Jaguar Land Rover says IT disruption set to continue

The automotive manufacturer is still not fully operational after the recent cyber attack

Jaguar Land Rover dealership sign in Taunton, Somerset, featuring Jaguar logo and Land Rover logo.
(Image credit: Getty Images)

Jaguar Land Rover (JLR) is extending its production shutdown for another week as it works to restore impacted systems following a cyber attack in late August.

"Today we have informed colleagues, suppliers and partners that we have extended the current pause in our production until Wednesday 24th September 2025," a JLR statement said.

“We have taken this decision as our forensic investigation of the cyber incident continues, and as we consider the different stages of the controlled restart of our global operations, which will take time."

30% off Keeper Security's Business Starter and Business plans

30% off Keeper Security's Business Starter and Business plans

Keeper Security is trusted and valued by thousands of businesses and millions of employees. Why not join them and protect your most important assets while taking advantage of this special offer?

The UK-based car manufacturer first revealed it was attacked on 2 September, initially shutting down systems to thwart attackers. This resulted in severe disruption for production lines at a spate of locations, including Solihull and Wolverhampton.

Last week, however, the manufacturer admitted that some data may have been accessed by hackers.

JLR hasn't identified any specific group or actor for the attack, though the Scattered Lapsus$ Hunters group has claimed responsibility with cryptic posts on Telegram, where it has also suggested ransomware was used on the JLR IT systems.

Data theft could come back to haunt Jaguar Land Rover

Cyber attacks that target and disrupt the production infrastructure of large manufacturers demonstrate just how intertwined cybersecurity and business resilience need to be, according to James McQuiggan, the CISO advisor at KnowBe4.

"When core systems are taken offline, the impact cascades through employees, suppliers, and customers, showing that business continuity and cyber defence should be indivisible,” McQuiggan said.

Beyond the immediate disruption, however, data theft during such incidents increases the long-term risks, from reputational damage to regulatory consequences, McQuiggan explained.

He advised organizations to regularly test and update their business continuity and incident response plans, strengthen supply chain risk assessments, and adopt zero trust principles to limit attacker movement.

“Just as important is addressing human risk, as social engineering remains the leading entry point for attackers,” McQuiggan said.

“Ongoing security awareness, phishing simulations, and behavior analysis of users in a human risk management program help users recognize and resist malicious tactics. By combining strong technical controls with a culture of cyber resilience, organizations can reduce their exposure and recover with greater confidence."

Make sure to follow ITPro on Google News to keep tabs on all our latest news, analysis, and reviews.

MORE FROM ITPRO

Bobby Hellard

Bobby Hellard is ITPro's Reviews Editor and has worked on CloudPro and ChannelPro since 2018. In his time at ITPro, Bobby has covered stories for all the major technology companies, such as Apple, Microsoft, Amazon and Facebook, and regularly attends industry-leading events such as AWS Re:Invent and Google Cloud Next.

Bobby mainly covers hardware reviews, but you will also recognize him as the face of many of our video reviews of laptops and smartphones.