Jaguar Land Rover Confirms Employee Data Stolen in Crippling August Cyberattack Costing the Company Over $890 Million
Key Takeaways
- Breach confirmed: JLR has confirmed that a cyberattack in August compromised data belonging to current and former employees.
- Production and financial impact: It halted production for over a month, resulting in a financial shortfall of over $890 million for the company.
- Employee data exposed: The compromised data included employment, payroll, benefits, and staff schemes details.
Jaguar Land Rover (JLR) has acknowledged that a cyberattack in August resulted in a data breach, compromising the personal information of current and former staff and contractors. The forensic investigation into the event is ongoing.
This announcement provides the first official details about the incident, which caused a production shutdown lasting more than a month and had severe financial repercussions for the major British automotive manufacturer.
JLR Stolen Employee Data
The company has begun contacting affected individuals, as reported by The Telegraph, and has explained that the compromised information was held for employment administration purposes. The breach exposed data related to:
- Payroll,
- Benefits,
- Staff schemes for both employees and their dependents.
While JLR stated there is no evidence that the stolen data has been misused, it has cautioned all current and former personnel to be vigilant against potential phishing attacks that may exploit the employee data stolen in the incident.
To mitigate the risk, JLR is providing access to credit and identity monitoring services for those impacted.
Economic Impact and Cybersecurity Threats
The Jaguar Land Rover cyberattack has had a ripple effect throughout the U.K.'s industrial sector, disrupting JLR's extensive multi-tier supply chain. The production halt has put thousands of jobs at risk, with the company posting a loss of £485 million (roughly $650 million) last month.
HELLCAT ransomware targeted JLR earlier this year via compromised Atlassian Jira credentials to steal sensitive data, leveraging an infostealer – the incident was also linked to the APTS threat actors and the Scattered Lapsus$ Hunters collective.




