TESTIMONIALS

“Received the latest edition of Professional Security Magazine, once again a very enjoyable magazine to read, interesting content keeps me reading from front to back. Keep up the good work on such an informative magazine.”

Graham Penn
ALL TESTIMONIALS
FIND A BUSINESS

Would you like your business to be added to this list?

ADD LISTING
FEATURED COMPANY
Cyber

JLR, LNER incident comments

by Mark Rowe

A ‘cyber incident’ against the car maker JLR (Jaguar Land Rover) continues to cause the firm ‘disruption‘.  The UK official NCSC confirms that it’s working with the firm ‘to provide support’.

Much like retailers M&S and the Co-operative, hit by cyber attack in the summer, JLR says it’s ‘been working around the clock, alongside third‑party cybersecurity specialists, to restart our global applications in a controlled and safe manner’.

As commentators such as from the defence and security think-tank RUSI have noted, and Professional Security Magazine in features on disrupted institutions such as the British Library, councils, and the University of Manchester; and not only do such attacks mean long and hard remedial work; but suppliers (and their suppliers) may be affected, besides customers unable to contact the firm.

Comments

Shobhit Gautam, Staff Solutions Architect, EMEA at the platform HackerOne said: “The outage is the smoke but the data is the fire. JLR has confirmed that some data was affected and regulators notified. That moves this from an operational incident to a people incident, with knock-on risk for customers, dealers, and suppliers. Credit to JLR for keeping recovery controlled and transparent. That’s how you protect trust when the stakes are high.

“What this really shows is the modern auto stack under pressure. Intrusions don’t stop at the factory gate. They ride identity, third-party access and widely-deployed enterprise apps to land in Enterprise Resource Planning (ERP), dealer and supplier systems.  A single blast radius hits operations and information at once. Expect the long tail now which will include phishing off the back of exposed data, supplier impersonation and attempts to monetise whatever was taken.

“The urgent takeaways for the sector are to protect identity first with phishing-resistant MFA, then segment hard between IT, ERP and Operational Technology (OT). Treat partner connectivity as privileged and instrument for exfiltration, not just encryption. Then pressure-test it continuously with independent researchers. In automotive, reliability is the brand. Resilience is how you keep it.”

At the consultancy Acumen Cyber, Cian Heasley, principal consultant said ten days since the initial breach disclosure: “Right now the ransomware ecosystem is a bit like the credit card fraud underground in the late ’90s or early 2000s. Russian hackers had credit cards but couldn’t use them because the companies flagged Russian related addresses or transactions, while American carders had trouble accessing the cards.  To overcome this, Russian hackers then wound up selling on the cards to people in the West for fees.

“A similar thing is happening today but in the ransomware space. Russians have trouble with social engineering Western companies because of the language barrier, while the Western hackers don’t have their own ransomware brands to leverage for negotiations or extortion.
“But if Scattered Lapsus$ Hunters has created its own ransomware infrastructure and its members are native English speakers, this creates a whole new level of threat actor – which will be dangerous to victims but could also create serious disorder in the ransomware ecosystem as well.
“Whatever the situation behind the scenes is, the group is proving to be highly dangerous and any organisations named in the Telegram chat should investigate any breach claims immediately, because as we are seeing here, a lot of what they say turns out to be true.”

Sam Kirkman, Director of Services, EMEA at the cyber firm NetSPI said: “JLR has stated that they took proactive steps to contain the breach and minimise its impact, which is a commendable course of action, but has necessarily amplified the visible operation impact of this incident. Based on the modus operandi of these criminals, organisations wanting to limit their exposure should carefully consider operational resilience and redundancy, as well as validating their cybersecurity controls and procedures in preparation for future attacks.”

The train operator London North Eastern Railway (LNER) meanwhile confirmed a cyber-attack originating in its supply chain. At the IT firm Northdoor, AJ Thompson, CCO, pictured, said: “This latest attack has once again highlighted the increasing threat from cyber criminals using supply chain partners to access the data of their primary targets. We have seen throughout 2025 that criminals are now using supply chains as their preferred route into larger organisations.

“The impact on these companies is huge, losing money, reputation as well as having to deal with the regulatory consequences of such breaches. However, with supply chains now so large and complex, understanding where vulnerabilities might lie within the systems of third or even fourth party parties seems like a near impossible task.

“It is no wonder then that so many are falling victim to such attacks and why cyber criminals are increasingly turning to this form of attack as their primary approach. There is hope though.

“Many are turning to leading third party risk suppliers to gain a 360-degree view of their entire supply chain’s systems and where vulnerabilities may lie. Using such solutions means organisations can then speak directly to partners and ensure that such vulnerabilities are shut down before they are exploited. It also allows a more thorough vetting process when bringing new partners on board.

“The threat from cyber criminals using third parties to gain access to primary targets is only likely to increase over the coming months. It is proving very effective and unless companies get to grips with this type of attack many more are going to become victims. Looking for innovative solutions from leading consultancies that can provide the insight needed to deal with vulnerabilities will be critical.”

Meanwhile, Check Point Research has today released its Global Threat Intelligence Report for August 2025. Visit: https://blog.checkpoint.com/research/global-cyber-threats-august-2025-agriculture-hit-hard/

Omer Dembinsky, Data Research Manager at Check Point Research, says: “August’s threat data makes one thing clear: cyberattacks are intensifying in both volume and impact. Education, telecoms, and agriculture are being targeted because they are essential and because attackers know disruption here creates maximum leverage.

“With ransomware rising and AI accelerating attack speed, the only sustainable path forward is a prevention-first, AI-powered strategy. Organisations must move beyond detection to real-time prevention, protecting the network, cloud, endpoints, and identities in an integrated way. Only by doing so can we build resilience and safeguard critical services against relentless cyber adversaries.”

Related News

  • Cyber

    Risk during AI adoption

    by Mark Rowe

    CISO Andrew Smith at Kyocera Document Solutions UK explains how he’s responded to the cyber risks associated with AI and how businesses…

  • Cyber

    Increasing threats

    by Mark Rowe

    How is the UK’s cyber ecosystem adapting to cope with increasing threats? writes Ricardo Ferreira, EMEA Field CISO, at the cyber firm…

  • Cyber

    Resilience ambassador

    by Mark Rowe

    L’Oréal UK and Ireland is the first beauty company to become a National Ambassador for the National Cyber Resilience Centre Group (NCRCG).…