
Why Multi-Factor Authentication is Not Enough
Knowing is half the battle, and the use and abuse of common frameworks shed insight into what defenders need to do to build defense in depth.
September 13, 2024 - Blog

Jaguar Land Rover (JLR), the iconic automaker under Tata Motors, experienced a severe cyberattack starting late August, which forced a preemptive shutdown of global IT systems.
The disruption brought production to a standstill at major plants, including those in the UK (Solihull, Halewood, Wolverhampton), as well as facilities in Slovakia, China, India, and Brazil. Thousands of employees were sent home, and dealerships were unable to register new vehicles, enforce diagnostics, or process sales despite the company’s consumer-facing website and configurator remaining operational.
This attack coincided with the highly anticipated release of the “75” vehicle registration plates, typically one of the automotive industry's busiest periods. The result was a cascade of operational failure, with dealer networks unable to sell or service vehicles, prompting customer frustration and widespread delays.
The perpetrator is a hacker faction calling itself “Scattered Lapsus$ Hunters,” a composite group linked to Scattered Spider, Lapsus$, and ShinyHunters. While JLR hasn’t confirmed the exact nature of the incident—no data theft has been officially reported—experts believe the use of ransomware or double-extortion tactics is likely.
Despite efforts to triage and restore operations, the company warned that the shutdown could last for weeks or even months, projecting ongoing recovery activity through October. The knock-on effects have extended to suppliers like Evtec, WHS Plastics, and others who have also halted operations, exposing how interconnected and fragile automotive supply chains can be in the face of cyber disruption.
JLR’s decision to shut down systems was widely regarded as damage containment best practice. Security experts praised the move for potentially stopping the attacker from spreading further into JLR’s IT-OT ecosystem: a textbook response that aligns with cyber resilience protocols.
However, analysts warn that such a response highlights the absence of preemptive resilience. In environments where IT and operational technology are deeply integrated, a full shutdown is untenable over the long term. The recovery will rely on controlled system reboots, forensic deep-dives, and careful validation.
Manufacturing is no longer immune to cyber threats. As one industry expert framed it: a single breach in IT can instantly cripple production lines, affecting revenue and customer confidence. Every hour lost represents millions in stalled production and shipment delays, particularly during peak periods.
Other high-profile consumer brands—M&S, Harrods, Co-op, and Pandora—have faced similar disruptions earlier this year. These cascading breaches showcase the systemic risk posed by attacks that exploit vulnerabilities in connected supply chains and legacy infrastructure.
Isolate Critical OT Systems: Segment and harden manufacturing environments
Enforce Forced-Failsafes: Automate system isolation for early containment
Test Incident Recovery Readiness: Simulate cyber shutdowns in IT/OT environments
Strengthen Supply Chain Governance: Use contractual and technical enforceable security controls with suppliers
Build Rapid Threat Response Plans: Draft protocols for executive communication, safe system restores, and forensic validation
As JLR rebuilds, cybersecurity strategy needs a transformation, not just a reboot.
Jaguar Land Rover's breach is a stark warning: downtime, not data, is the most pressing cyber risk for industrialized sectors. Are you ready to protect your production pipeline?
Speak with an Account Executive