
Jaguar Land Rover (JLR) today confirmed that the attackers also stole “some data” during a recent cyber attack, which forced it to close the system and do not direct the employees not to report to work.
JRL serves as a standalone unit under Tata Motors India after purchases from Ford in 2008. With an annual revenue of over $ 38 billion (£ 29 billion), JLR employs around 39,000 people and makes more than 400,000 vehicles each year.
Revealing the attack on 2 September, the automobile manufacturer said that “production activities have been severely interrupted.” JLR is working to resume its operation and investigate the event, since then with the help of the UK National Cyber Security Center (NCSC).
In today’s statement, the company also announced that it had informed the concerned authorities about data violations.
“Since we know about the cyber phenomenon, we are working around the clock with the third ITS party cyber security experts to control our global applications and rescue it,” JLR said.
“As a result of our ongoing investigation, now we believe that some data have been affected and we are informing the concerned regulators. Our forensic investigation continues at speed and we will contact anyone if we find that their data has been affected.”
JLR did not respond to an request for comment when the Blapping computer reached to ask more information about the computer phenomenon and its potential impact on customers.
While JLR has confirmed that the danger actors have stolen information from their compromised systems, the company has so far credited an attack to a specific cyber crime group, and any known ransomware gang has not taken responsibility for the attack.
However, a relaxed knit group of cyber criminal has called itself a “scattered lapsus $ Hunters”, claiming responsibility for breech on Telegram, sharing the screenshot of an internal JLR SAP system and said that he has also deployed ransomware on the company’s agreement.
The group claims Lapsus $, scattered spider and cyber criminals associated with forced recovery groups. It is also for the same group wide sale, which uses social engineering and stolen salesloft drifted ooutes tokens to steal data from many companies.
Salesforce examples GoogleCloudflare, ElasticPalo Alto Network, Zscler, Worthy, Proof point, Cyberk, Beyond, Jfrog, Rapid, Qualis, Workday, Cato network, Malevolent, BugkraudeAnd Rubric,


