A group of English-speaking hackers, identifying themselves as “Scattered Lapsus$ Hunters,” has claimed responsibility for a cyber attack that interrupted production at Jaguar Land Rover (JLR). They have been publicly discussing the hack on the messaging app Telegram and sharing screenshots that they assert are taken from the company’s IT networks.
The group has previously engaged in cyber attacks on UK retailers, including M&S in the spring. In their communications, the hackers have expressed interest in extorting money from JLR. However, there is uncertainty about whether they have successfully accessed private data or installed malicious software on the company’s systems.
Security expert Kevin Beaumont suggested that the screenshots posted by the group indicate they may have accessed sensitive internal information. The Information Commissioner’s Office has confirmed they are assessing the incident reported by JLR.
Since the attack was detected on Sunday, production at JLR’s sites, including the Halewood plant in Merseyside and another in Solihull, has faced significant disruption. Staff members have been sent home, and the company is working to restore manufacturing operations. JLR has reported taking immediate measures to minimize the impact of the incident, including shutting down systems proactively. They stated that, at present, there is no evidence that customer data has been compromised.
The group “Scattered Lapsus$ Hunters” is linked to an overarching network known as The Com, which has gained notoriety due to a series of high-profile cyber attacks. Earlier this year, the National Crime Agency issued warnings about the rising threat posed by such cyber criminal groups, which include various youth-oriented hacking factions like Shiny Hunters and Lapsus$. Following previous incidents, law enforcement has apprehended several individuals associated with these hacking groups, though the current status of ongoing investigations remains unclear.
Source: https://www.bbc.com/news/articles/c4gqepe5355o?at_medium=RSS&at_campaign=rss

