Cyberattack forces Jaguar Land Rover to tell staff to stay at home

A cyberattack on the British multinational Jaguar Land Rover (JLR) has forced the luxury car manufacturer to tell factory workers to stay at home until at least Tuesday.

Operations at the company’s production and retail facilities were “severely disrupted” by a cyber incident affecting JLR’s global IT systems, the company announced earlier this week.

As reported by the Liverpool Echo, staff have been stood down from reporting to work on Friday and Monday. JLR has said the shutdown was the result of the company itself proactively taking down its systems to mitigate the impact of the attack.

In its initial statement, JLR said it was “working at pace to restart our global applications in a controlled manner. At this stage there is no evidence any customer data has been stolen but our retail and production activities have been severely disrupted.”

The nature of the incident has not yet been disclosed. A cluster of English-speaking cybercriminals have claimed responsibility on the Telegram messaging app, while providing what they have claimed is data obtained from JLR’s internal systems.

Britain’s data protection regulator, the Information Commissioner’s Office, has confirmed that JLR reported a data breach incident. 

JLR is the latest in a range of British household names to be affected by a cyber incident. Retailers Marks & Spencer, the Co-op and the London-based luxury store Harrods all reported attacks earlier this year that were similarly claimed by English-speaking hackers.

Earlier this year, the National Crime Agency arrested four individuals — one woman and three men — on suspicion of involvement in those ransomware attacks on the retail sector. All four have since been bailed.

JLR reported revenues of £28.99 billion ($38.75 billion) last year and employs more than 39,000 people worldwide. Its pre-tax profits dropped by 49% in the second quarter of this year, partially due to a pause in exports to the United States amid U.S. tariffs.

IndustryNewsNews BriefsCybercrime
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Alexander Martin

is the UK Editor for Recorded Future News. He was previously a technology reporter for Sky News and is also a fellow at the European Cyber Conflict Research Initiative.

 

Total
0
Shares
Previous Post

SAP S/4HANA Critical Vulnerability CVE-2025-42957 Exploited in the Wild

Next Post

CISA orders federal agencies to patch Sitecore zero-day following hacking reports

Related Posts

Oracle EBS Under Fire as Cl0p Exploits CVE-2025-61882 in Real-World Attacks

CrowdStrike on Monday said it's attributing the exploitation of a recently disclosed security flaw in Oracle E-Business Suite with moderate confidence to a threat actor it tracks as Graceful Spider (aka Cl0p), and that the first known exploitation occurred on August 9, 2025. The exploitation involves the exploitation of CVE-2025-61882 (CVSS score: 9.8), a critical vulnerability that facilitates
Read More

Cybercriminals Exploit X’s Grok AI to Bypass Ad Protections and Spread Malware to Millions

Cybersecurity researchers have flagged a new technique that cybercriminals have adopted to bypass social media platform X's malvertising protections and propagate malicious links using its artificial intelligence (AI) assistant Grok. The findings were highlighted by Nati Tal, head of Guardio Labs, in a series of posts on X. The technique has been codenamed Grokking. The approach is designed to
Read More