Striking a Deal with Hackers: Instructure’s Unorthodox Move
Instructure, the company behind the widely used Canvas school software, has confirmed it reached an “agreement” with hackers who breached its systems not once, but twice. That’s the company’s word — “agreement” — and it comes with a stark disclaimer: Instructure cannot guarantee the hackers will refrain from leaking the stolen data or even keep their promises. This candid admission, reported by TechCrunch, signals a strategic shift that upends traditional incident response playbooks.
Why Instructure’s Deal with Hackers Challenges Conventional Cybersecurity Norms
Negotiating directly with cybercriminals is fraught territory. For years, companies, especially those managing sensitive data, have publicly resisted deals with hackers, fearing it encourages further attacks and undermines deterrence. Instructure’s approach — striking a deal after back-to-back breaches — raises the stakes. The company’s acknowledgment that there are “no guarantees” exposes the central ethical and operational dilemma: handing agency to malicious actors while leaving victims (users, institutions, and potentially regulators) in limbo.
This strategy puts Instructure at odds with the standard hardline stance. Typically, organizations focus on containment, remediation, and transparency, not bargaining. By confirming a deal but qualifying it with “no guarantees,” Instructure is essentially conceding that it has little leverage or recourse beyond the agreement itself. The move highlights the limits of corporate power when critical data is already in hostile hands.
What We Know: Scope and Frequency of the Breaches
The facts, as confirmed by Instructure, are spare but damning. Hackers breached the Canvas software twice. The company does not detail what data was exposed, how many users were affected, or the mechanics of the intrusion. There’s no breakdown of whether the breaches targeted students, educators, or administrative information. The only certainty is that the attackers penetrated the system on two separate occasions and that the company felt compelled to negotiate.
Without specifics on the data involved, the potential fallout is difficult to measure. But Canvas is a central platform for thousands of schools, which means the stakes are inherently high.
Why It Matters: Implications for Instructure and Its Users
Instructure’s public admission of an agreement with hackers — and the explicit lack of assurances about data safety — leaves users and clients exposed to ongoing risk. The move signals to educational institutions and their stakeholders that even after negotiations, the threat of data leak persists. The reputational impact alone is significant: trust in the platform can erode quickly when a company cannot guarantee the security of its users’ data or the reliability of its post-breach communications.
From a risk management perspective, Instructure’s decision illustrates a scenario where the company has exhausted conventional options. If the hackers retain leverage after two breaches and a publicized deal, it suggests the company’s ability to control the narrative and the threat is fundamentally compromised.
What Remains Unclear: The Missing Details
Critical information is still missing. Instructure has not disclosed:
- The nature and volume of the data accessed
- Whether any ransom or payment was involved
- The specific terms of the agreement with the hackers
- How the breaches occurred, or what remediation steps have been taken
- The timeline between the two breaches
Without these details, it’s impossible to fully assess the severity of the incident or its long-term impact. The absence of guarantees highlights a deeper uncertainty: neither Instructure nor its users know if or when their data might surface on the dark web or in future extortion attempts.
What To Watch: Precedent and Next Steps in EdTech Security
This case may mark an inflection point for how edtech firms and other high-stakes software vendors respond to persistent cyber threats. If negotiating with hackers becomes normalized — especially when companies admit they cannot enforce the outcome — it could embolden attackers. For educational institutions, the takeaway is clear: dependency on cloud-based platforms carries risks that contracts and incident plans might not fully address.
The next phase will hinge on several variables:
- Whether Instructure or affected clients disclose more details about the breaches or their impact
- If the hackers follow through on the agreement or choose to leak the data regardless
- How other edtech providers adjust their own security postures, especially in the wake of a public negotiation that ended with no guarantees
MLXIO analysis: Instructure’s move exposes the uncomfortable reality that, for some attacks, there are no good options — only degrees of damage control. The industry will be watching closely to see if this gamble pays off, or if it sets a precedent others will regret.
The Bottom Line
Instructure’s admission of a deal with hackers, without assurances for users, puts the company — and the broader edtech sector — in uncharted territory. The lack of detail leaves clients and end-users with more questions than answers, but one message is clear: when the attackers hold all the cards, even a deal is no guarantee of safety. The fallout from this case will reveal whether this new playbook is an act of desperation or the start of an uneasy new norm in cybersecurity strategy.
Impact Analysis
- Instructure’s deal with hackers marks a major departure from traditional corporate cybersecurity responses.
- The approach raises concerns about the safety of user data and the effectiveness of negotiating with cybercriminals.
- This incident underscores the difficult choices companies face when critical data is compromised and leverage is lost.



