Canvas Company Pays Hackers to Protect Data

A2

Canvas Company Pays Hackers to Protect Data

Introduction

Instructure makes the Canvas app. They had a deal with a group of hackers called ShinyHunters. The hackers stole data from many schools.

Main Body

On April 29, hackers entered the system. They stole information from 275 million people in many countries. They took names and emails. Some universities could not use Canvas for exams. The hackers said they would share the data. Instructure paid the hackers to stop them. The hackers deleted the data. But the FBI says people should not pay hackers. Now, the US government wants to talk to the company leader. They want to know about the security. In Hong Kong, the police say hackers might use the emails to trick people.

Conclusion

Canvas is working again. The company says the data is gone, but they are not 100% sure.

Learning

⚡ Quick Pattern: Past Actions

In this story, almost every sentence tells us about things that already happened. To move to A2, you need to see how verbs change to show the past.

The 'ED' Rule (Regular) Most words just add -ed at the end:

  • Pay → Paid (Wait! This one is special)
  • Enter → Entered
  • Delete → Deleted

The 'Rule-Breakers' (Irregular) Some words change completely. You must memorize these:

  • Make \rightarrow Made
  • Steal \rightarrow Stole
  • Say \rightarrow Said
  • Take \rightarrow Took

How to use them in a sentence

  • Present: Hackers steal data. (They do it often/now).
  • Past: Hackers stole data. (It happened on April 29).

Vocabulary Connection extCompany ext{Company} \rightarrow A business extData ext{Data} \rightarrow Information (emails, names) extSecurity ext{Security} \rightarrow Keeping things safe

Vocabulary Learning

company (n.)
a business that sells goods or services
Example:The company sells books online.
app (n.)
a software program for a computer or phone
Example:I downloaded a new app for my phone.
data (n.)
facts or information that can be used to learn something
Example:The data shows how many people visited the site.
system (n.)
a set of parts working together
Example:The computer system crashed.
information (n.)
knowledge about something
Example:The teacher gave us information about the trip.
people (n.)
human beings
Example:Many people attended the concert.
countries (n.)
nations or states
Example:She has visited three countries.
names (n.)
words that identify a person or thing
Example:Write down the names of your classmates.
emails (n.)
electronic messages sent through the internet
Example:He sent an email to his friend.
use (v.)
to employ or put into action
Example:You can use this tool to edit photos.
exams (n.)
tests to check learning
Example:The exams will be next week.
share (v.)
to give part of something to others
Example:Please share your notes with the group.
paid (v.)
gave money for something
Example:She paid for the tickets with her card.
stop (v.)
to end or cease
Example:Please stop talking during the movie.
deleted (v.)
removed or erased
Example:I deleted the old files from my computer.
government (n.)
the group that runs a country
Example:The government announced new rules.
security (n.)
protection from danger
Example:Security at the airport was very strict.
B2

Instructure Reaches Agreement with ShinyHunters After Global Canvas Data Breach

Introduction

Instructure, the company that created the Canvas learning management system, has reached an agreement with the cybercrime group ShinyHunters. This deal aims to stop the release of stolen data that affects thousands of schools and universities worldwide.

Main Body

The problem began on April 29, when ShinyHunters used a weakness in 'Free for Teacher' accounts to enter the system. Consequently, they stole data from about 275 million people across 9,000 institutions in the US, Canada, Australia, the UK, and Hong Kong. This information included names, email addresses, and internal messages. Furthermore, the breach caused major disruptions, as the platform was temporarily unavailable, which delayed final exams at universities such as the University of Toronto and the University of Illinois. To prevent the hackers from publishing several terabytes of data, Instructure decided to settle with the group. Although the company did not officially confirm a payment, the fact that the data was removed from the hackers' site suggests a financial deal was made. However, this action goes against advice from law enforcement agencies like the FBI, which emphasize that paying ransoms is risky because there is no guarantee the data will be deleted. Following the breach, government officials have increased their scrutiny. The U.S. House Homeland Security Committee has asked CEO Steve Daly for a formal meeting to discuss how the company worked with federal authorities. Additionally, expert vendors are now reviewing the system to make the infrastructure more secure. In Hong Kong, authorities warned that the stolen data could be used for advanced phishing attacks against 72,000 affected people.

Conclusion

Instructure has now restored Canvas operations and claims the data was returned and destroyed. Nevertheless, the company admits that it is impossible to be completely certain that such agreements are followed.

Learning

🚀 The 'Logic Glue' Shift

At the A2 level, you likely connect ideas with simple words like and, but, or because. To reach B2, you need Connectors of Consequence and Contrast. These are the 'glue' that make your English sound professional and fluid rather than like a list of short sentences.

