Jaguar Land Rover Allegedly Hacked - Threat Actor Leaked 700 Internal documents

The inclusion of source code, a critical asset for automotive companies suggests that proprietary algorithms governing driver-assistance systems, infotainment platforms, or electric vehicle battery management may have been exfiltrated. A threat actor on a popular dark web forum, Rey, claims to have obtained internal data from Jaguar Land Rover, a British multinational automotive company specializing in luxury and off-road vehicles. If verified, the incident could represent one of the most significant cybersecurity threats to the luxury vehicle manufacturer, with implications for both intellectual property security and employee privacy. Cyber Security News is a Dedicated News Platform For Cyber News, Cyber Attack News, Hacking News & Vulnerability Analysis. While financial data or customer information does not appear to be part of this leak, the exposure of internal communications and technical specifications raises concerns about industrial espionage. Kaaviya is a Security Editor and fellow reporter with Cyber Security News. Modern vehicles’ reliance on interconnected software systems often managed through third-party vendors creates expansive attack surfaces for threat actors. The leaked data’s technical nature particularly the inclusion of tracking datasets—could also benefit competitors seeking insights into JLR’s autonomous driving or telematics systems. Cybersecurity analysts speculate that the breach likely originated from a compromised corporate server or cloud repository, given the volume and diversity of the data. These datasets often contain granular details about vehicle performance, geolocation patterns, and sensor outputs, which are instrumental in refining machine learning models for self-driving technologies. For example, threat actors like ALPHV/BlackCat have historically demanded payments in exchange for withholding proprietary code from public release. She is covering various cyber security incidents happening in the Cyber Space. For employees, credential monitoring and security awareness training are critical to mitigating follow-on attacks.

This Cyber News was published on cybersecuritynews.com. Publication date: Wed, 12 Mar 2025 07:50:18 +0000


Cyber News related to Jaguar Land Rover Allegedly Hacked - Threat Actor Leaked 700 Internal documents

