Currently reading: Production at all JLR plants now back online following cyber attack

Range Rover Evoque and Land Rover Discovery Sport lines at Halewood are the last to restart

All JLR production lines are now back up and running more than six weeks after a cyber attack that incapacitated its global operations.

On Thursday, production lines at its Halewood plant – which builds the Range Rover Evoque and Land Rover Discovery Sport – restarted for the first time since the 1 September attack.

Work to transform the plant as part of a £500 million project to produce JLR's incoming EVs has also restarted.

This follows Land Rover Defender and Discovery lines at Nitra, Slovakia, as well as Range Rover and Range Rover Sport lines at Solihull, which came back online last week.

Initial production output is understood to be limited, given that JLR has referred to the resumption of operations as a “controlled, phased restart”.

Operations at the Wolverhampton engine plant, Birmingham battery centre and Solihull body and paint shop are now all back up and running, as are stamping operations in Castle Bromwich, Halewood and Solihull.

A statement regarding the restart at Halewood read: “This is another important moment for JLR, for our suppliers and our people. 

“We’re all super-proud of the resilience of our people and their energy to get back to doing what they do best – building world-class British luxury vehicles for our global clients.”

The cyber attack on 1 September brought all factories to a halt and incapacitated JLR, forcing it to shut down its internal computer systems in an effort to protect data from being stolen.

This resulted in production shutdowns at all of its global plants, created issues with parts ordering and stifled retailers.

The consequences of the cyber attack are estimated to have cost JLR a £1.5 billion drop in revenue.

Figures released by the firm last week show that, in the three-month period including the September shutdown, sales to dealers plummeted by nearly a quarter to 66,165.

That represents a loss of 21,138 cars compared with the same period in 2024.

“It has been a challenging quarter for JLR,” outgoing CEO Adrian Mardell said in a statement. However, he said that sales in July and August had been “in line with our expectations” before the cyber attack.

JLR will present its second-quarter financial report in November.

Back to top

Government to underwrite £1.5bn JLR loan

The UK government said it will guarantee a £1.5 billion loan to JLR, to help it support suppliers who have been hit by the production shutdown.

The loan to the Tata-owned car maker will be issued by a commercial bank but will be underwritten by the UK government.

As well as costing JLR an estimated £50 million a week, the cyber attack has badly hit JLR's suppliers. 

It's estimated that around 150,000 people are employed by some 700 British firms that supply JLR, and the UK government had been investigating ways to support them, such as a furlough scheme or loans.

It will instead underwrite a single loan to JLR through the Export Development Guarantee (EDG), with JLR repaying the money over a period of five years. 

Business secretary Peter Kyle said on 27 September that the loan guarantee "will help support the supply chain and protect skilled jobs in the West Midlands, Merseyside and throughout the UK".

Chancellor Rachel Reeves added that the loan would help JLR "support their supply chain and protect a vital part of the British car industry".

JLR hack: what happened?

Autocar first reported issues affecting JLR on 1 September, when dealers couldn't register new cars on 'new plate day', traditionally one of the year's busiest for registrations.

Back to top

In an effort to combat the hack, JLR began “shutting down" its systems on 2 September. It has not produced any cars globally since, leading to millions of pounds of lost income.

The extent of the issues meant JLR brought police and cybersecurity experts in to “restart our global applications in a controlled and safe manner”.

During this process, which included an investigation, it was discovered that "some data" was "affected", according to JLR. Those affected will be contacted, the firm said.

It's not officially known what data was taken or if a ransom demand has been made, but it is thought it most likely involves customer data, given the involvement of the police.

Who has claimed responsibility for JLR hack?

On 3 September, a group of hackers calling themselves Scattered Lapsus$ Hunters claimed responsibility for the attack on JLR.

This is the same group that hacked Marks & Spencer in May, causing the British retailer seven weeks of disruption and costing £300 million in lost operating profit.

It claimed to have obtained JLR customer data after exploiting a similar flaw in the car maker's IT system. The claim was made on a Telegram messenger group, where a user linked to the hackers posted a screenshot of what appeared to show JLR's internal system.

A member of the group revealled that a well-known flaw in SAP Netweaver, a third-party software used by JLR, was exploited to access the data.

The US's Cybersecurity and Infrastructure Security Agency warned about the flaw earlier this year. An update for the software was released, but whether JLR applied it is unknown.

It's also not known what data was taken or if a ransom demand has been made of JLR.

