Back to all incidents

Jaguar Land Rover — production halt

Vishing calls and stale infostealer credentials gave attackers admin access to JLR's SAP systems; ransomware halted five-plant production for five weeks on the UK's busiest plate-change day.

Target
Jaguar Land Rover — production halt
Date public
1 September 2025
Sector
Automotive
Attack type
Ransomware
Threat actor
Scattered Lapsus$ Hunters (claimed)
Severity
High
Region
United Kingdom

In September 2025 hackers brought one of Britain's most famous manufacturers to a standstill — and they didn't need a sophisticated software exploit to do it. They made phone calls. Attackers rang JLR employees pretending to be internal IT staff and convinced them to hand over their login details. They also used a set of stolen credentials that had been sitting on criminal markets since 2021, which still worked because no one had rotated them out. With those credentials, they reached the production systems that run JLR's global factories and deployed ransomware. The timing was deliberate: 1 September is one of the UK's two annual plate-change days, when a large proportion of Britain's new-car registrations complete at once. With JLR's systems down, dealers couldn't register vehicles, deliveries stalled, and customers who had been waiting months for their cars were turned away. Manufacturing itself halted for five weeks across plants in the UK, Slovakia, Brazil and India. Months later, JLR told staff their bank details, tax codes, National Insurance numbers and salary information had also been stolen. Independent estimates put the total economic damage at £1.9 billion, making it the most costly cyberattack in British history.

What happened

On 31 August 2025 attackers began executing ransomware across Jaguar Land Rover’s internal systems. JLR detected the intrusion the following morning — 1 September — and began shutting systems down. The shutdown halted manufacturing at five plants simultaneously: Halewood in Merseyside, and facilities in Slovakia, Brazil, and India. Production did not resume for five weeks. Recovery extended into early 2026. The Cyber Monitoring Centre, which categorises UK cyber incidents by economic impact, assessed total industry-wide damage at £1.9 billion, placing the attack among the most costly cyber incidents ever recorded against a British organisation.

The timing was not accidental. 1 September is one of two UK new plate-change dates — the days when the vehicle registration suffix changes and a large proportion of Britain’s annual new-car orders complete simultaneously. Dealers across the JLR network were unable to push registrations through the manufacturer’s systems on the day demand was highest. Customers with delivery slots, sales staff with targets, and a supply chain that had been building to the date for months all absorbed the disruption at once.

A threat actor group calling itself Scattered Lapsus$ Hunters claimed responsibility via Telegram. JLR has not named a specific actor and no official post-mortem has been published. The picture that follows is drawn from security researcher analysis and material released by the attackers themselves.

How it worked

The intrusion did not start with a software exploit. It started weeks before the attack with a vishing campaign — voice phishing calls in which attackers posed as internal JLR IT staff and convinced employees to hand over their credentials. Several of the accounts obtained this way carried administrative rights, providing the attackers with elevated access before they had even touched JLR’s internal network.

The attackers supplemented the vished credentials with a second and entirely separate source of access that predated the operation by years. Infostealer malware had compromised a JLR employee’s device in 2021, and those credentials had been available on criminal markets ever since. The employee in question had third-party access to JLR’s Jira project management instance. The attackers posted a screenshot of a JLR Jira dashboard in their Telegram channel as early proof of access — a deliberate move to establish credibility with observers and add pressure ahead of their ransom demands.

With credentials in hand across multiple accounts, the attackers moved through the environment without any zero-day or novel technical capability. Weak network segmentation meant that a foothold obtained via a third-party Jira account could be leveraged to reach SAP — the enterprise resource planning platform that manages production scheduling, parts ordering, and supply chain operations across JLR’s global manufacturing footprint. Inadequate detection meant the dwell period between initial access and ransomware deployment went unnoticed. When the ransomware executed, it hit the systems that JLR’s factories depend on to function, taking production planning and logistics offline across five sites at once.

The group that claimed responsibility — Scattered Lapsus$ Hunters — is assessed by security researchers as a merger of three complementary threat actor clusters. Scattered Spider contributed the social engineering and vishing tradecraft used for initial access. LAPSUS$ contributed the extortion methodology and public-facing amplification via Telegram. ShinyHunters contributed data harvesting capability. The combination made the group unusually effective at pairing a human-first intrusion approach with the data exfiltration and ransomware pressure normally associated with more technically sophisticated operations.

Timeline

  • Weeks before 31 August 2025 — Vishing campaign targets JLR employees; attackers pose as internal IT staff and harvest credentials including accounts with admin rights. Separately, 2021 infostealer credentials providing third-party Jira access are sourced from criminal markets.
  • 31 August 2025 — Ransomware deployed across JLR SAP and production systems.
  • 1 September 2025 — JLR detects the intrusion and shuts systems down. Manufacturing halts at Halewood (UK), Slovakia, Brazil, and India. The shutdown falls on UK new plate-change day.
  • 9 September 2025 — House of Commons debate on the JLR attack. The incident receives parliamentary attention within days of becoming public.
  • October 2025 — Cyber Monitoring Centre publishes its assessment, placing total industry impact at £1.9 billion.
  • Five weeks total — Manufacturing at all affected plants suspended; industry cost running at approximately £50 million per week.
  • December 2025 — JLR notifies affected staff that stolen data includes bank details, tax codes, National Insurance numbers, salary information, home addresses, and employment, payroll and benefits records.
  • Early 2026 — Full recovery declared. No post-incident report published.

What defenders should learn

The vishing entry point is the central lesson. JLR’s environment was not compromised through an unpatched server or a misconfigured cloud bucket. It was compromised because employees answered phone calls from people who sounded like colleagues and handed over credentials. Technical controls cannot intercept a conversation. Vishing resistance requires regular, realistic awareness training, strict out-of-band verification procedures for any credential reset or access grant, and a culture where “I need to verify who you are before I do that” is a normal and unremarkable response to any unsolicited request — not an awkward escalation.

The 2021 infostealer credentials are a separate and equally important failure mode. Credentials stolen years before an attack are sold, re-sold, and eventually used. The relevant question for defenders is not “have we been breached recently?” but “is any credential that has ever left our control still active in our systems?” Routine monitoring of credential exposure through dark-web and infostealer-feed intelligence, combined with aggressive rotation policies for any credential that shows up in an exposure dataset, closes the window of opportunity that stale stolen credentials provide. JLR’s Jira access had that window open for four years.

Segmentation failed here in a way that had direct operational consequences. SAP systems managing global manufacturing operations should not be reachable from a foothold established via a third-party project management account. The pivot from an external Jira credential to production-critical ERP infrastructure without crossing a meaningful boundary is a network and identity design failure. In an environment where a single pivot can stop five factories across four countries, the ERP perimeter deserves the same protection architecture as the OT network itself.

Finally, the timing exploitation is worth noting as both a threat-intelligence concern and a business-continuity prompt. The attackers demonstrably understood JLR’s operational calendar and chose to execute on the day the business was most exposed. High-stakes operational dates — registration change days, financial close periods, major product launches, peak order windows — should trigger pre-event security reviews and heightened monitoring posture, not business as usual.

JLR has not published a formal post-mortem. The absence of a public account from the organisation itself means the defensive picture assembled here remains incomplete. That silence carries its own lesson for the sector: post-incident transparency, even at a high level of abstraction, is a public good that gives peer organisations a chance to raise their defences against the same playbook. Its absence leaves every comparable manufacturer reasoning from fragments.

Controls that would have helped

Defender controls catalogued in the Controls Desk that would have changed the outcome of this incident, or limited its blast radius. Sourced from regulator and framework guidance — never vendors.

Sources

Back to all incidents