Jaguar Land Rover says cyberattack severely disrupted production - Jaguar Land Rover, a leading automotive manufacturer, recently disclosed a significant cyberattack that severely disrupted its production operations. The attack impacted the company's manufacturing plants, causing delays and operational challenges. ...
1 month ago Bleepingcomputer.com
Jaguar Land Rover cyberattack threatens UK economic growth, government warns - A recent cyberattack targeting Jaguar Land Rover has raised significant concerns about the potential impact on the UK's economic growth. The UK government has issued warnings about the increasing threat of cyberattacks on critical industries, ...
4 weeks ago Therecord.media
Jaguar Land Rover extends shutdown after cyberattack by another week - Jaguar Land Rover has extended its production shutdown by an additional week following a recent cyberattack that disrupted its operations. The attack, which targeted the company's IT systems, forced the automaker to halt manufacturing activities to ...
3 weeks ago Bleepingcomputer.com
Jaguar Land Rover faces another week of shutdown after cyberattack - Jaguar Land Rover (JLR), the renowned British automotive manufacturer, is grappling with the aftermath of a significant cyberattack that has forced the company to extend its production shutdown by another week. This incident highlights the growing ...
3 weeks ago Therecord.media
Jaguar Land Rover restarts computer systems after cyber attack - Jaguar Land Rover, a leading automotive manufacturer, recently faced a significant cyber attack that disrupted its computer systems. The company took immediate action to restart and secure its IT infrastructure to mitigate the impact. This incident ...
1 week ago Theguardian.com
Jaguar Land Rover cyber incident highlights automotive sector risks - Jaguar Land Rover recently experienced a cyber incident that underscores the growing cybersecurity challenges faced by the automotive industry. This event involved unauthorized access to some of the company's systems, prompting an immediate ...
1 month ago Darkreading.com
Jaguar Land Rover Cyberattacks: Bad for Business - Jaguar Land Rover, a renowned automotive manufacturer, has recently faced a series of cyberattacks that have raised significant concerns about the security of connected vehicles and corporate networks. These cyber incidents highlight the increasing ...
4 days ago Darkreading.com
Jaguar Land Rover Allegedly Hacked - Threat Actor Leaked 700 Internal documents - The inclusion of source code, a critical asset for automotive companies suggests that proprietary algorithms governing driver-assistance systems, infotainment platforms, or electric vehicle battery management may have been exfiltrated. A threat actor ...
6 months ago Cybersecuritynews.com
Jaguar and Range Rover Hit by Cyberattacks in Britain, Raising Security Concerns - In October 2025, Jaguar and Range Rover, two leading British automotive brands, faced significant cyberattacks that have raised alarms about the cybersecurity posture of the automotive industry in the UK. These attacks targeted the companies' digital ...
1 day ago Nytimes.com
25 Best Managed Security Service Providers (MSSP) - 2025 - Pros & Cons: ProsConsStrong threat intelligence & expert SOCs.High pricing for SMBs.24/7 monitoring & rapid incident response.Complex UI and steep learning curve.Flexible, scalable, hybrid deployments.Limited visibility into endpoint ...
3 months ago Cybersecuritynews.com
TeamCity Intrusion Saga: APT29 Suspected Among the Attackers Exploiting CVE-2023-42793 - As part of this analysis, we look at threat actor TTPs employed throughout the intrusion and how they were identified and pieced together by the FortiGuard IR team. The following section of this report focuses on the activities of one of these threat ...
1 year ago Feeds.fortinet.com CVE-2023-42793 APT29
Lets Open(Dir) Some Presents: An Analysis of a Persistent Actor's Activity - By analyzing tools, logs and artifacts left open to the internet, we were able to profile the threat actor and their victims. After analyzing the artifacts we can conclude with moderate confidence that the majority of the threat actor activity ...
1 year ago Thedfirreport.com
Windows Incident Response: Human Behavior In Digital Forensics, pt III - Digital forensics can provide us insight into a threat actor's sophistication and situational awareness, which can, in turn, help us understand their intent. Observing the threat actor's actions helps us understand not just their intent, but what ...
1 year ago Windowsir.blogspot.com
Buzzing on Christmas Eve: Trigona Ransomware in 3 Hours - In late December 2022, we observed threat actors exploiting a publicly exposed Remote Desktop Protocol host, leading to data exfiltration and the deployment of Trigona ransomware. On Christmas Eve, within just three hours of gaining initial access, ...
1 year ago Thedfirreport.com Trigona
Jaguar Land Rover IT Systems Hit by Cyberattack, Causing Production Disruption - Jaguar Land Rover, a leading automotive manufacturer, recently suffered a significant cyberattack targeting its IT systems. This incident caused notable disruptions in production and operations, highlighting the increasing cyber risks faced by the ...
1 month ago Cybersecuritynews.com
Jaguar Land Rover Data Breach Exposes Customer Information - Jaguar Land Rover recently suffered a significant data breach that exposed sensitive customer information. The breach highlights the growing cybersecurity challenges faced by automotive companies as they increasingly rely on digital technologies and ...
3 weeks ago Cybersecuritynews.com
Jaguar Land Rover Extends Bug Bounty Program to Cover Connected Car Security - Jaguar Land Rover has expanded its bug bounty program to include its connected car systems, aiming to enhance cybersecurity measures and protect against potential vulnerabilities. This initiative invites ethical hackers and security researchers to ...
2 weeks ago Infosecurity-magazine.com
New Tool Set Found Used Against Organizations in the Middle East, Africa and the US - Unit 42 researchers observed a series of apparently related attacks against organizations in the Middle East, Africa and the U.S. We will discuss a set of tools used in the course of the attacks that reveal clues about the threat actors' activity. We ...
1 year ago Unit42.paloaltonetworks.com
Jaguar Land Rover Breached by HELLCAT Ransomware Group using Jira Credentials v - Under the nickname “APTS,” a second threat actor surfaced on the forum with a thread of his own, claiming to have gained access to JLR’s systems and stolen an even greater quantity of data from the organization by using the same ...
6 months ago Cybersecuritynews.com
Threat actors misuse OAuth applications to automate financially driven attacks - Threat actors are misusing OAuth applications as an automation tool in financially motivated attacks. Threat actors compromise user accounts to create, modify, and grant high privileges to OAuth applications that they can misuse to hide malicious ...
1 year ago Microsoft.com
Europol confirms web portal breach, says no operational data stolen - Europol, the European Union's law enforcement agency, confirmed that its Europol Platform for Experts portal was breached and is now investigating the incident after a threat actor claimed they stole For Official Use Only documents containing ...
1 year ago Bleepingcomputer.com
APT trends report Q1 2024 - Careto is a highly sophisticated threat actor that has been seen targeting various high-profile organizations since at least 2007. The last operations conducted by this threat actor were observed in 2013. Our private report provided a detailed ...
1 year ago Securelist.com OilRig Sidewinder
Virustotal Shares New Ideas to Track Threat Actors - In a recent presentation at the FIRST CTI in Berlin and Botconf in Nice, VirusTotal unveiled innovative methods to track adversary activity by focusing on images and artifacts used during the initial stages of the kill chain. Traditionally, threat ...
1 year ago Cybersecuritynews.com APT28
Hacker leaks millions of new 23andMe genetic data profiles - A hacker has leaked an additional 4.1 million stolen 23andMe genetic data profiles for people in Great Britain and Germany on a hacking forum. Earlier this month, a threat actor leaked the stolen data of 1 million Ashkenazi Jews who used 23andMe ...
1 year ago Bleepingcomputer.com Rocke Hunters

Cyber Trends (last 7 days)