Ransom Dilemma: Should Companies Pay Cybercriminals? The Instructure Incident Raises Questions

Alex Turner, Technology Editor
6 Min Read
⏱️ 4 min read

**

In an age where cyber threats loom large, the recent ransomware attack on Instructure, the tech firm behind the widely used educational platform Canvas, has ignited a fervent debate over whether firms should capitulate to hackers’ demands. With hundreds of millions of students’ data compromised and academic activities severely disrupted, this incident serves as a stark reminder of the growing sophistication of cybercrime and the tough choices companies face when their systems are under siege.

The Attack Unfolds

Instructure’s troubles began when the notorious hacking group ShinyHunters executed a massive data breach, threatening to leak a staggering 3.6 terabytes of sensitive information. This trove included student ID numbers, email addresses, and personal messages from a staggering 9,000 educational institutions, affecting approximately 275 million students and staff members worldwide. As the fallout from the breach unfolded, many educational providers, including over two dozen Australian universities and schools, were forced to delay assignments and provide extensions as students struggled to access vital portals.

The hacking group had made it clear that unless a ransom was paid, they would unleash the stolen data into the public domain. Following a week of chaos, Instructure announced it had come to a “agreement” with the hackers, though the firm has not confirmed whether a ransom was indeed paid. Observers interpret this ambiguous language as indicative of a financial transaction, but the details remain shrouded in mystery.

The Ransom Debate

The question of whether to pay ransoms is not merely theoretical; it is a pressing dilemma that confronts countless businesses each year. While governments around the globe, including those in the UK, US, and Australia, generally discourage ransom payments, the stark reality is that many organisations ultimately comply to safeguard sensitive information.

The Ransom Debate

Experts suggest that Instructure may have faced ransom demands upwards of £10 million, although negotiations could have tempered this amount. Darren Hopkins, head of cyber at McGrathNicol, noted the careful wording of Instructure’s statements, indicating a strategically crafted message that neither confirms nor denies payment while implying some form of agreement has been reached.

The Risks of Compliance

Paying a ransom comes with its own set of risks. Not only does it potentially finance further criminal activities, but there is also no assurance that compliance will guarantee the secure destruction of stolen data. Luke Irwin, a cybersecurity expert at Aegis, highlights the inherent gamble: “You are taking them at their word that they will commit to those outcomes,” he warns, underscoring the precarious nature of dealings with cybercriminals.

In Australia, where strict regulations around cybercrime are in place, paying a ransom may even be deemed a criminal act under specific circumstances. The Australian government has been vigilant, monitoring ransom payments closely, yet as of January 2026, 75 businesses reported making such payments, with an average ransom of approximately £711,000.

Preparing for the Inevitable

Despite the risks associated with paying ransoms, companies are increasingly recognising the importance of preparing for potential cyberattacks. The McGrathNicol ransomware report indicates that many organisations are now adopting proactive measures to bolster their defences, thereby reducing the likelihood of needing to pay hackers.

Hopkins remarks that businesses are becoming more adept at navigating the complexities of cybercrime. “Canvas was interesting because we all suspected [Instructure] engaged with the threat actor very quickly,” he observes, suggesting that swift action may have mitigated further damage.

The Trust Factor

The central question that often arises in boardrooms when discussing ransom payments is straightforward: Will paying the ransom prevent data exposure? This concern reflects a broader issue of trust in dealings with criminals, where the reliability of hackers is put to the test. “The business model of hackers necessitates a certain level of trust,” Hopkins explains. “If they don’t act in good faith, future victims may be less inclined to pay.”

The Trust Factor

Yet the inherent nature of cybercriminals means that faith should be tempered with caution. Irwin notes, “It is in ShinyHunters’ interest to act in good faith as an example,” but Hopkins counters, stating that organisations cannot afford to rely on the integrity of those who operate outside the law.

Why it Matters

As cyber threats continue to escalate, the Instructure incident serves as a crucial lesson for businesses around the world. The dilemma of whether to pay ransoms not only impacts individual companies but has wider implications for cybersecurity practices across industries. With data breaches becoming increasingly common, organisations must weigh the urgency of immediate recovery against the long-term consequences of empowering cybercriminals. The choices made today will shape the landscape of digital security for years to come, highlighting the need for robust preventative measures and a collective commitment to combatting cybercrime.

Share This Article
Alex Turner has covered the technology industry for over a decade, specializing in artificial intelligence, cybersecurity, and Big Tech regulation. A former software engineer turned journalist, he brings technical depth to his reporting and has broken major stories on data privacy and platform accountability. His work has been cited by parliamentary committees and featured in documentaries on digital rights.
Leave a Comment

Leave a Reply

Your email address will not be published. Required fields are marked *

© 2026 The Update Desk. All rights reserved.
Terms of Service Privacy Policy