Jaguar Land Rover Cyber Attack: A digital siege on Britain’s automotive crown

JLR hacked

On 31st August 2025, Jaguar Land Rover (JLR), one of Britain’s most iconic automotive manufacturers, was struck by a crippling cyber-attack that forced an immediate halt to production across its UK facilities.

The incident, described by MP Liam Byrne as a ‘digital siege’, has since spiralled into a full-blown supply chain crisis, threatening thousands of jobs and exposing vulnerabilities in the nation’s industrial backbone.

The attack, believed to be a coordinated effort by cybercrime groups Scattered Spider, Lapsus$, and ShinyHunters, targeted JLR’s production systems, rendering them inoperable.

By 1st September, operations were suspended, and by 22nd September 2025, the shutdown had extended to three weeks, with staff instructed to stay home.

A forensic investigation is ongoing, and JLR has delayed its restart timeline until 1st October 2025.

The toll

The financial toll is staggering. Estimates suggest the company is losing £50 million per week. With no cyber insurance in place, JLR has been left scrambling to stabilise its operations and reassure its extensive supplier network—comprising over 120,000 jobs, many in small and medium-sized enterprises.

In response, the UK government has stepped in with a £1.5 billion loan guarantee, backed by the Export Development Guarantee scheme.

This emergency support aims to shore up JLR’s cash reserves, protect skilled jobs in the West Midlands and Merseyside, and prevent collapse among its suppliers.

Business Secretary Peter Kyle and Chancellor Rachel Reeves have both emphasised the strategic importance of JLR to Britain’s economy, calling the intervention a ‘decisive action’ to safeguard the automotive sector.

The cyber attack has also prompted broader questions about industrial cybersecurity, insurance preparedness, and the resilience of supply chains in the face of digital threats.

Unions have urged the government to ensure the loan translates into job guarantees and fair pay, while cybersecurity experts have called the scale of disruption ‘unprecedented’ for a UK-based manufacturer.

🔐 Ten Major Cyber Attacks of 2025

#TargetDateImpact
1️⃣UNFI (United Natural Foods Inc.)JuneDisrupted food supply chains across North America; automated ordering systems collapsed.
2️⃣Bank Sepah (Iran)March42 million customer records stolen; hackers demanded $42M in Bitcoin ransom.
3️⃣TeleMessage (US Gov Messaging App)MayMetadata of officials exposed, including FEMA and CBP; triggered national security alerts.
4️⃣Marks & Spencer (UK)April–MayRansomware attack led to 46-day online outage; £300M profit warning.
5️⃣Co-op (UK)MayIn-store systems crashed; manual tills and supply chain breakdowns across 2,300 stores.
6️⃣Mailchimp & HubSpotAprilCredential theft and phishing campaigns; fake invoices sent to thousands.
7️⃣HertzAprilGlobal breach with unclear UK impact; customer data compromised.
8️⃣Anonymous Data LeakJanuary18.8 million records exposed; no company claimed responsibility.
9️⃣Microsoft SharePoint ServersOngoingExploited by China-linked threat actors; widespread “ToolShell” compromises.
🔟Ingram Micro (IT Distributor)JulyRansomware attack by SafePay group; disrupted global tech supply chains.

As JLR works with law enforcement and cybersecurity specialists to restore operations, the incident stands as a stark reminder: in the digital age, even the most storied brands are vulnerable to invisible adversaries.

Other prominent recent major cyber attacks

#Attack NameTargetImpact
1️⃣Change Healthcare RansomwareU.S. healthcare systemDisrupted nationwide medical services; $22M ransom paid3
2️⃣Snowflake Data BreachAT&T, Ticketmaster, Santander630M+ records stolen; MFA failures exploited3
3️⃣Salt Typhoon & Volt TyphoonU.S. telecom & infrastructureEspionage targeting political figures & critical systems3
4️⃣CrowdStrike-Microsoft OutageGlobal IT servicesMassive disruption due to botched update
5️⃣Synnovis-NHS RansomwareUK healthcare labsHalted blood testing across London hospitals
6️⃣Ascension Ransomware AttackU.S. hospital chainPatient care delays; data exfiltration
7️⃣MediSecure BreachAustralian e-prescription providerSensitive medical data leaked
8️⃣Ivanti Zero-Day ExploitsGlobal VPN usersNation-state actors exploited vulnerabilities
9️⃣TfL Cyber AttackTransport for LondonInternal systems disrupted; public services affected
🔟Internet Archive AttackDigital preservation siteAttempted deletion of historical records

Cyber-attack affects law firms

Hacker

A recent cyber-attack on CTS, a company that provides IT services to law firms and other organisations in the UK legal sector. 

