Jaguar cyber attack is a reminder of why preventive security is essential

Date:

[ad_1]

On September 2, 2025, there was a large-scale cyber attack on the famous luxury car manufacturer Jaguar Land Rover (JLR). It was the second major incident in a year and halted production, disrupting the company’s global operations and affecting plants in the UK, China, Slovakia and India. The attack had a significant impact on hundreds of suppliers, resulting in a reported cost of approximately £196 million.

The JLR cyberattack caused an estimated £1.9 billion loss to the British economy and affected more than 5,000 suppliers. (Bloomberg)
The JLR cyberattack caused an estimated £1.9 billion loss to the British economy and affected more than 5,000 suppliers. (Bloomberg)

Threat actors claiming to be “Scattered Lapsus $Hunters” claim to have released sensitive data on the dark web, including alleged internal vehicle logic and test-process information. According to their post, the attacker gained access by stealing employee credentials (reportedly infostealer-harvested credentials dating from 2021) belonging to a JLR user with remote access to the company’s Jira server, and posted a screenshot of the Jira dashboard as “proof.” However, JLR has not publicly confirmed whether those credentials were used or whether the leaked data contains sensitive technical details, only that “some data” was affected.

This raises serious questions about the potential for IP theft, unsecured third-party systems, identity theft, and personalized social engineering campaigns. More importantly, it underlines the urgent need for preventive security such as exposure management to effectively protect sensitive secrets.

The JLR attack was likely an exploitation of the same weakness that allowed attackers to move laterally and cause massive disruption to production and operations. This attack is a clear indicator that organizations need to move beyond traditional vulnerability management, where patches are applied periodically, to understanding what is exposed and prioritizing what is truly exploitable, or what an attacker is most likely to target. This is the difference between reactive security like vulnerability management and preventive, risk-based approaches like risk management.

The huge losses incurred are a clear reminder to all organizations that cyber risk is no longer just a technical issue but a critical risk management task. The financial impact of this attack will be felt for months, if not years. The production halt and supplier crisis following the attack has made it clear that business resilience is directly linked to cyber resilience. Organizations need to be able to clearly measure and communicate their cyber risk in a business context so that leaders can make smarter, more proactive decisions about protecting the keys to the kingdom. Security leaders need exposure management to make strategic decisions that reduce business risk and ensure operational continuity.

Exposure management platforms identify all vulnerabilities and misconfigurations both on-premises and in the cloud. They surface indicators of compromise, excessive permissions, identity risks, toxic combinations, and potential attack paths, helping organizations determine which risks to address first. These platforms understand the specific access requirements for different systems and help restrict access that is not clearly needed. They continuously monitor the environment for drift, minimizing accidental exposure of secrets and other sensitive information.

A preventative approach to security moves organizations away from an endpoint-centric strategy. Endpoint-centric tools alone cannot provide the timing, context, or cross-domain visibility needed in modern security operations. Often, security is viewed as a purely technical aspect. But to successfully mitigate risk, cybersecurity must be extended to business terms. This requires an understanding of the potential impact a given vulnerability, misconfiguration or compromised credential can have on the business and being able to contextualize it for C-level executives who want to know if the business is at risk.

Endpoint-only views lack the cross-domain context and timeliness needed for prevention. Using multiple point solutions for different aspects of security only increases dashboard fatigue, making it harder to integrate remediation workflows into IT systems of record like Jira and ServiceNow.

On the other hand, exposure management provides much-needed context and reduces the time spent identifying which exposures to plug first. This provides IT and security teams the ability to see the entire attack surface. By correlating vulnerabilities across vulnerabilities, identities, cloud environments, applications, and OT, exposure management platforms create a navigable map of the environment with potential attack paths, allowing teams to mitigate the biggest threats to the business. With a unified view of the attack surface, exposure management platforms provide a single source of security data, a consistent approach to risk scoring, and the ability to fix the most critical risks first. This strengthens overall resilience and increases the cost, complexity and effort required for attackers to succeed, thereby establishing a much-needed deterrence.

This article is written by Rajneesh Gupta, MD and Country Manager, Tenable India.

