Cyber ​​attack on Jaguar Land Rover causes supply chain disaster


Almost immediately after the cyber attack, a group in the telegram called the scattered hunters of Lapsus $, took charge of the hack. The group’s name indicates the potential collaboration between the three hacks-scattered, Lapsus $ and glossy hunters-which have been behind some of the most important cyber attacks in recent years. They are often composed of young, English and cyber criminals that target the main jobs.

Making vehicles is a very complex process. Hundreds of different companies offer parts, materials, electronics and more to vehicle manufacturers, and these extensive supply chain networks often rely on “timely” production. This means that they are ordering parts and services that are unlikely to be held by car manufacturers in certain values ​​that are needed and are delivered exactly if needed.

Sirj Ahmad Sheikh, a professor of system security at the University of Swansea, says: “Supply networks that are supplied at these manufacturing plants are all set for economic efficiency – as well as logistics efficiency.” Sheikh adds, “There is a careful supply chain.” “There is an important dependency for suppliers of this type of operation. As soon as this type of facility is impaired, all suppliers are affected.”

According to a telegraph report, one of the company that creates glass glass ceilings has started working on workers. Meanwhile, another company told the BBC that he had fired about 40 people so far. The French car maker Opmobulation, which hires 38,000 people on 150 sites, told Wiried that it creates and oversees events. “Optmobulation, as a result of turning off it by one of its customers based in the UK and depending on the development of the situation, adjusts its production on some specific sites,” the company’s spokesman said.

While it is unclear which JLR specific systems have been affected by hackers and what JLR systems have done preventively, many are probably offline to prevent the attack from getting worse. “It is very challenging to be confused while you are still connected between different systems,” said ORla Cox, head of Cyber ​​Security Communications in FTI consulting, which responds to cyberspace and research. “Often, there will also be dependence on different systems: you will bring one down, so that means it does it over the other.”

Whenever there is a hack supply chain – whether a manufacturer at the top of the pyramid or a company more than the pipeline – the digital fittings between companies may be cut to stop the attackers from one network to another. Cox says that connections via VPN or API may stop. “Some may even take stronger measures such as blocking domains and IP addresses. Then things like email between the two organizations cannot be used.”

The complexity of digital and physical supply chains, which exist only in dozens of jobs and production systems, means that it may take time to restore everything online and complete speed. Maccoll, a researcher by RUSI, says cyber security issues are often not discussed at the highest level of British policy – but adds that this time can be different due to the disorder scale. “The incident can be eliminated because of the losses and the fact that MPs are in contact with the constituency,” he said. This success has already begun.

Leave a Reply

Your email address will not be published. Required fields are marked *