Skip to the content
  • Why Vertex
    • Your Trusted Partner
    • Humanitix Case Study
    • Give Back
    • Careers
  • Penetration Testing
  • ISO27001
  • Cyber Training
  • Solutions
    • Startups, Scaleups & FinTechs
    • Small & Medium Enterprises
    • Expertise in Education
    • Cyber Security Audit
    • Incident Response
    • Managed Services
  • News
  • Contact
  • Why Vertex
    • Your Trusted Partner
    • Humanitix Case Study
    • Give Back
    • Careers
  • Penetration Testing
  • ISO27001
  • Cyber Training
  • Solutions
    • Startups, Scaleups & FinTechs
    • Small & Medium Enterprises
    • Expertise in Education
    • Cyber Security Audit
    • Incident Response
    • Managed Services
  • News
  • Contact
LOG IN

Can You Trust a Hacker’s Promise? The Reality Behind the Canvas Data Breach Ransom Payment

In recent news, Instructure, the organisation behind the widely utilised Canvas learning platform, announced that it had reached a financial agreement with cyber criminals following a massive data breach. The incident involved the theft of 3.5 terabytes of student and university data. In an effort to protect those affected, the company made a payment to receive digital confirmation that the stolen information had been destroyed. While the intent to safeguard individuals is entirely understandable, this incident highlights a fundamental dilemma in modern cyber security: can an organisation ever truly trust the promise of an extortionist?

Funding the Cycle of Cyber Crime

When an organisation decides to pay a ransom for data deletion, they are directly financing the operations of cyber criminals. This capital provides malicious groups with the resources required to develop more sophisticated tools and target additional businesses. From an ethical perspective, providing millions of dollars to these syndicates is increasingly viewed as a form of assistance to criminal networks. Some security analysts even compare the financial support of cyber syndicates to funding extremist or terrorist activities, as it sustains criminal entities that actively undermine public safety and critical digital infrastructure.

The Broken Moral Compass: Extortion versus Ethical Research

To understand why paying for data deletion is fundamentally flawed, one must consider the psychology of individuals who exfiltrate data for profit. A criminal who resorts to extortion has already demonstrated that they operate entirely without a moral compass. There is no psychological compulsion or ethical code that would force them to honour an agreement to delete stolen files.

This situation is entirely different from interacting with legitimate security researchers. In a structured bug bounty programme, ethical researchers identify vulnerabilities and report them responsibly to an organisation. In those instances, paying a standard bounty and requesting the deletion of any testing data is a recognised and acceptable practice, because the researcher operates within an established framework of trust. Conversely, once a threat actor crosses the line into extortion, any expectation of honesty or integrity is completely lost.

The Reality of Extortion Operations

Historical precedents consistently show that cyber criminals routinely lie about destroying stolen information. For instance, when international law enforcement agencies successfully infiltrated the servers of the notorious LockBit ransomware group, they discovered a startling truth. Even though numerous victim organisations had paid significant ransoms, the criminals had retained the stolen data rather than deleting it. The information remained stored on their servers, perfectly positioned for future resale on the dark web or for secondary extortion attempts. Once data leaves a corporate network, all control over its distribution is effectively gone, regardless of any digital confirmation received.

Building Proactive Cyber Protections

Rather than relying on the compliance of criminals after a breach has occurred, organisations must focus on implementing robust, preventative defenses. Enhancing an enterprise security posture requires a proactive strategy that minimises vulnerabilities before they can be exploited.

Organisations seeking to strengthen their resilience could consider the following measures:

  • Comprehensive Security Assessments: Regular evaluations of internal systems and employee workflows can help identify potential entry points for threat actors.
  • Advanced Penetration Testing: Simulating sophisticated cyber attacks allows organisations to discover hidden weaknesses in their networks and cloud environments.
  • Robust Incident Response Frameworks: Establishing clear containment procedures ensures that teams can react rapidly to minimise the impact of an incident without needing to negotiate with extortionists.

Partnering for Secure Operations

Navigating the complexities of data protection and threat mitigation requires expert guidance and a continuous commitment to security. Relying on post-incident agreements cannot replace a properly designed defensive framework.

If you are concerned about your current security configuration or wish to review your information protection strategies, the expert team at Vertex Cyber Security is available to assist. Consider contacting Vertex to explore tailored strategies that focus on genuine, long-term protection for your organisation. You can visit the official website at www.vertexcybersecurity.com.au or reach out directly via email at for further information.

CATEGORIES

Data Breach

TAGS

Canvas data breach - cyber security protection - data extortion payment - trust hackers

SHARE

SUBSCRIBE

PrevPreviousHow AI Helped Researchers Crack Apple Security in Five Days: The Rise of AI-Driven Cyber Threats
NextThe MiniPlasma Threat: How a Resurfaced Windows Zero-Day Exploit Puts Enterprise Systems at RiskNext

Follow Us!

Facebook Twitter Linkedin Instagram
Cyber Security by Vertex, Sydney Australia

Your partner in Cyber Security.

Terms of Use | Privacy Policy

Accreditations & Certifications

blank
blank
blank
blank
blank
  • 1300 229 237
  • Suite 10 30 Atchison Street St Leonards NSW 2065
  • 477 Pitt Street Sydney NSW 2000
  • 121 King St, Melbourne VIC 3000
  • Lot Fourteen, North Terrace, Adelaide SA 5000
  • Level 2/315 Brunswick St, Fortitude Valley QLD 4006, Adelaide SA 5000

(c) 2026 Vertex Technologies Pty Ltd (ABN: 67 611 787 029). Vertex is a private company (beneficially owned by the Boyd Family Trust).

download (2)
download (4)

We acknowledge Aboriginal and Torres Strait Islander peoples as the traditional custodians of this land and pay our respects to their Ancestors and Elders, past, present and future. We acknowledge and respect the continuing culture of the Cammeraygal people of the Eora nation and their unique cultural and spiritual relationships to the land, waters and seas.

We acknowledge that sovereignty of this land was never ceded. Always was, always will be Aboriginal land.