Yazılar

Jaguar Land Rover Scrambles to Contain Cyber Breach That Halted Production

Jaguar Land Rover (JLR) said Friday it is working “at pace” to restore operations after a major cyber incident forced it to shut down systems, halting both retail and production activities. The breach, disclosed earlier this week, has left thousands of factory workers at home until at least Tuesday as the company attempts a controlled restart of global applications.

Owned by India’s Tata Motors, JLR stressed there is no evidence customer data has been stolen so far. The company described the attack as “severely disruptive” to its operations across its three British car plants, where it employs around 33,000 people, making it the UK’s largest automotive employer.

The disruption adds to JLR’s mounting challenges. The company already reported an 11% sales drop in July, partly due to a U.S. export pause after Trump’s car import tariffs, and has cut its 2026 profit margin target from 10% to 5%-7%. Like other European automakers, it also faces weak demand in China and slower sales in Europe.

The attack mirrors a global trend of escalating ransomware campaigns hitting household names. Earlier this year, Marks & Spencer estimated its own cyber breach cost about £300 million ($405 million) in lost profit. Analysts warn that JLR’s recovery could also come with significant financial fallout if disruptions stretch beyond next week.

CISA Reports No Indication of Broader Impact from Treasury Department Cyber Breach

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) stated on Monday that there is “no indication” the recent cyber breach at the U.S. Treasury Department has affected any other federal agencies. This followed a report that Chinese hackers compromised several computers at the Treasury, stemming from a breach at cybersecurity contractor BeyondTrust.

While BeyondTrust confirmed that a limited number of its clients were affected, the company has not provided further details regarding which clients may have been impacted. The forensic investigation into the breach is still ongoing, and BeyondTrust has yet to confirm additional details about the scope of the attack.

Reports have suggested that the hackers specifically targeted the U.S. Treasury office responsible for administering economic sanctions, likely aiming to access information about Chinese entities under consideration for U.S. financial sanctions. This attack is part of an ongoing series of cyber incidents attributed to Chinese state-sponsored actors.

Republican lawmakers have called for a briefing on the incident. In response, Chinese Embassy spokesperson Liu Pengyu dismissed the claims, calling the reports “irrational” and part of “smear attacks” against China.