Search This Blog

Powered by Blogger.

Blog Archive

Labels

Footer About

Footer About

Labels

Showing posts with label IT incident. Show all posts

Automakers Face Surge in Cyberattacks as Jaguar Land Rover and Renault Recover from Major Breaches

 

Cybersecurity experts have warned that global automakers are likely to face an increasing wave of cyberattacks, as recent incidents continue to disrupt operations at leading manufacturers. The warning follows a series of high-profile breaches, including a major cyberattack on Jaguar Land Rover (JLR), which remains one of the most significant security incidents to hit the automotive industry in recent years. 

Jaguar Land Rover suffered a severe cyberattack at the end of August, forcing the company to shut down its IT systems and suspend production across multiple facilities. The disruption caused widespread operational chaos, but JLR recently confirmed it has begun a phased restart of production at its Electric Propulsion Manufacturing Centre (EPMC) and Battery Assembly Centre (BAC) in the West Midlands. The automaker plans to expand the restart to other key sites, including Castle Bromwich, Halewood, Solihull, and its manufacturing facility in Nitra, Slovakia. 

JLR CEO Adrian Mardell expressed gratitude to employees for their efforts during the recovery, stating, "We know there is much more to do, but our recovery is firmly underway." However, the company remains cautious as it works to fully restore systems and strengthen security controls. 

French automaker Renault also confirmed that one of its third-party data processing providers had been targeted in a separate cyberattack, compromising customer information such as names, addresses, dates of birth, gender, phone numbers, vehicle registration details, and VIN numbers. While Renault clarified that no financial or password data was accessed, the company has begun notifying affected customers and advising them to be wary of phishing attempts or fraudulent communications.  
Ignas Valancius, head of engineering at cybersecurity firm NordPass, warned that cybercriminals often exploit such incidents to impersonate company representatives, lawyers, or even law enforcement to extract additional personal or financial data. He emphasized the growing sophistication of social engineering attacks, noting that scammers may pose as attorneys offering to help victims claim compensation, only to defraud them further. 

The automotive sector's vulnerability has become increasingly evident in 2025, with luxury manufacturers frequently targeted by ransomware and data theft operations. In addition to JLR and Renault, other global brands have reported breaches. 

Meanwhile, Swedish HR software provider Miljödata suffered a breach that compromised the personal information of Volvo North America employees, and Stellantis confirmed unauthorized access to its customer contact database via a third-party provider. Valancius highlighted that cybercriminals appear to be deliberately targeting luxury brands, seeking to exploit their association with high-net-worth clientele. "It seems that luxury brands have been prime targets for hacker groups in 2025," he said, adding that these incidents could lead to more sophisticated spear-phishing campaigns and targeted extortion attempts. 

As automakers increasingly rely on digital systems, connected vehicles, and cloud-based infrastructure, experts stress that robust cybersecurity measures and third-party risk management are now essential to safeguard both company data and customer privacy. The recent breaches serve as a stark reminder that the automotive industry's digital transformation has also made it a lucrative target for global cybercriminal networks.

‘The Guardian’ Apparently Hit by a Ransomware Attack


UK’s Guardian newspaper has been hit by a severe IT incident, apparently a ransomware attack, on Tuesday. The attack began late at night and has affected parts of the newspaper company’s technology infrastructure. 

While online publishing is mostly unaffected and news stories are still being posted to The Guardian website and app, the employees were being instructed to work from home, as per the reports put forth by The Guardian. 

It has yet not been made clear as to how the breach occurred, whether any company data was stolen or if any threat actor has demanded a ransom payment from the British daily publication. In any general case of a ransomware attack, ransomware groups end up extracting payment in order to restore the victim’s breached files or selling the victim’s sensitive data, or both.  

“As everyone knows, there has been a serious incident which has affected our IT network and systems in the last 24 hours […] We believe this to be a ransomware attack but are continuing to consider all possibilities,” says Guardian Media Group’s chief executive, Anna Bateson, and editor-in-chief Katharine Viner. 

“We are continuing to publish globally to our website and apps and although some of our internal systems are affected, we are confident we will be able to publish in print tomorrow. Our technology teams have been working to deal with all aspects of this incident, with the vast majority of our staff able to work from home as we did during the pandemic.” 

While the publication plans on sharing further information in regard to the attack, it ensures that this would not affect the newspaper production, scheduled for Thursday. 

Ransomware has emerged as a serious threat all across the business world, with nearly 92 percent of global organizations witnessing at least one email-based ransomware in the year 2022, shows a recent study by cybersecurity company, Tussian. 

In addition to this, 10 percent of the security giants say that they have reported over 450 email-based ransomware attacks since January 2022. While 72 percent reported having experienced account compromise and takeover attempts in the year 2022.