Canvas Company Pays Hackers to Protect Data
Canvas Company Pays Hackers to Protect Data
Introduction
Instructure makes the Canvas app. They had a deal with a group of hackers called ShinyHunters. The hackers stole data from many schools.
Main Body
On April 29, hackers entered the system. They stole information from 275 million people in many countries. They took names and emails. Some universities could not use Canvas for exams. The hackers said they would share the data. Instructure paid the hackers to stop them. The hackers deleted the data. But the FBI says people should not pay hackers. Now, the US government wants to talk to the company leader. They want to know about the security. In Hong Kong, the police say hackers might use the emails to trick people.
Conclusion
Canvas is working again. The company says the data is gone, but they are not 100% sure.
Learning
⚡ Quick Pattern: Past Actions
In this story, almost every sentence tells us about things that already happened. To move to A2, you need to see how verbs change to show the past.
The 'ED' Rule (Regular) Most words just add -ed at the end:
- Pay → Paid (Wait! This one is special)
- Enter → Entered
- Delete → Deleted
The 'Rule-Breakers' (Irregular) Some words change completely. You must memorize these:
- Make Made
- Steal Stole
- Say Said
- Take Took
How to use them in a sentence
- Present: Hackers steal data. (They do it often/now).
- Past: Hackers stole data. (It happened on April 29).
Vocabulary Connection A business Information (emails, names) Keeping things safe
Vocabulary Learning
Instructure Reaches Agreement with ShinyHunters After Global Canvas Data Breach
Introduction
Instructure, the company that created the Canvas learning management system, has reached an agreement with the cybercrime group ShinyHunters. This deal aims to stop the release of stolen data that affects thousands of schools and universities worldwide.
Main Body
The problem began on April 29, when ShinyHunters used a weakness in 'Free for Teacher' accounts to enter the system. Consequently, they stole data from about 275 million people across 9,000 institutions in the US, Canada, Australia, the UK, and Hong Kong. This information included names, email addresses, and internal messages. Furthermore, the breach caused major disruptions, as the platform was temporarily unavailable, which delayed final exams at universities such as the University of Toronto and the University of Illinois. To prevent the hackers from publishing several terabytes of data, Instructure decided to settle with the group. Although the company did not officially confirm a payment, the fact that the data was removed from the hackers' site suggests a financial deal was made. However, this action goes against advice from law enforcement agencies like the FBI, which emphasize that paying ransoms is risky because there is no guarantee the data will be deleted. Following the breach, government officials have increased their scrutiny. The U.S. House Homeland Security Committee has asked CEO Steve Daly for a formal meeting to discuss how the company worked with federal authorities. Additionally, expert vendors are now reviewing the system to make the infrastructure more secure. In Hong Kong, authorities warned that the stolen data could be used for advanced phishing attacks against 72,000 affected people.
Conclusion
Instructure has now restored Canvas operations and claims the data was returned and destroyed. Nevertheless, the company admits that it is impossible to be completely certain that such agreements are followed.
Learning
🚀 The 'Logic Glue' Shift
At the A2 level, you likely connect ideas with simple words like and, but, or because. To reach B2, you need Connectors of Consequence and Contrast. These are the 'glue' that make your English sound professional and fluid rather than like a list of short sentences.
🛠️ The Power-Up: Moving Beyond 'But' and 'So'
Look at how the article upgrades basic logic to B2-level transitions:
| A2 (Simple) | B2 (Professional) | Effect |
|---|---|---|
| So... | Consequently, | Shows a direct, formal result. |
| Also... | Furthermore, | Adds a heavy piece of new information. |
| But... | Nevertheless, | Creates a strong contrast after a fact. |
| And... | Additionally, | Introduces an extra point clearly. |
🔍 Deconstructing the Text
1. The Result Chain: Text: "...they stole data... Consequently, they stole data from about 275 million people." Why it works: Instead of saying "So they stole data," using Consequently tells the reader that the second event happened because of the first specific action. It sounds like an official report.
2. The 'Yes, but...' Pivot: Text: "...claims the data was returned... Nevertheless, the company admits..." Why it works: Nevertheless is the 'B2 version' of however. It acknowledges that while the first part is true (the data was returned), there is still a problem (we can't be certain). It adds a layer of skepticism and sophistication to your speaking.
