of those defenses. Schools should demand greater transparency from their software providers. This includes asking for detailed incident reports, proof of security audits, and clear timelines for security improvements. If a vendor cannot provide this, schools may need to consider alternative platforms or negotiate contractual clauses that hold the vendor financially responsible for breach-related costs.
Can Hackers Be Trusted to Delete Data?
This is the central question that remains unanswered after the instructure hacker deal. The ShinyHunters representative stated the data is gone. Security researchers, however, are deeply skeptical. The technical reality is that deleting data on a server controlled by someone else is a one-sided claim. There is no external audit, no cryptographic proof, and no legal recourse if the promise is broken. The only “evidence” provided was likely a screen recording or a log file, both of which can be easily faked.
Furthermore, the economics of cybercrime work against trust. A criminal group that builds a reputation for actually deleting data after payment is one that loses leverage. The threat of re-extortion is a powerful tool. If a group can go back to a school a year later and say, “We still have your data, pay us again,” they have a strong incentive to keep copies. The PowerSchool example demonstrates that this is not just a theoretical risk; it has happened in the real world.
The Role of Data Brokers and Secondary Markets
Even if the primary hacker group deletes their copies, the data may have already been sold. Cybercriminal operations often involve multiple layers. The initial hackers might sell the dataset to a data broker before even attempting to extort the company. Once a data broker has the information, it can be sold to spammers, identity thieves, or other malicious actors. The instructure hacker deal only addresses one link in a potentially long chain of data distribution. Schools and parents should assume that the data is now circulating in the underground market, regardless of the agreement.
Who Is Accountable for Cybersecurity at Instructure?
A pressing question that has emerged from this incident is about leadership and accountability. It is unclear who at Instructure oversees cybersecurity, if not the CEO, Steve Daly. When contacted by reporters, the company would not say whether Daly plans to resign following the breaches. This lack of clarity is concerning for shareholders and school partners alike. In a company that handles data for hundreds of millions of people, cybersecurity should be a board-level priority with clear executive ownership.
You may also enjoy reading: Magnetic Resonance Imaging Tech: How It Works and Clinical Uses.
The fact that the company suffered two distinct breaches within a single year suggests systemic issues, not just a single oversight. A well-resourced security team should be able to detect and contain an intrusion before it leads to a second, separate attack. The instructure hacker deal may have solved the immediate extortion problem, but it does not fix the underlying security gaps that allowed the breaches to happen in the first place.
What a Responsible Vendor Should Do Next
For Instructure to rebuild trust, it needs to go beyond a press release. The company should commission an independent, external security audit and publish the results. It should offer free credit monitoring and identity theft protection services to all affected individuals, not just students but also teachers and administrative staff. It should also invest in a bug bounty program to encourage ethical hackers to find vulnerabilities before criminals do. These actions would demonstrate a genuine commitment to security, rather than just a willingness to pay off attackers.
What Parents Can Do Right Now
If your child’s school uses Canvas, you may feel powerless. The data is already gone. The deal has been made. But there are practical steps you can take to reduce the risk of harm.
Enable Multi-Factor Authentication on School Accounts
If the school portal supports multi-factor authentication (MFA), enable it immediately. This adds a second layer of protection beyond just a password. Even if a hacker has your child’s email address and password from the breach, they cannot log in without the second factor, which is typically a code sent to a phone or generated by an app. This is one of the most effective ways to prevent account takeover.
Monitor for Phishing Attempts
Hackers who have access to student email addresses and private messages can craft highly convincing phishing emails. They might pretend to be a teacher, a school administrator, or even another student. Teach your child to never click on links or download attachments from unexpected messages, even if they appear to come from a known contact. If a message asks for login credentials or personal information, it is almost certainly a scam.
Freeze Your Child’s Credit
This is a step many parents overlook. Identity thieves can use a child’s Social Security number and name to open fraudulent accounts. Because children typically do not check their credit reports, this fraud can go undetected for years. You can request a credit freeze for your child with each of the three major credit bureaus (Equifax, Experian, TransUnion). This prevents anyone from opening new credit accounts in your child’s name without your explicit permission.
The Broader Implications for Education Technology
The instructure hacker deal is not an isolated event. It is a symptom of a larger problem in the education technology sector. Many school districts rushed to adopt digital tools during the pandemic, often prioritizing speed and functionality over security. Now, years later, the bill is coming due. Student data is a prime target for cybercriminals because it is abundant, often poorly protected, and can be used for a wide range of fraudulent activities.
This incident should serve as a wake-up call for school boards and state education departments. Relying on a single vendor for critical infrastructure creates a single point of failure. When that vendor is breached, the impact cascades across thousands of schools simultaneously. Diversifying software vendors, maintaining local backups of critical data, and investing in in-house cybersecurity expertise are no longer optional luxuries; they are essential components of a responsible education system.
Legislative and Regulatory Pressure
We may also see increased legislative action as a result of this breach. Student data privacy laws like FERPA (Family Educational Rights and Privacy Act) exist, but they were written long before the current era of cloud-based learning management systems. New laws could require vendors to meet specific security standards, report breaches within a shorter timeframe, and be subject to financial penalties for non-compliance. The instructure hacker deal, and the public reaction to it, could accelerate these regulatory changes.
A Final Word on Trust and Security
The decision to negotiate with hackers is never easy. Instructure faced an impossible choice: risk the public exposure of 275 million people’s private data, or pay a ransom to criminals and hope they keep their word. They chose the latter. Whether that was the right call will depend on what happens next. If no further data leaks occur and no secondary extortion attempts surface, the deal may be judged as a necessary evil. If, however, the data reappears on a different forum or is used to target students in the future, the decision will be seen as a costly mistake.
For now, the best course of action for schools and parents is to assume the worst and prepare accordingly. Trust in technology vendors must be earned, not given. And in the wake of a double breach followed by a secretive ransom deal, that trust has been severely damaged.