🛠️ The Power-Up: Moving Beyond 'But' and 'So'

Look at how the article upgrades basic logic to B2-level transitions:

A2 (Simple)B2 (Professional)Effect
So...Consequently,Shows a direct, formal result.
Also...Furthermore,Adds a heavy piece of new information.
But...Nevertheless,Creates a strong contrast after a fact.
And...Additionally,Introduces an extra point clearly.

🔍 Deconstructing the Text

1. The Result Chain: Text: "...they stole data... Consequently, they stole data from about 275 million people." Why it works: Instead of saying "So they stole data," using Consequently tells the reader that the second event happened because of the first specific action. It sounds like an official report.

2. The 'Yes, but...' Pivot: Text: "...claims the data was returned... Nevertheless, the company admits..." Why it works: Nevertheless is the 'B2 version' of however. It acknowledges that while the first part is true (the data was returned), there is still a problem (we can't be certain). It adds a layer of skepticism and sophistication to your speaking.

💡 Pro-Tip for your Transition

Stop starting your sentences with "And" or "But" in writing. Try this swap:

  • Instead of "But I don't agree," \rightarrow "However, I disagree."
  • Instead of "So I went home," \rightarrow "Consequently, I returned home."

Vocabulary Spotlight: "Scrutiny" In the text, officials increased their scrutiny. A2 meaning: They looked at it very carefully. B2 meaning: A detailed and critical examination of something. Use this word when talking about a boss, a teacher, or a government checking your work!

Vocabulary Learning

agreement (n.)
A negotiated arrangement between parties.
Example:The company signed an agreement to compensate the victims.
cybercrime (n.)
Illegal activities carried out using computers.
Example:Cybercrime has increased with the rise of online banking.
release (v.)
To make something available to the public.
Example:The software will release a new update next week.
stolen (adj.)
Taken illegally.
Example:The stolen documents were found in a hidden folder.
institutions (n.)
Organizations such as schools or universities.
Example:Many institutions adopted the new policy.
disruptions (n.)
Interruptions that disturb normal operations.
Example:The power outage caused major disruptions in the city.
temporarily (adv.)
For a short period of time.
Example:The bridge was closed temporarily for repairs.
delayed (adj.)
Made to happen later than planned.
Example:The delayed flight arrived an hour late.
settle (v.)
To resolve a dispute by agreement.
Example:They decided to settle the disagreement with a compromise.
financial (adj.)
Relating to money or finances.
Example:The financial report showed a surplus.
risk (n.)
The possibility of danger or loss.
Example:Investing in stocks carries a certain risk.
guarantee (n.)
A promise that something will happen.
Example:The warranty provides a guarantee against defects.
scrutiny (n.)
Close examination or inspection.
Example:The new policy faced scrutiny from experts.
committee (n.)
A group appointed to decide on issues.
Example:The committee will meet next Monday.
formal (adj.)
Official and following established rules.
Example:He gave a formal speech at the ceremony.
infrastructure (n.)
Basic physical and organizational structures.
Example:The city’s infrastructure needs upgrading.
secure (adj.)
Protected from danger or harm.
Example:The data was secured with encryption.
phishing (n.)
A fraudulent attempt to obtain sensitive information.
Example:The email was a classic phishing attempt.
advanced (adj.)
Highly developed or complex.
Example:They used advanced technology to solve the problem.
operations (n.)
Work or activities performed.
Example:The company’s operations are expanding worldwide.
impossible (adj.)
Not able to happen or be done.
Example:It is impossible to finish the project in one day.
certain (adj.)
Known or sure.
Example:I am certain that we will win.
C2

Instructure Negotiates Settlement with ShinyHunters Following Global Canvas Data Breach

Introduction

Instructure, the developer of the Canvas learning management system, has reached an agreement with the cybercrime group ShinyHunters to prevent the dissemination of stolen data affecting thousands of educational institutions worldwide.

Main Body

The incident commenced on April 29, when ShinyHunters exploited a vulnerability associated with 'Free for Teacher' accounts to compromise the system. This breach resulted in the unauthorized acquisition of data pertaining to approximately 275 million individuals across 9,000 institutions in the United States, Canada, Australia, the United Kingdom, and Hong Kong. The compromised information included student and staff names, email addresses, enrollment details, and internal platform communications. The operational impact was significant, as the platform's temporary unavailability disrupted final examinations and academic workflows at various universities, including the University of Toronto and the University of Illinois. In response to threats to publish between 3.5 and 6.65 terabytes of data, Instructure entered into a settlement with the unauthorized actors. Although the company has not explicitly confirmed the transfer of funds, the removal of the data from the hackers' leak site and the provision of 'shred logs' as digital confirmation of destruction strongly suggest a financial rapprochement. This action contradicts established guidance from law enforcement agencies, such as the FBI, which advise against ransom payments due to the lack of guarantee regarding data erasure and the potential to incentivize subsequent attacks. Institutional and regulatory scrutiny has intensified following the breach. The U.S. House Homeland Security Committee has requested a formal briefing from CEO Steve Daly regarding the adequacy of the company's coordination with CISA and federal law enforcement. Furthermore, the incident has prompted a forensic review by expert vendors to harden the system's infrastructure. In Hong Kong, authorities have warned that the leaked data may facilitate sophisticated phishing campaigns targeting the 72,000 affected individuals.

