Article 75MK8 Nobody believes the 'criminals and scumbags' who hacked Canvas really deleted stolen student data

Nobody believes the 'criminals and scumbags' who hacked Canvas really deleted stolen student data

by
from www.theregister.com - Articles on (#75MK8)
Story ImageFEATURE When Instructure reached an agreement" with data theft and extortion crew ShinyHunters this week, the education tech giant assured Canvas users after attackers claimed to have stolen data tied to 275 million students, teachers, and staff that their private chats and email addresses would not turn up on a dark-web marketplace, and that they would not be extorted over the incident. We received digital confirmation of data destruction (shred logs)," Instructure assured the nearly 9,000 affected universities and K-12 schools. We have been informed that no Instructure customers will be extorted as a result of this incident, publicly or otherwise." Not a single responder that The Register spoke with believes this is true. Do I believe they deleted the data? No. They're criminals and scumbags," Recorded Future threat intelligence analyst Allan Liska, aka the Ransomware Sommelier, told us. But, this is part of what Max Smeets calls The Ransomware Trust Paradox,'" he added. Ransomware groups have to, minimally, not post data they claimed to have deleted or no one will pay them in the future, but this is done knowing that the data is likely not deleted." Halcyon Ransomware Research Center SVP Cynthia Kaiser, who previously spent two decades at the FBI, said she doesn't think that anyone who studies ransomware groups' operations believes the gang actually destroyed the stolen files. We destroyed the data' is a standard line from extortion groups once a payment is made or negotiations conclude, but time after time it has proven untrue," Kaiser told The Register. ShinyHunters in particular has a documented history of recycling, reselling, and re-leveraging stolen data across campaigns - data they claimed was contained from earlier intrusions has resurfaced on criminal forums months and years later." Kaiser also doesn't think this is the last threat that the schools will face from the Canvas breach. Halcyon expects targeted phishing waves against staff, students, and parents over the next six to 12 months using leaked names, email addresses, and Canvas chat context to make the lures convincing," she said. To be clear: Instructure execs never directly said the company paid the ransom, and we don't know the exact amount of money the criminals demanded from the digital learning biz. We do know, however, that reached an agreement" is corporate-speak for the victim paid up. Doug Thompson, chief education architect at cybersecurity firm Tanium, estimates the figure sits somewhere between $5 million and $30 million. Meanwhile, this latest extortion attack illustrates the impossible choice facing organizations entrusted with protecting people's data when digital thieves breach their networks and steal sensitive information. The FBI says don't pay," Thompson told The Register. But the operational reality at 3 a.m. during finals week or enrollment season can push institutions toward a very different calculation. Until that incentive structure changes, education is likely to remain unusually vulnerable to extortion pressure." To pay, or not to pay? The US federal government, law enforcement agencies, and private-sector threat intelligence analysts all advise victims not to pay a ransom. Paying ransoms rewards and incentivizes the criminals, funding their search for new victims, and I've long advocated before for a ban on ransomware payments," Emsisoft threat analyst Luke Connolly told us. But in the absence of regulation applying to all organizations, the stark reality is that Instructure faced a crisis, and they negotiated to try to minimize risk and harm." No company wants to pay a ransom to its attackers, and most say they won't - at least in principle - because they don't want to fund criminal operations and incentivize the crooks. There's also no guarantee that paying will guarantee the return of their data or prevent additional extortion attempts. CrowdStrike surveyed 1,100 global security leaders last summer, and of the 78 percent who said they experienced a ransomware attack in the past year, 83 percent of those that paid ransoms were attacked again. Plus 93 percent lost data regardless of payment. While data suggests that fewer organizations are paying criminals' ransom demands - Chainalysis found the percentage of paying victims in 2025 dropped to an all-time low of 28 percent, despite attacks hitting record highs - when faced with extortion or a ransomware infection, the "to pay or not to pay" debate becomes much more complicated. Most organizations still say publicly that they won't pay, and many genuinely don't, but when the alternative is mass downstream harm to students, parents, and thousands of customer institutions, the calculus shifts," Kaiser said. Pay-or-leak groups like ShinyHunters specifically engineer that calculus by creating intense financial and reputational pressure, and when demands go unmet, they escalate to direct harassment of victim companies, employees, and clients." ShinyHunters did just that. The crew initially compromised Instructure in late April, and after the initial