Today : Sep 07, 2025
Business
05 September 2025

Jaguar Land Rover Factories Halted By Major Cyber Attack

A coordinated hack by a notorious group has crippled JLR’s UK operations, disrupting production, sales, and repairs during a crucial sales period.

Jaguar Land Rover (JLR), the renowned British luxury car manufacturer owned by India’s Tata Motors, has been thrown into turmoil following a major cyber-attack that began on Sunday, August 31, 2025. The attack has not only halted vehicle production at JLR’s two flagship UK plants—Halewood in Merseyside and Solihull in the West Midlands—but has also disrupted operations at the company’s engine manufacturing centre in Wolverhampton, sending shockwaves through the automotive and retail sectors alike.

The timing couldn’t have been worse. The attack coincided with the release of the latest batch of new registration plates on Monday, September 1, a period that traditionally sees a surge in consumer demand for new vehicles. According to BBC, JLR’s retail business was badly hit at this crucial moment, with both production and car sales severely disrupted. In a bid to minimize the damage, JLR took the drastic step of shutting down its IT systems almost immediately after detecting the breach.

"We took immediate action to mitigate its impact by proactively shutting down our systems. We are now working at pace to restart our global applications in a controlled manner," the company said in a statement. As a result, factory staff were instructed to stay home until at least Tuesday, September 9, as reported by The Independent. The situation remains under review, and there’s a possibility that output could remain suspended even longer.

JLR’s decision to halt operations was not made lightly. The company’s IT shutdown has had a cascading effect, extending well beyond its own production lines. Parts suppliers have been forced to restrict their operations, and repair garages are struggling to source necessary components. James Wallis of Nyewood Express, an independent garage in West Sussex, described the predicament on the BBC’s Today programme: "Essentially the parts list is a giant database of items that relates to every single car. And if I can't find the parts, I can't buy them. I can't fix the car." He added, "If you need parts which come from just one source and you can't find them, you can't order them. The job stops. You cannot repair the car. The car sits idle, and the poor old customer has to wait."

Dealerships and garages across the UK are facing similar headaches, unable to process repairs or order new parts for customers. Some have voiced their frustration over a perceived lack of transparency from JLR regarding the ongoing crisis. Meanwhile, the company is introducing work-arounds where possible, but the process of restoring its systems is proving to be highly complex.

On Wednesday, September 3, a hacker group styling itself as "Scattered Lapsus$ Hunters" claimed responsibility for the attack. This group, reportedly a combination of three English-speaking hacking collectives—Scattered Spider, Lapsus$, and ShinyHunters—has previously been linked to high-profile cyber incidents targeting British retailers such as Marks & Spencer and the Co-op. According to BBC and The Telegraph, the group posted screenshots purporting to be from JLR’s internal IT systems, including instructions for troubleshooting car charging issues and internal computer logs. Security experts believe these images indicate unauthorized access to information that should have been tightly restricted.

Despite the hackers’ boasts and the tangible evidence of their incursion, JLR maintains that there is currently no evidence any customer data has been stolen. "At this stage there is no evidence any customer data has been stolen but our retail and production activities have been severely disrupted," the company reiterated in a public statement. The National Crime Agency has confirmed its awareness of the incident and is working with partners to better understand its impact.

The motivations behind the attack remain unclear. Ransom demands are not uncommon in such cases, and the value of sensitive customer data is well-known, but JLR has not disclosed whether any ransom has been demanded or paid. The company’s parent, Tata Motors, referred to the event as an "IT security incidence" causing "global" issues in a filing to the Bombay Stock Exchange.

Ironically, JLR had taken steps in 2023 to bolster its cybersecurity, signing a five-year, £800 million deal with Tata Consultancy Services to "accelerate digital transformation across its business" and provide a range of IT services, including cybersecurity. Yet, as this incident demonstrates, even robust investments in cyber defense are not always enough to ward off determined attackers.

The fallout from the cyber-attack is adding to JLR’s recent woes. The company has been grappling with a slump in profits, largely attributed to increased costs from US tariffs and weak consumer confidence in the sector. As The Independent points out, the cyber-attack is just the latest setback for the automaker, which has also faced challenges from global supply chain issues and shifting market dynamics in the wake of Brexit and the COVID-19 pandemic.

For now, the company is working "at pace" to restart operations across its retail and production sites. While JLR’s US operations have not been impacted to the same extent—retailers there remain up and running, according to a spokesperson—the disruption in the UK is having ripple effects throughout the automotive industry. Parts suppliers, repair garages, and customers are all feeling the strain, with some vehicle handovers delayed and existing owners facing longer waits for repairs.

It’s a scenario that’s becoming all too familiar in the UK business landscape. The attack on JLR follows a spate of cyber incidents targeting major retailers, including Marks & Spencer—where online sales were halted for six weeks and the company warned of a potential £300 million hit. Four young people were arrested in connection with those attacks earlier this year, but the threat from organized cybercriminal groups remains ever-present.

As the investigation continues, JLR and its partners in law enforcement are working to determine the full extent of the breach and to bring those responsible to justice. In the meantime, the company’s priority is to restore normal operations as quickly and safely as possible, while keeping customers and staff informed of developments. The hope is that, with lessons learned and systems strengthened, JLR can weather this storm and emerge more resilient against future cyber threats.

For a company that has long prided itself on engineering excellence and cutting-edge technology, the road to recovery will require not just technical fixes, but also renewed trust from customers, employees, and partners alike.