Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms

February 7, 2026

Researchers Uncover Chrome Extensions Abusing Affiliate Links and Stealing ChatGPT Access

February 7, 2026

China-Linked UAT-8099 Targets IIS Servers in Asia with BadIIS SEO Malware

February 7, 2026
Facebook X (Twitter) Instagram
Saturday, February 7
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»JLR Extends Production Halt After Cyber-Attack
News

JLR Extends Production Halt After Cyber-Attack

Team-CWDBy Team-CWDSeptember 17, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


Jaguar Land Rover (JLR) has confirmed it will extend its production pause until at least September 24 following a cyber-attack earlier this month.

Supply chain disruptions continue to ripple outward as firms that support the luxury car maker begin to suffer financially.

There have been reports of supply chain workers impacted by the cyber-attack at JLR being laid off. JLR employees are not at risk of losing their jobs.

A leading British workers union, Unite, has called for the UK government to step in and provide a furlough scheme for those at risk of losing their jobs because of the incident.

Trevor Dearing, director of critical infrastructure at Illumio, commented, “JLR is no doubt an anchor for local industry. Most organizations don’t have Tata’s [JLR’s parent company] financial safety net behind them, so for suppliers this prolonged downtime will mean that cashflows will dry up fast. This will be damaging not just for the supply chain, but also for when JLR finally comes back online. Some of those businesses may not be there to restart and make recovery even slower and more painful.”

The cause of the disruption lies in the fact that modern automotive manufacturers operate a ‘just-in-time’ logistics and parts supply strategy.

Rather than stockpiling parts, interconnected third party systems receive updates for stock deliveries for vehicles that are being manufactured at the JLR sites. 

Some small businesses within the wider JLR supply chain rely solely on JLR for contracts.

Simon Chassar, interim COO at cybersecurity firm e2e-assure, noted, “By ‘pulling the plug’ JLR may have saved the amount of effort required by an incident response company to wipe, clean and recover the entire systems affected from backups with minimal data loss. However, it will unfortunately still take weeks to fully restart and to get back to where they were before the cyber-attack but with updated cyber protections and patches to limit a follow-on attack.”

“For other manufacturers this is a wakeup call; cybercriminals are targeting operational resilience in manufacturing for financial gain as they know it is painful to protect and recover from,” Chasser said.

On September 10, JLR confirmed that some data had been affected during the incident, and the firm was informing the relevant regulators.

A cybercriminal group linked to Scattered Spider has claimed responsibility for the incident.

Those claiming responsibility are operating under the moniker Scattered Lapsus$ Hunters, a possible collaboration between Scattered Spider, ShinyHunters and Lapsus$. 

Image credit: George Trumpeter / Shutterstock.com



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous Article20 Popular npm Packages With 2 Billion Weekly Downloads Compromised in Supply Chain Attack
Next Article TOR-Based Cryptojacking Attack Expands Through Misconfigured Docker APIs
Team-CWD
  • Website

Related Posts

News

CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms

February 7, 2026
News

Researchers Uncover Chrome Extensions Abusing Affiliate Links and Stealing ChatGPT Access

February 7, 2026
News

China-Linked UAT-8099 Targets IIS Servers in Asia with BadIIS SEO Malware

February 7, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

Why you should never pay to get paid

September 15, 2025

2025’s most common passwords were as predictable as ever

January 21, 2026

Children and chatbots: What parents should know

January 23, 2026

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.