pay-or-leak deadline passed on May 6, ShinyHunters switched tactics to school-by-school extortion. They injected a ransom message into about 330 Canvas school login portals, causing Instructure to take the platform offline for a day - during final exams and Advanced Placement testing for many. Other ransomware scum have gone to horrifying extremes, posting pictures and addresses of preschool children in an effort to get a payday, leaking cancer patients' nude photos and threatening them with swatting attacks. Mandiant Consulting CTO Charles Carmakal previously told The Register that ransomware infections have morphed into "psychological attacks" with crooks SIM swapping executives' kids to pressure their parents into paying. Calculating risk In addition to responding to criminals directly harassing their students, patients, customers and employees, victim organizations also have to take into account potential lawsuits if the crooks dump individuals' personal or health data, and the reputational hit from seeing all of this protected information published online. The decision about what to do in a ransomware attack revolves around risk reduction, Liska said. Not paying a ransom means an increased risk of data exposure, which in this case could cause serious harm," he told us. While there is no good decision in most ransomware negotiations, the idea is to protect as many people as possible and that may mean that paying is the least bad option." While he didn't respond to or investigate the Instructure case, protecting children's data is absolutely a critical factor in these types of decisions, especially when the attacks originate from one of the groups associated with The Com," Liska added. The Com, a loosely knit group of primarily English speakers who are also involved in several interconnected networks of hackers, SIM swappers, and extortionists such as ShinyHunters and Scattered Lapsus$ Hunters, has been known to blackmail kids and teens into carrying out shootings, stabbings, and other real-life criminal acts. These groups are known to coerce victims using threats of physical harm, including bricking and swatting," he said. "Not paying may have increased the risk of serious harm to the children whose data was exposed." A representative of ShinyHunters contacted The Register to "deny any and all association, affiliation, and/or linkage with 'The Com' including 'Scattered Lapsus Hunters'" The rep said "There is no actual concrete evidence to support that we are associated, affiliated, or linked to the aforementioned. These are baseless allegations and industry propaganda surrounding 'The Com.'" The Shiny one admitted that some of their crew's tactics are similar to those the other gangs use but suggested it's lazy to assume a link. "If China or North Korea used vishing to infiltrate organizations networks would they also immediately become associated with The Com?'" the representative asked. Ed sector 'more likely to pay' Instructure's intrusion follows several other high-profile attacks against education-sector software providers. In December 2024, PowerSchool suffered a breach, affecting tens of millions of students. The company reportedly paid about $2.85 million in bitcoin in exchange for a video supposedly showing the attackers destroying the data. But about five months later, in May 2025, the ed-tech provider's school district customers received individual extortion threats from either the same ransomware crew that hit PowerSchool or someone connected to the crooks. Earlier this year, ShinyHunters claimed it stole data from K-12 software provider Infinite Campus as part of a broader wave of Salesforce-related intrusions. Education keeps emerging as one of the sectors where organizations are still more likely to pay under pressure," Thompson said. In addition to students' - especially minors' - data containing highly sensitive personal details, and therefore presenting an attractive target for attackers, this is also driven in part by market pressure and economics. It's costly and inconvenient for schools to switch learning management systems, and they are typically locked into multi-year contracts with these software vendors, according to Thompson. The other issue is concentration," he said. A relatively small number of vendors hold data for enormous portions of the education system. PowerSchool, Infinite Campus, Canvas, Blackboard; those four hold records on something close to every American student, and hackers know it. Three of the four have been breached at a multi-million-record scale in the last 18 months." Thompson said he expects to see additional attacks against major education platforms to follow. The economics are good. Instructure paid. PowerSchool paid last year. Every other ed-tech vendor's board just had a conversation about what their number would be," he told us. The pattern is established." According to Connolly, the universities and K-12 schools affected by the Canvas hack shouldn't consider their data safe, regardless of Instructure's assurances or the crooks' promises to delete it. There will be future attacks, without a doubt." (R)
External Content
Source RSS or Atom Feed
Feed Location http://www.theregister.co.uk/headlines.atom
Feed Title www.theregister.com - Articles
Feed Link https://www.theregister.com/
Reply 0 comments