It was reported the cyberattack occurred on Wednesday, 22nd November 2023, and caused a widespread outage that affected dozens of law firms and homebuyers. 

The cyberattack was reportedly caused by a CitrixBleed bug that has targeted other firms in recent weeks. 

CTS said that it was working with a global leader in cyber forensics to investigate the incident and restore the services as soon as possible. 

The cyberattack has raised concerns over the security and integrity of the data and systems of the legal sector, as well as the potential impact on the transactions and completions of the homebuyers.

The problem at CTS is having a knock-on effect on the firms involved in property completions. It is thought around 80 law firms have been affected.

Cybersecurity

Hack attack!

Cybersecurity is a very important and relevant topic in today’s world. It refers to the practice of protecting systems, networks, and programs from digital attacks that can harm individuals and organizations.

Cyberattacks will all have malicious intent, such as accessing, changing, or destroying sensitive information; extorting money from users via ransomware; or interrupting normal business processes.

Cybersecurity aims to prevent or mitigate these attacks by using various technologies, measures, and practices.

There are many types of cybersecurity, depending on the domain or layer of IT infrastructure that needs to be protected.

Critical infrastructure security

This protects the computer systems, applications, networks, data and digital assets that a society depends on for national security, economic health and public safety. For example, the power grid, the water supply, the transportation system, the health care system, etc. 

In the United States, there are some guidelines and frameworks for IT providers in this area, such as the NIST cybersecurity framework and the CISA guidance.

Network security

This prevents unauthorized access to network resources and detects and stops cyberattacks and network security breaches in progress. For example, firewalls, antivirus software, encryption, VPNs, etc. Network security also ensures that authorized users have secure access to the network resources they need, when they need them.

Application security

This protects applications from cyberattacks by ensuring that they are designed, developed, tested, and maintained with security in mind. For example, code reviews, vulnerability scanning, penetration testing, secure coding practices, etc. Application security also involves educating users about safe and responsible use of applications.

Cyberattacks will all have malicious intent, such as accessing, changing, or destroying sensitive information; extorting money from users via ransomware; or interrupting normal business processes.

There are many more types of cybersecurity, such as cloud security, endpoint security, data security, identity and access management (IAM), etc. Each type of cybersecurity has its own challenges and solutions.

Companies to watch

Cybersecurity companies such as CrowdStrike, Okta, Zscaler and Palo Alto Networks are valuable assets with businesses willing to pay good money to protect against hackers.

Zscaler

Palo Alto Networks

Crowdstrike

Okta

NOTE: Always do your own very careful research – none of these ‘suggestions’ are ‘recommendations’.

Remember: RESEARCH! RESEARCH! RESEARCH!

Hackers to compete for $20 million prize

Hackers

The U.S. cyber hacker challenge is a new initiative launched by the Biden administration in August 2023 to use artificial intelligence (AI) to protect critical U.S. infrastructure from cybersecurity risks. 

The challenge will offer $20 million in prize money and includes collaboration from leading AI companies Anthropic, Google, Microsoft and OpenAI, who will make their technology available for the competition. The challenge was announced at the Black Hat USA hacking conference in Las Vegas.

The competition will consist of three stages

  • Qualifying event in the spring of 2024
  • Semifinal at DEF CON 2024
  • Final at DEF CON 2025 

The competitors will be asked to use AI to secure vital software and open source their systems so that their solutions can be used widely (does that create a risk in itsellf)? The top three teams will be eligible for additional prizes, including a top prize of $4 million for the team that best secures vital software.