💡 Pro-Tip for your Transition
Stop starting your sentences with "And" or "But" in writing. Try this swap:
- Instead of "But I don't agree," "However, I disagree."
- Instead of "So I went home," "Consequently, I returned home."
Vocabulary Spotlight: "Scrutiny" In the text, officials increased their scrutiny. A2 meaning: They looked at it very carefully. B2 meaning: A detailed and critical examination of something. Use this word when talking about a boss, a teacher, or a government checking your work!
Vocabulary Learning
Instructure Negotiates Settlement with ShinyHunters Following Global Canvas Data Breach
Introduction
Instructure, the developer of the Canvas learning management system, has reached an agreement with the cybercrime group ShinyHunters to prevent the dissemination of stolen data affecting thousands of educational institutions worldwide.
Main Body
The incident commenced on April 29, when ShinyHunters exploited a vulnerability associated with 'Free for Teacher' accounts to compromise the system. This breach resulted in the unauthorized acquisition of data pertaining to approximately 275 million individuals across 9,000 institutions in the United States, Canada, Australia, the United Kingdom, and Hong Kong. The compromised information included student and staff names, email addresses, enrollment details, and internal platform communications. The operational impact was significant, as the platform's temporary unavailability disrupted final examinations and academic workflows at various universities, including the University of Toronto and the University of Illinois. In response to threats to publish between 3.5 and 6.65 terabytes of data, Instructure entered into a settlement with the unauthorized actors. Although the company has not explicitly confirmed the transfer of funds, the removal of the data from the hackers' leak site and the provision of 'shred logs' as digital confirmation of destruction strongly suggest a financial rapprochement. This action contradicts established guidance from law enforcement agencies, such as the FBI, which advise against ransom payments due to the lack of guarantee regarding data erasure and the potential to incentivize subsequent attacks. Institutional and regulatory scrutiny has intensified following the breach. The U.S. House Homeland Security Committee has requested a formal briefing from CEO Steve Daly regarding the adequacy of the company's coordination with CISA and federal law enforcement. Furthermore, the incident has prompted a forensic review by expert vendors to harden the system's infrastructure. In Hong Kong, authorities have warned that the leaked data may facilitate sophisticated phishing campaigns targeting the 72,000 affected individuals.
Conclusion
Instructure has restored Canvas operations and claims the data has been returned and destroyed, although the company acknowledges that absolute certainty in such agreements is unattainable.
Learning
The Architecture of Euphemism and Clinical Precision
At the C2 level, mastery is not about using 'big words,' but about the strategic manipulation of tone to navigate high-stakes corporate and legal environments. This text is a masterclass in denotative shielding—the use of precise, formal language to sanitize a catastrophic failure.
🧩 The 'Sanitization' Pivot
Observe the transition from the visceral reality of a "ransom payment" to the academic abstraction used by the author:
"...strongly suggest a financial rapprochement."
C2 Analysis:
Rapprochement typically refers to the restoration of friendly relations between nations. By deploying this term in a cybercrime context, the writer achieves a double-effect: it maintains a sophisticated, detached register while subtly mocking the absurdity of a corporation "making peace" with criminals. This is Lexical Displacement—using a term from a completely different domain (diplomacy) to describe a transactional exchange (bribery/ransom).
🔍 Precision via Nominalization
B2 students rely on verbs (the system was broken). C2 masters utilize nominalization to create an objective, authoritative distance.
- “The unauthorized acquisition of data” instead of “They stole the data.”
- “Institutional and regulatory scrutiny has intensified” instead of “People are investigating them more.”
By turning actions into nouns, the writer removes the 'agent' and focuses on the 'phenomenon.' This is the hallmark of Institutional English, where the goal is to report facts without assigning emotive blame.
⚡ The 'Hedge' of Absolute Uncertainty
Note the final clause:
"...acknowledges that absolute certainty in such agreements is unattainable."
This is a modal qualifier. A B2 student might say "they aren't sure if the data is gone." The C2 writer uses "unattainable," which shifts the failure from a human error (not knowing) to a philosophical impossibility (the nature of digital data). This transforms a liability into a systemic constant.