Jaguar Land Rover says IT disruption set to continue
The automotive manufacturer is still not fully operational after the recent cyber attack
Jaguar Land Rover (JLR) is extending its production shutdown for another week as it works to restore impacted systems following a cyber attack in late August.
"Today we have informed colleagues, suppliers and partners that we have extended the current pause in our production until Wednesday 24th September 2025," a JLR statement said.
“We have taken this decision as our forensic investigation of the cyber incident continues, and as we consider the different stages of the controlled restart of our global operations, which will take time."
30% off Keeper Security's Business Starter and Business plans
Keeper Security is trusted and valued by thousands of businesses and millions of employees. Why not join them and protect your most important assets while taking advantage of this special offer?
The UK-based car manufacturer first revealed it was attacked on 2 September, initially shutting down systems to thwart attackers. This resulted in severe disruption for production lines at a spate of locations, including Solihull and Wolverhampton.
Last week, however, the manufacturer admitted that some data may have been accessed by hackers.
JLR hasn't identified any specific group or actor for the attack, though the Scattered Lapsus$ Hunters group has claimed responsibility with cryptic posts on Telegram, where it has also suggested ransomware was used on the JLR IT systems.
Data theft could come back to haunt Jaguar Land Rover
Cyber attacks that target and disrupt the production infrastructure of large manufacturers demonstrate just how intertwined cybersecurity and business resilience need to be, according to James McQuiggan, the CISO advisor at KnowBe4.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
"When core systems are taken offline, the impact cascades through employees, suppliers, and customers, showing that business continuity and cyber defence should be indivisible,” McQuiggan said.
Beyond the immediate disruption, however, data theft during such incidents increases the long-term risks, from reputational damage to regulatory consequences, McQuiggan explained.
He advised organizations to regularly test and update their business continuity and incident response plans, strengthen supply chain risk assessments, and adopt zero trust principles to limit attacker movement.
“Just as important is addressing human risk, as social engineering remains the leading entry point for attackers,” McQuiggan said.
“Ongoing security awareness, phishing simulations, and behavior analysis of users in a human risk management program help users recognize and resist malicious tactics. By combining strong technical controls with a culture of cyber resilience, organizations can reduce their exposure and recover with greater confidence."
Make sure to follow ITPro on Google News to keep tabs on all our latest news, analysis, and reviews.
MORE FROM ITPRO
Bobby Hellard is ITPro's Reviews Editor and has worked on CloudPro and ChannelPro since 2018. In his time at ITPro, Bobby has covered stories for all the major technology companies, such as Apple, Microsoft, Amazon and Facebook, and regularly attends industry-leading events such as AWS Re:Invent and Google Cloud Next.
Bobby mainly covers hardware reviews, but you will also recognize him as the face of many of our video reviews of laptops and smartphones.
-
Trump's AI executive order could leave US in a 'regulatory vacuum'News Citing a "patchwork of 50 different regulatory regimes" and "ideological bias", President Trump wants rules to be set at a federal level
-
TPUs: Google's home advantageITPro Podcast How does TPU v7 stack up against Nvidia's latest chips – and can Google scale AI using only its own supply?
-
LastPass hit with ICO fine after 2022 data breach exposed 1.6 million users – here’s how the incident unfoldedNews The impact of the LastPass breach was felt by customers as late as December 2024
-
Researchers claim Salt Typhoon masterminds learned their trade at Cisco Network AcademyNews The Salt Typhoon hacker group has targeted telecoms operators and US National Guard networks in recent years
-
Trend Micro issues warning over rise of 'vibe crime' as cyber criminals turn to agentic AI to automate attacksNews Trend Micro is warning of a boom in 'vibe crime' - the use of agentic AI to support fully-automated cyber criminal operations and accelerate attacks.
-
Cyber budget cuts are slowing down, but that doesn't mean there's light on the horizon for security teamsNews A new ISC2 survey indicates that both layoffs and budget cuts are on the decline
-
NCSC issues urgent warning over growing AI prompt injection risks – here’s what you need to knowNews Many organizations see prompt injection as just another version of SQL injection - but this is a mistake
-
Chinese hackers are using ‘stealthy and resilient’ Brickstorm malware to target VMware servers and hide in networks for months at a timeNews Organizations, particularly in the critical infrastructure, government services, and facilities and IT sectors, need to be wary of Brickstorm
-
AWS CISO Amy Herzog thinks AI agents will be a ‘boon’ for cyber professionals — and teams at Amazon are already seeing huge gainsNews AWS CISO Amy Herzog thinks AI agents will be a ‘boon’ for cyber professionals, and the company has already unlocked significant benefits from the technology internally.
-
15-year-old revealed as key player in Scattered LAPSUS$ HuntersNews 'Rey' says he's trying to leave Scattered LAPSUS$ Hunters and is prepared to cooperate with law enforcement