The challenge aims to explore what’s possible when experts in cybersecurity and AI have access to a suite of cross-company resources. The U.S. government hopes that the promise of AI can help further secure critical U.S. systems and protect Americans from future cyber attacks!

Limitations and risks using AI for security

However, there are flaws and drawbacks of using AI for cybersecurity, both for the attackers and the defenders.

  • Lack of transparency and explainability: AI systems are often complex and opaque, making it difficult to understand how they make decisions or what factors influence their outputs. This can lead to trust issues, ethical dilemmas, and legal liabilities.
  • Overreliance on AI: AI systems are not infallible and may make mistakes or produce false positives or negatives. Relying too much on AI, without human oversight or verification can result in missed threats, erroneous actions, or unintended consequences.
  • Bias and discrimination: AI systems may inherit or amplify human biases or prejudices that are present in the data, algorithms, or design of the systems. This can result in unfair or discriminatory outcomes, such as excluding certain groups of people from access to services or opportunities, or targeting them for malicious attacks.
  • Vulnerability to attacks: AI systems may be susceptible to adversarial attacks, such as data poisoning, model stealing, evasion, or exploitation. These attacks can compromise the integrity, availability, or confidentiality of the systems, or manipulate them to produce malicious outputs.
  • High cost: Developing and maintaining AI systems for cybersecurity requires a lot of resources, such as computing power, memory, data, and skilled personnel. These resources may not be easily accessible or affordable for many organizations or individual.
AI and cybersecurity systems
‘Well, what do you think of AI and cybersecurity sharing resources’? ‘Ha! playing right into our hands’.

These are some of the flaws of using AI for cybersecurity, but they are not insurmountable. With proper research, regulation, education, and collaboration, AI can be a powerful ally in enhancing cybersecurity and protecting against cyber threats – that is until it takes over, but that will never happen… will it?

Hack Attack! UK’s electoral registers stolen

Hacker

The UK’s elections watchdog has revealed it has been the victim of a complex cyber-attack potentially affecting millions of voters.

The Electoral Commission said unspecified ‘hostile actors‘ had managed to gain access to copies of the electoral registers, from August 2021. Note the word ‘unspecified’ is used – do they even know?

Hackers also broke into its emails and “control systems” but the attack was not discovered until October last year. The watchdog has warned people to watch out for unauthorised use of their data.

The commission said hackers accessed copies of the registers it was holding for research purposes, and for conducting checks on political donors. The commission knew which of its systems were accessible to the hackers, but could not ‘conclusively‘ identify which files may have been accessed.

‘Very sophisticated’ attack

The personal data held on the registers – name and address – did not itself present a ‘high risk‘ to individuals, it added, although it is possible it could be combined with other public information to ‘identify and profile individuals’.

It has not said when the hackers’ access to its systems was stopped, but said they were secured as soon as possible after the attack was identified in October 2022. Why was it left so long to be made public and how long did it take to make systems secure again?

Explaining why it had not made the attack public before now, the commission said it first needed to stop the hackers’ access, examine the extent of the incident and put additional security measures in place.Defending the delay, commission chair John Pullinger said: “If you go public on a vulnerability before you have sealed it off, then you are risking more vulnerabilities.” He is reported to have said the ‘very sophisticated attack involved using software to try and get in and evade our systems’. Well, that clearly worked then.

The world of digital data

He reportedly said that the hackers were not able to alter or delete any information on the electoral registers themselves, which are maintained by registration officers around the country. Information about donations and loans to political parties and registered campaigners is held in a system that is not affected by this incident, the notice added. He understood public concern, and would like to apologise to those affected.

Steps

The commission added that it had taken steps to secure its systems against future attacks, including by updating its login requirements, alert system and firewall policies. The Information Commissioner’s Office, which is responsible for data protection in the UK, said it was urgently investigating.

Labour’s deputy leader Angela Rayner reportedly said: ‘This serious incident must be fully and thoroughly investigated so lessons can be learned‘. Why wouldn’t it be investigated? I dislike it immensely when clueless politicians roll out this ‘standard remark’ as an attempt to demonstrate they ‘know what’s going on’.

Then what? It happens again and we have to… learn more lessons…?

Step up the security – we have the ability!