Join our WhatsApp community and be the first to read about the latest news and reviews wowing the car world. Our community is the best, easiest and most direct place to tap into the minds of Autocar, and if you join you’ll also be treated to unique WhatsApp content. You can leave at any time after joining - check our full privacy policy here.

Will Rimell

Will Rimell Autocar
Title: News editor

Will is Autocar's news editor.​ His focus is on setting Autocar's news agenda, interviewing top executives, reporting from car launches, and unearthing exclusives.

As part of his role, he also manages Autocar Business – the brand's B2B platform – and Haymarket's aftermarket publication CAT.

Join the debate

Comments
105
Add a comment…
donaldauthur918 7 March 2026
BITCOIN - ETHEREUM RECOVERY REVIEWS:  META TECH RECOVERY PRO, DIGITAL ASSET RECOVERY CONSULTANTS.
 
I am pleased to provide a formal appraisal of META TECH RECOVERY PRO, a practitioner with a strong reputation in cybersecurity and digital asset recovery, particularly for Bitcoin, Ethereum, and USDT. This review assesses professional competence, methodological rigor, outcomes, and alignment with industry practices. Initiate action promptly before recovery opportunities diminish. for help, contact them via.
https://metatechrecoverypro.com
Telegram:@metatechrecoveryproteam.
W/S +1 (469) 692‑8049
Thank you.
 
Methodology and Operational Rigor
META TECH RECOVERY PRO employs a methodical, evidence-based approach. Initial engagements begin with a detailed incident assessment to identify compromise type, evaluate forensic artifacts, and establish a prioritized recovery plan. The workflow integrates on-chain analysis (ledger records and blockchain explorers) with off-chain intelligence (exchange KYC timelines, server logs), producing a comprehensive investigative posture. The practitioner uses industry-accepted tools for chain tracing, address clustering, and transaction graph analysis, combining automated methods with manual review to minimize false positives. Documentation and chain-of-custody practices are maintained to preserve evidentiary admissibility for legal or regulatory escalation.
 
Illustrative Outcomes
Representative engagements demonstrate meaningful recoveries and remediation. In unauthorized wallet-access cases, META TECH RECOVERY PRO has identified transaction patterns indicating intermediate custodial transfers and coordinated with centralized exchanges to freeze or flag suspect funds, achieving partial or full restitution. In Ethereum smart-contract exploits, analysis of contract vulnerabilities and reentrancy patterns has enabled negotiated recoveries or deployment of defensive measures. For USDT and other stablecoins, familiarity with token standards and issuer address practices has aided tracing across chains and wrapped-token ecosystems.
 
Industry Alignment and Preventive Guidance
Applied strategies align with cybersecurity and blockchain-forensics best practices: multi-modal evidence collection, preservation of immutable ledger records, and engagement with regulated custodians. The practitioner emphasizes preventive measures—secure key storage, hardware wallets, multi-signature configurations, and user education—which mirror leading cybersecurity recommendations. Collaborative networks with blockchain analytics providers and legal counsel are leveraged to translate technical findings into actionable resolutions.
 
Limitations and Client Guidance
Engagements yield faster containment, higher recovery likelihood, and improved post-incident hardening, yet realistic constraints exist: irretrievable private-key loss and laundering through sophisticated mixers or decentralized exchanges may preclude recovery. META TECH RECOVERY PRO communicates these limitations and calibrates client expectations, offering alternative mitigations such as regulatory reporting, insurance-claims assistance, and strategic negotiations with custodial intermediaries.
 
Conclusion
META TECH RECOVERY PRO demonstrates technical acumen, methodological discipline, and client-focused professionalism. While acknowledging inherent blockchain-native limitations, the practitioner’s track record, preventive guidance, and adherence to forensic best practices warrant a strong endorsement. Prospective clients seeking a diligent, technically sophisticated, and ethically grounded partner for safeguarding and recovering cryptocurrency assets will find META TECH RECOVERY PRO reliable and effective.
donaldauthur918 7 March 2026
BITCOIN - ETHEREUM RECOVERY REVIEWS:  META TECH RECOVERY PRO, DIGITAL ASSET RECOVERY CONSULTANTS.
 
I am pleased to provide a formal appraisal of META TECH RECOVERY PRO, a practitioner with a strong reputation in cybersecurity and digital asset recovery, particularly for Bitcoin, Ethereum, and USDT. This review assesses professional competence, methodological rigor, outcomes, and alignment with industry practices. Initiate action promptly before recovery opportunities diminish. for help, contact them via.
https://metatechrecoverypro.com
Telegram:@metatechrecoveryproteam.
W/S +1 (469) 692‑8049
Thank you.
 