[ad_2]

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Share post:

[tds_leads title_text="Subscribe" input_placeholder="Email address" btn_horiz_align="content-horiz-center" pp_checkbox="yes" pp_msg="SSd2ZSUyMHJlYWQlMjBhbmQlMjBhY2NlcHQlMjB0aGUlMjAlM0NhJTIwaHJlZiUzRCUyMiUyMyUyMiUzRVByaXZhY3klMjBQb2xpY3klM0MlMkZhJTNFLg==" f_title_font_family="653" f_title_font_size="eyJhbGwiOiIyNCIsInBvcnRyYWl0IjoiMjAiLCJsYW5kc2NhcGUiOiIyMiJ9" f_title_font_line_height="1" f_title_font_weight="700" f_title_font_spacing="-1" msg_composer="success" display="column" gap="10" input_padd="eyJhbGwiOiIxNXB4IDEwcHgiLCJsYW5kc2NhcGUiOiIxMnB4IDhweCIsInBvcnRyYWl0IjoiMTBweCA2cHgifQ==" input_border="1" btn_text="I want in" btn_tdicon="tdc-font-tdmp tdc-font-tdmp-arrow-right" btn_icon_size="eyJhbGwiOiIxOSIsImxhbmRzY2FwZSI6IjE3IiwicG9ydHJhaXQiOiIxNSJ9" btn_icon_space="eyJhbGwiOiI1IiwicG9ydHJhaXQiOiIzIn0=" btn_radius="3" input_radius="3" f_msg_font_family="653" f_msg_font_size="eyJhbGwiOiIxMyIsInBvcnRyYWl0IjoiMTIifQ==" f_msg_font_weight="600" f_msg_font_line_height="1.4" f_input_font_family="653" f_input_font_size="eyJhbGwiOiIxNCIsImxhbmRzY2FwZSI6IjEzIiwicG9ydHJhaXQiOiIxMiJ9" f_input_font_line_height="1.2" f_btn_font_family="653" f_input_font_weight="500" f_btn_font_size="eyJhbGwiOiIxMyIsImxhbmRzY2FwZSI6IjEyIiwicG9ydHJhaXQiOiIxMSJ9" f_btn_font_line_height="1.2" f_btn_font_weight="700" f_pp_font_family="653" f_pp_font_size="eyJhbGwiOiIxMyIsImxhbmRzY2FwZSI6IjEyIiwicG9ydHJhaXQiOiIxMSJ9" f_pp_font_line_height="1.2" pp_check_color="#000000" pp_check_color_a="#ec3535" pp_check_color_a_h="#c11f1f" f_btn_font_transform="uppercase" tdc_css="eyJhbGwiOnsibWFyZ2luLWJvdHRvbSI6IjQwIiwiZGlzcGxheSI6IiJ9LCJsYW5kc2NhcGUiOnsibWFyZ2luLWJvdHRvbSI6IjM1IiwiZGlzcGxheSI6IiJ9LCJsYW5kc2NhcGVfbWF4X3dpZHRoIjoxMTQwLCJsYW5kc2NhcGVfbWluX3dpZHRoIjoxMDE5LCJwb3J0cmFpdCI6eyJtYXJnaW4tYm90dG9tIjoiMzAiLCJkaXNwbGF5IjoiIn0sInBvcnRyYWl0X21heF93aWR0aCI6MTAxOCwicG9ydHJhaXRfbWluX3dpZHRoIjo3Njh9" msg_succ_radius="2" btn_bg="#ec3535" btn_bg_h="#c11f1f" title_space="eyJwb3J0cmFpdCI6IjEyIiwibGFuZHNjYXBlIjoiMTQiLCJhbGwiOiIxOCJ9" msg_space="eyJsYW5kc2NhcGUiOiIwIDAgMTJweCJ9" btn_padd="eyJsYW5kc2NhcGUiOiIxMiIsInBvcnRyYWl0IjoiMTBweCJ9" msg_padd="eyJwb3J0cmFpdCI6IjZweCAxMHB4In0="]

Popular

More like this
Related

Discover more from AyraNews24x7

Subscribe now to keep reading and get access to the full archive.

Continue reading