The Canvas hack data breach exposed a critical vulnerability in how educational institutions protect student information. Instructure, the parent company of Canvas, confirmed that hackers stole approximately 6.65 terabytes of data affecting around 9,000 schools worldwide, and the company subsequently admitted to paying the attackers to delete the stolen files.
Key Takeaways
- ShinyHunters hacking group stole 6.65 terabytes of Canvas data from 9,000 schools globally.
- Stolen information included student names, emails, and internal messages but not course content or credentials.
- Instructure paid hackers to delete data and reached an agreement to prevent further distribution.
- CEO Steve Daly apologized for poor communication during the Canvas hack data breach incident.
- The vulnerability was linked to the ‘Free for Teacher’ feature support tickets system.
What Happened During the Canvas Hack Data Breach
On April 29, Instructure identified unauthorized activity affecting Canvas, its widely used learning management system serving millions of students globally. The Canvas hack data breach forced the company to take the platform offline on Thursday to investigate the scope of the intrusion. ShinyHunters, the hacking group responsible, claimed they had stolen approximately 6.65 terabytes of Canvas data and issued a settlement demand by May 12.
The vulnerability exploited by the attackers was traced to the ‘Free for Teacher’ feature, specifically within support tickets in that environment. To contain the breach, Instructure temporarily disabled this feature while negotiating with the hackers. The Canvas hack data breach ultimately affected educational institutions across multiple continents, making it one of the most significant cybersecurity incidents in the edtech sector.
What Student Data Was Compromised in the Canvas Hack
The Canvas hack data breach exposed personal information including student names, email addresses, and internal messages. However, Instructure confirmed that core learning data remained secure—course content, student submissions, and login credentials were not compromised by the attackers. This distinction is crucial because it means instructors retained access to coursework and grades, limiting the operational impact on academic records.
The breach affected approximately 9,000 schools worldwide, representing a massive exposure of personally identifiable information. Students and educators at institutions using Canvas faced uncertainty about what personal data had been accessed, even as Instructure worked behind the scenes to recover the stolen files. The incident raised immediate questions about how educational platforms safeguard sensitive information in an increasingly hostile threat environment.
Instructure Paid Hackers to Delete Stolen Data
In a controversial move that highlights the difficult position organizations face during ransomware incidents, Instructure negotiated with ShinyHunters and agreed to pay the hackers in exchange for the deletion of stolen data. The company reached an agreement with the attackers, and the stolen files were returned with assurances that the data would not be shared publicly or sold to other threat actors. While Instructure did not disclose the amount paid to ShinyHunters, the decision to negotiate directly with criminals underscores how seriously the company viewed the threat of data being weaponized against its users.
This approach differs from the stance many cybersecurity experts recommend—that paying ransoms only encourages further attacks. However, Instructure’s decision reflected the company’s assessment that preventing the public release of student information was worth the cost. The incident marked as ‘Resolved’ on Instructure’s status page on May 6, though the reputational damage and questions about the company’s security posture persisted.
CEO Apologizes for Communication Failures During Canvas Hack
Steve Daly, CEO of Instructure, issued a public apology acknowledging that the company’s response to the Canvas hack data breach fell short of expectations. ‘I’ll start where I should: with an apology,’ Daly stated, directly addressing the frustration educators and administrators experienced during the incident. He admitted that Canvas users ‘deserved more consistent communication’ and that Instructure ‘didn’t deliver it’.
Daly explained the company’s reasoning for the communication gap: ‘Last week, we made a call to get the facts right before speaking publicly. That instinct isn’t wrong, but we got the balance wrong. We focused on fact-finding and went quiet when you needed consistent updates.’ The CEO acknowledged that while gathering accurate information was important, the lack of transparency during the Canvas hack data breach created additional anxiety for schools already dealing with system downtime. He committed to improving communication practices in future incidents.
Security Recommendations and Path Forward
Following the Canvas hack data breach, Instructure issued recommendations for customers to strengthen their security posture. The company advised enforcing multi-factor authentication across all accounts, reviewing administrative access privileges, and rotating API tokens to prevent unauthorized system access. These measures address common attack vectors that hackers exploit to maintain persistence within compromised systems.
Canvas was restored to full operation, and Instructure maintained that the platform remains safe to use despite the Canvas hack data breach. The company emphasized that the vulnerability has been patched and the ‘Free for Teacher’ feature was modified to prevent similar exploits. However, the incident serves as a reminder that even widely adopted educational platforms are targets for sophisticated threat actors, and institutions must maintain vigilant security practices regardless of vendor assurances.
How Does This Compare to Other Educational Platform Breaches
Educational technology platforms handle some of the most sensitive data in the digital ecosystem—student records, academic progress, and personal communications. The Canvas hack data breach, affecting 9,000 institutions, demonstrates that even established platforms with significant market presence face serious security challenges. While the research brief does not identify competing platforms affected by similar breaches, the scale of the Canvas incident underscores why schools must implement defense-in-depth security strategies rather than relying solely on vendor security measures.
The decision by Instructure to pay hackers also raises industry-wide questions about incident response best practices. Educational institutions depend on platforms like Canvas for daily operations, creating urgency that attackers exploit. Organizations in critical sectors must balance the pressure to restore service quickly against the long-term security implications of negotiating with threat actors.
Did Canvas remain operational during the hack?
No. Instructure took Canvas offline on Thursday to investigate the breach and address the security vulnerability. The platform was restored to full operation after the company negotiated with ShinyHunters and the incident was marked as resolved on May 6.
What personal information was stolen in the Canvas hack data breach?
The Canvas hack data breach exposed student names, email addresses, and internal messages. However, core learning data such as course content, submissions, and login credentials were not compromised.
Should schools continue using Canvas after this hack?
Instructure stated that Canvas remains safe to use following the patch and remediation of the vulnerability. Schools should implement the company’s security recommendations—multi-factor authentication, admin access reviews, and API token rotation—to strengthen their protection against future attacks.
The Canvas hack data breach represents a watershed moment for educational technology security. While Instructure’s decision to pay hackers may prevent immediate data exploitation, the incident exposes how vulnerable even established platforms remain to sophisticated attacks. Schools must demand transparency from their vendors, implement robust security practices, and recognize that no platform is entirely immune to breach risk. The apology from CEO Daly acknowledges the company’s communication failures, but trust must be rebuilt through sustained security investment and honest dialogue with the educational community.
Edited by the All Things Geek team.
Source: TechRadar


