Duplicate » admin by request

JLR’s Production Crisis Exposes Manufacturing’s Cyber Weakness

inline-2

Jaguar Land Rover’s factories remain shuttered weeks after hackers brought the luxury automaker to its knees. What began as a breach has become a masterclass in how quickly modern manufacturing can collapse when the wrong systems get hit.

The British carmaker hasn’t built a single vehicle since the end of August. Production lines in the UK, China, Slovakia, and India sit idle while cybersecurity teams work around the clock to restore basic operations. Workers have been told to stay home with no clear timeline for when they can return.

The Human Cost Mounts

Behind the headlines about system shutdowns and data breaches are real people facing real consequences. JLR directly employs 33,000 workers in the UK, but the damage spreads much further. Another 104,000 jobs depend on the company’s supply chain, and many of those smaller suppliers are running out of cash fast.

The Unite union warned that some suppliers have taken emergency loans just to pay their staff. Without government intervention, several firms may not survive the extended shutdown.

This isn’t just about one company anymore. When a major manufacturer goes down, entire networks feel the impact. Suppliers can’t access ordering systems. Dealerships can’t register new vehicles. The disruption spreads like a virus through interconnected business relationships.

Who’s Behind the Attack

The hackers call themselves “Scattered Lapsus$ Hunters” – a group that combines three notorious cybercrime collectives. They’re the same crew that hit British retailers like Marks & Spencer earlier this year. Now they’ve claimed responsibility for bringing down one of Britain’s largest manufacturers.

Their timing was intentional. The attack coincided with September’s vehicle registration period, when UK dealerships needed their systems most to register cars with new number plates. Maximum disruption at the worst possible moment.

The group recently announced they’re “ending operations” and taking a break to “enjoy their golden parachutes.” Security experts aren’t buying it. This looks more like a tactical pause while law enforcement pressure mounts.

» admin by request

Manufacturing Under Siege

JLR’s nightmare isn’t unique, and IBM X-Force research shows manufacturing has been the most attacked industry for four straight years.

Recent victims tell the same story. Nucor Corporation, America’s largest steel producer, shut down networks after unauthorized access. Medical device maker Masimo reported reduced manufacturing capacity following a multi-site breach. The pattern is clear: hackers have figured out that hitting manufacturers creates maximum chaos.

Modern factories are incredibly vulnerable because everything connects to everything else. Production systems talk to supplier networks. Quality control systems share data with logistics platforms. When hackers get inside, they can move laterally through these connections to cause widespread damage.

How They Got In

The hackers didn’t need to steal passwords or trick employees. Instead, they exploited a known vulnerability in SAP NetWeaver, third-party software that JLR uses for business operations. The U.S. Cybersecurity and Infrastructure Security Agency had warned about this flaw earlier in 2025, and a patch was available.

Whether JLR applied that patch remains unknown. What we do know is that the attackers chained two specific vulnerabilities (CVE-2025-31324 and CVE-2025-42999) to gain administrative access and execute commands on JLR’s systems. From there, they could move laterally through connected networks.

This type of attack highlights a growing problem in manufacturing: companies rely on complex webs of third-party software that can become single points of failure. When vendors release security updates, organizations often struggle to test and deploy patches quickly across operational environments.

All or Nothing

JLR’s decision to immediately shut down global systems likely prevented the attack from getting worse. The company followed incident response best practices by isolating compromised networks before hackers could spread to additional systems.

But that aggressive containment strategy meant choosing between two bad options: let attackers roam freely through connected systems, or accept complete operational shutdown. JLR chose the nuclear option and has been dealing with the consequences for weeks.

The real lesson is that manufacturing companies need better ways to isolate critical systems when attacks happen. JLR’s all-or-nothing shutdown protected their data but killed their business operations. More granular controls could have limited the damage without bringing down every factory worldwide.

» admin by request

What This Means for Other Manufacturers

JLR’s situation shows what happens when third-party software becomes a backdoor into critical systems. Manufacturing environments are particularly vulnerable because operational systems often can’t be easily updated or taken offline for patching. Companies face a constant trade-off between maintaining production schedules and applying security updates to business-critical software.

The rapid spread of JLR’s shutdown across global operations demonstrates how interconnected modern manufacturing has become. When core business systems fail, everything else fails with them: production lines, supplier ordering, dealer operations, and vehicle registration systems all depend on the same underlying software infrastructure.

JLR still hasn’t given workers a restart date weeks after the initial breach. Suppliers continue burning through cash reserves while waiting for systems to come back online, and the disruption keeps spreading through Britain’s automotive sector.

About the Author:

Picture of Pocholo Legaspi

Pocholo Legaspi

Pocholo Legaspi is a seasoned content marketer and SEO specialist with over nine years of experience crafting digital content that drives engagement and growth. With a background in tech and a Master’s in Business Informatics, he brings a data-driven approach to content strategy and storytelling.

Share this blog to your channels:

Lifetime Free Plan for 25 Endpoints,
No Strings Attached.

Fill out the form to create your account and get started.

Book a Demo

Orange admin by request circle tick logo. » admin by request