Conclusion

Instructure has restored Canvas operations and claims the data has been returned and destroyed, although the company acknowledges that absolute certainty in such agreements is unattainable.

Learning

The Architecture of Euphemism and Clinical Precision

At the C2 level, mastery is not about using 'big words,' but about the strategic manipulation of tone to navigate high-stakes corporate and legal environments. This text is a masterclass in denotative shielding—the use of precise, formal language to sanitize a catastrophic failure.

🧩 The 'Sanitization' Pivot

Observe the transition from the visceral reality of a "ransom payment" to the academic abstraction used by the author:

"...strongly suggest a financial rapprochement."

C2 Analysis: Rapprochement typically refers to the restoration of friendly relations between nations. By deploying this term in a cybercrime context, the writer achieves a double-effect: it maintains a sophisticated, detached register while subtly mocking the absurdity of a corporation "making peace" with criminals. This is Lexical Displacement—using a term from a completely different domain (diplomacy) to describe a transactional exchange (bribery/ransom).

🔍 Precision via Nominalization

B2 students rely on verbs (the system was broken). C2 masters utilize nominalization to create an objective, authoritative distance.

  • “The unauthorized acquisition of data” \rightarrow instead of “They stole the data.”
  • “Institutional and regulatory scrutiny has intensified” \rightarrow instead of “People are investigating them more.”

By turning actions into nouns, the writer removes the 'agent' and focuses on the 'phenomenon.' This is the hallmark of Institutional English, where the goal is to report facts without assigning emotive blame.

⚡ The 'Hedge' of Absolute Uncertainty

Note the final clause:

"...acknowledges that absolute certainty in such agreements is unattainable."

This is a modal qualifier. A B2 student might say "they aren't sure if the data is gone." The C2 writer uses "unattainable," which shifts the failure from a human error (not knowing) to a philosophical impossibility (the nature of digital data). This transforms a liability into a systemic constant.

Vocabulary Learning

exploited (v.)
to make use of a situation or resource for one's advantage, often in a harmful or unethical way
Example:The attackers exploited the system's vulnerability to infiltrate the database.
vulnerability (n.)
a weakness or flaw that can be exploited to gain unauthorized access or cause damage
Example:The software's vulnerability was patched after the breach.
unauthorized (adj.)
not permitted or approved by authority
Example:The unauthorized acquisition of data raised legal concerns.
acquisition (n.)
the act of obtaining or gaining possession of something
Example:The acquisition of sensitive records was conducted without permission.
dissemination (n.)
the act of spreading or distributing information widely
Example:The company was concerned about the dissemination of confidential data.
unavailability (n.)
state of being unavailable or not accessible
Example:The platform's unavailability disrupted students' coursework.
disrupted (adj.)
interrupted or disturbed from normal operation
Example:The disruption of exams caused widespread confusion.
workflow (n.)
a series of tasks or steps that constitute a process
Example:The academic workflow was halted by the system outage.
terabytes (n.)
units of digital information equal to one trillion bytes
Example:The hackers threatened to publish between 3.5 and 6.65 terabytes of data.
settlement (n.)
an agreement reached to resolve a dispute
Example:Instructure entered into a settlement with the hackers.
explicitly (adv.)
clearly and directly stated
Example:The company did not explicitly confirm the transfer of funds.
confirmation (n.)
act of affirming or verifying something
Example:The shred logs served as digital confirmation of destruction.
shred logs (n.)
records indicating data has been shredded
Example:The shred logs proved that the data had been destroyed.
financial (adj.)
relating to money or economics
Example:The settlement had significant financial implications.
rapprochement (n.)
a friendly agreement or reconciliation between parties
Example:The financial rapprochement was seen as a concession.
contradicts (v.)
to oppose or be in conflict with
Example:The action contradicts established guidance from law enforcement.
guidance (n.)
advice or instructions provided by authorities
Example:The guidance advised against ransom payments.
enforcement (n.)
the act of ensuring compliance with laws or rules
Example:Law enforcement agencies were involved in the investigation.
ransom (n.)
a payment demanded for the release of something
Example:Ransom payments can incentivize future attacks.
erasure (n.)
the act of deleting or removing data
Example:The lack of guarantee regarding data erasure was a concern.