Methodology and Operational Rigor
META TECH RECOVERY PRO employs a methodical, evidence-based approach. Initial engagements begin with a detailed incident assessment to identify compromise type, evaluate forensic artifacts, and establish a prioritized recovery plan. The workflow integrates on-chain analysis (ledger records and blockchain explorers) with off-chain intelligence (exchange KYC timelines, server logs), producing a comprehensive investigative posture. The practitioner uses industry-accepted tools for chain tracing, address clustering, and transaction graph analysis, combining automated methods with manual review to minimize false positives. Documentation and chain-of-custody practices are maintained to preserve evidentiary admissibility for legal or regulatory escalation.
 
Illustrative Outcomes
Representative engagements demonstrate meaningful recoveries and remediation. In unauthorized wallet-access cases, META TECH RECOVERY PRO has identified transaction patterns indicating intermediate custodial transfers and coordinated with centralized exchanges to freeze or flag suspect funds, achieving partial or full restitution. In Ethereum smart-contract exploits, analysis of contract vulnerabilities and reentrancy patterns has enabled negotiated recoveries or deployment of defensive measures. For USDT and other stablecoins, familiarity with token standards and issuer address practices has aided tracing across chains and wrapped-token ecosystems.
 
Industry Alignment and Preventive Guidance
Applied strategies align with cybersecurity and blockchain-forensics best practices: multi-modal evidence collection, preservation of immutable ledger records, and engagement with regulated custodians. The practitioner emphasizes preventive measures—secure key storage, hardware wallets, multi-signature configurations, and user education—which mirror leading cybersecurity recommendations. Collaborative networks with blockchain analytics providers and legal counsel are leveraged to translate technical findings into actionable resolutions.
 
Limitations and Client Guidance
Engagements yield faster containment, higher recovery likelihood, and improved post-incident hardening, yet realistic constraints exist: irretrievable private-key loss and laundering through sophisticated mixers or decentralized exchanges may preclude recovery. META TECH RECOVERY PRO communicates these limitations and calibrates client expectations, offering alternative mitigations such as regulatory reporting, insurance-claims assistance, and strategic negotiations with custodial intermediaries.
 
Conclusion
META TECH RECOVERY PRO demonstrates technical acumen, methodological discipline, and client-focused professionalism. While acknowledging inherent blockchain-native limitations, the practitioner’s track record, preventive guidance, and adherence to forensic best practices warrant a strong endorsement. Prospective clients seeking a diligent, technically sophisticated, and ethically grounded partner for safeguarding and recovering cryptocurrency assets will find META TECH RECOVERY PRO reliable and effective.
victoriabenny463 26 October 2025
A few months ago, I fell for what looked like a legitimate online trading platform. The website was sleek, the support team was responsive, and they even showed me fake profit charts that seemed to grow daily. I started small, and after a few test withdrawals worked, I invested more eventually depositing 2 Bitcoin in hopes of long-term returns. But one morning, when I tried to withdraw, everything changed. The platform suddenly locked my account, claiming there were additional fees to release my funds. The support chat stopped responding, and the website started giving error messages. That’s when I realized I’d been scammed. I was devastated. Two Bitcoins wasn’t pocket change, it was my savings. I filed reports online, but everyone told me it was impossible to recover crypto once it’s sent. Then, through a discussion forum, I came across Dexdert Net Recovery, a team specializing in tracing and recovering stolen digital assets. Skeptical but desperate, I reached out. Their response was immediate and professional. They asked for transaction IDs, wallet addresses, screenshots of my correspondence with the fake platform, and any proof of payment I had. Within days, their analysts traced the stolen Bitcoin through multiple wallets using blockchain forensics, They updated me step-by-step, Working with their recovery experts and blockchain partners, Dexdert Net Recovery successfully froze the funds and verified ownership of my wallet. After 2 days of persistence and verification, I finally saw my 2 Bitcoin restored back into my own wallet. I couldn’t believe it. What stood out most wasn’t just that they recovered my funds, but how transparent and supportive the Dexdert team was throughout the process. They educated me on crypto safety, how to spot fake trading sites, and how to secure my digital assets in the future. Dexdert Net Recovery truly lives up to its name. They gave me back not just my Bitcoin, but my peace of mind.
 
Reach Out Information Below Via:
 
 
 
WhatsApp: (+1 (859) 609‑4156)