Close Menu
Technology Mag

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot
    Sky Sports killed off its female-focused Halo brand after just three days

    Sky Sports killed off its female-focused Halo brand after just three days

    November 16, 2025
    The best gifts for dads that have everything (but deserve more)

    The best gifts for dads that have everything (but deserve more)

    November 16, 2025
    The Asus Falcata is an ambitious split ergo gaming keyboard that falls short

    The Asus Falcata is an ambitious split ergo gaming keyboard that falls short

    November 16, 2025
    Facebook X (Twitter) Instagram
    Subscribe
    Technology Mag
    Facebook X (Twitter) Instagram YouTube
    • Home
    • News
    • Business
    • Games
    • Gear
    • Reviews
    • Science
    • Security
    • Trending
    • Press Release
    Technology Mag
    Home » A Cyberattack on Jaguar Land Rover Is Causing a Supply Chain Disaster
    Security

    A Cyberattack on Jaguar Land Rover Is Causing a Supply Chain Disaster

    News RoomBy News RoomSeptember 29, 20253 Mins Read
    Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Email
    A Cyberattack on Jaguar Land Rover Is Causing a Supply Chain Disaster

    Almost immediately after the cyberattack, a group on Telegram called Scattered Lapsus$ Hunters, claimed responsibility for the hack. The group name implies a potential collaboration between three loose hacking collectives— Scattered Spider, Lapsus$, and Shiny Hunters—that have been behind some of the most high-profile cyberattacks in recent years. They are often made up of young, English-speaking, cybercriminals who target major businesses.

    Building vehicles is a hugely complex process. Hundreds of different companies provide parts, materials, electronics, and more to vehicle manufacturers, and these expansive supply chain networks often rely upon “just-in-time” manufacturing. That means they order parts and services to be delivered in the specific quantities that are needed and exactly when they need them—large stockpiles of parts are unlikely to be held by auto makers.

    “The supplier networks that are supplying into these manufacturing plants, they’re all set up for efficiency—economic efficiency, and also logistic efficiency,” says Siraj Ahmed Shaikh, a professor in systems security at Swansea University. “There’s a very carefully orchestrated supply chain,” Shaikh adds, speaking about automotive manufacturing generally. “There’s a critical dependency for those suppliers supplying into this kind of an operation. As soon as there is a disruption at this kind of facility, then all the suppliers get affected.”

    One company that makes glass sun roofs has started laying off workers, according to a report in the Telegraph. Meanwhile, another firm told the BBC it has laid off around 40 people so far. French automotive company OPmobility, which employs 38,000 people across 150 sites, told WIRED it is making some changes and monitoring the events. “OPmobility is reconfiguring its production at certain sites as a consequence of the shutdown of its production by one of its customers based in the United Kingdom and depending on the evolution of the situation,” a spokesperson for the firm says.

    While it is unclear which specific JLR systems have been impacted by the hackers and what systems JLR took offline proactively, many were likely taken offline to stop the attack from getting worse. “It’s very challenging to ensure containment while you still have connections between various systems,” says Orla Cox, head of EMEA cybersecurity communications at FTI Consulting, which responds to cyberattacks and works on investigations. “Oftentimes as well, there will be dependencies on different systems: You take one down, then it means that it has a knock on effect on another.”

    Whenever there’s a hack in any part of a supply chain—whether that is a manufacturer at the top of the pyramid or a firm further down the pipeline—digital connections between companies may be severed to stop attackers from spreading from one network to the next. Connections via VPNs or APIs may be stopped, Cox says. “Some may even take stronger measures such as blocking domains and IP addresses. Then things like email are no longer usable between the two organizations.”

    The complexity of digital and physical supply chains, spanning across dozens of businesses and just-in-time production systems, means it is likely that bringing everything back online and up to full-working speed may take time. MacColl, the RUSI researcher, says cybersecurity issues often fail to be debated at the highest level of British politics—but adds this time could be different due to the scale of the disruption. “This incident has the potential to cut through because of the job losses and the fact that MPs in constituencies affected by this will be getting calls,” he says. That breakthrough has already begun.

    Share. Facebook Twitter Pinterest LinkedIn WhatsApp Reddit Email
    Previous ArticleTrump’s Tylenol Directive Could Actually Increase Autism Rates, Researchers Warn
    Next Article Amazon’s Echo Pop and Dot speakers are the cheapest they’ve been in months

    Related Posts

    Scam Ads Are Flooding Social Media. These Former Meta Staffers Have a Plan

    Scam Ads Are Flooding Social Media. These Former Meta Staffers Have a Plan

    November 15, 2025
    The Government Shutdown Is a Ticking Cybersecurity Time Bomb

    The Government Shutdown Is a Ticking Cybersecurity Time Bomb

    November 14, 2025
    Zohran Mamdani Just Inherited the NYPD Surveillance State

    Zohran Mamdani Just Inherited the NYPD Surveillance State

    November 12, 2025
    An Anarchist’s Conviction Offers a Grim Foreshadowing of Trump’s War on the ‘Left’

    An Anarchist’s Conviction Offers a Grim Foreshadowing of Trump’s War on the ‘Left’

    November 12, 2025
    FBI Warns of Criminals Posing as ICE, Urges Agents to ID Themselves

    FBI Warns of Criminals Posing as ICE, Urges Agents to ID Themselves

    November 7, 2025
    CBP Searched a Record Number of Phones at the US Border Over the Past Year

    CBP Searched a Record Number of Phones at the US Border Over the Past Year

    November 7, 2025
    Our Picks
    The best gifts for dads that have everything (but deserve more)

    The best gifts for dads that have everything (but deserve more)

    November 16, 2025
    The Asus Falcata is an ambitious split ergo gaming keyboard that falls short

    The Asus Falcata is an ambitious split ergo gaming keyboard that falls short

    November 16, 2025
    The Mysterious Math Behind the Brazilian Butt Lift

    The Mysterious Math Behind the Brazilian Butt Lift

    November 16, 2025
    Tim Cook could step down as Apple CEO next year

    Tim Cook could step down as Apple CEO next year

    November 15, 2025
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo
    Don't Miss
    The Razer Blade 14 Is Still One of the Best Compact Gaming Laptops Games

    The Razer Blade 14 Is Still One of the Best Compact Gaming Laptops

    By News RoomNovember 15, 2025

    The OLED looks great, but one of the benefits of OLED is HDR in gaming,…

    The Steam Machine feels like the TV gaming PC I’ve always wanted

    The Steam Machine feels like the TV gaming PC I’ve always wanted

    November 15, 2025
    Framework’s franken-laptop is back with big chip upgrades and familiar frustrations

    Framework’s franken-laptop is back with big chip upgrades and familiar frustrations

    November 15, 2025
    Pluribus’ third episode throws a bomb into things

    Pluribus’ third episode throws a bomb into things

    November 15, 2025
    Facebook X (Twitter) Instagram Pinterest
    • Privacy Policy
    • Terms of use
    • Advertise
    • Contact
    © 2025 Technology Mag. All Rights Reserved.

    Type above and press Enter to search. Press Esc to cancel.