Instructure pays ransom to Canvas hackers

Scope of the Incident

  • Instructure (Canvas) confirms paying a ransom to ShinyHunters; their public status page says data was “returned” and “digitally confirmed” as destroyed via shred logs.
  • Many commenters view this as PR spin, arguing that copied data cannot meaningfully be “returned,” and shred logs could be fabricated or only apply to a single copy.
  • Attack is believed to have exploited the “Free-For-Teacher” feature and possibly Salesforce Experience Cloud misconfigurations or session-token theft via XSS (based on post-incident changes); exact root cause remains unclear.

Data Sensitivity and Impact

  • Likely exposed data: names, emails, course enrollments, conversations, grades, and possibly financial or identity data where districts misuse Canvas (e.g., some K‑12 reportedly store SSNs).
  • Debate on how “extortable” this data is: some see it as low-value directory info; others stress compounded harm via phishing, privacy violations, minors’ data, and regulatory issues (e.g., FERPA).

Ransom Economics and Attacker Reputation

  • Strong focus on game theory:
    • Ransom groups need a reputation for honoring deals so victims keep paying.
    • Paying signals that a company is vulnerable, cannot recover, and has money, potentially inviting more attacks.
  • Some argue hackers will avoid double-crossing to protect their “brand”; others point out insider leaks, future rebranding, or delayed dumps could still occur.

Should Ransom Payments Be Legal?

  • Split views:
    • One side: outlaw payments (or criminally penalize decision-makers) to solve a collective action problem and starve the “ransomware industry,” drawing parallels to kidnapping policies and Danegeld.
    • Other side: hacking will continue regardless; banning payments harms current victims and customers more than companies, and enforcement (sanctions, AML, attribution) is murky.

Security, Backups, and Responsibility

  • Some say robust, air‑gapped backups and minimal PII collection should have made ransom unnecessary; others note backups don’t mitigate extortion based on data exposure.
  • Widespread frustration that companies face little lasting market penalty for breaches, leading to chronic underinvestment in security.
  • Suggestions include regulatory penalties for negligent PII handling and an independent “crash‑investigation–style” body for major breaches.

Education-Specific Concerns and Alternatives

  • Instructors express new operational precautions (e.g., downloading gradebooks regularly).
  • Mention that Canvas is open source; some wonder what comparable open-source LMSes could do with similar funding to improve security.