{"id":30128,"date":"2025-03-18T15:16:08","date_gmt":"2025-03-18T15:16:08","guid":{"rendered":"https:\/\/gridinsoft.com\/blogs\/?p=30128"},"modified":"2025-03-19T00:00:06","modified_gmt":"2025-03-19T00:00:06","slug":"jaguar-land-rover-data-breach","status":"publish","type":"post","link":"https:\/\/gridinsoft.com\/blogs\/jaguar-land-rover-data-breach\/","title":{"rendered":"Jaguar Land Rover Data Breach Involved Two Attacks"},"content":{"rendered":"<p><strong>Jaguar Land Rover suffered a significant data breach<\/strong>. Two hackers are said to have exploited stolen Jira credentials, leaking sensitive information. The leaked data, including source code, employee details, and proprietary documents.<\/p>\n<h2>Jaguar Land Rover Breached<\/h2>\n<p>In early March 2025, Jaguar Land Rover (JLR), a UK-based luxury car manufacturer, reportedly suffered <a href=\"https:\/\/www.infostealers.com\/article\/jaguar-land-rover-breached-by-hellcat-ransomware-using-its-infostealer-playbook-then-a-second-hacker-strikes\/\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">a significant data breach<\/a>. This breach involved two distinct threat actors: the HELLCAT ransomware group, also referred to as &#8220;Rey,&#8221; and a second hacker identified as &#8220;APTS.&#8221;<\/p>\n<figure id=\"attachment_30143\" aria-describedby=\"caption-attachment-30143\" style=\"width: 1735px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2025\/03\/Reys-thread-1.webp\" alt=\"Rey\u2019s thread on a cybercrime forum\" width=\"1735\" height=\"812\" class=\"size-full wp-image-30143\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2025\/03\/Reys-thread-1.webp 1735w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2025\/03\/Reys-thread-1-300x140.webp 300w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2025\/03\/Reys-thread-1-1024x479.webp 1024w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2025\/03\/Reys-thread-1-768x359.webp 768w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2025\/03\/Reys-thread-1-1536x719.webp 1536w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2025\/03\/Reys-thread-1-860x402.webp 860w\" sizes=\"auto, (max-width: 1735px) 100vw, 1735px\" \/><figcaption id=\"caption-attachment-30143\" class=\"wp-caption-text\">Rey\u2019s thread on a cybercrime forum in which they leaked data from Jaguar Land Rover<\/figcaption><\/figure>\n<p>While the exact date of the breach is not explicitly stated, it is clear that the incident was recent. On the other hand, the credentials exploited by APTS dated <strong>back to 2021<\/strong>, suggesting a long-term vulnerability. For instance, a report corroborates the exposure of source code and employee details, while another website mentions the leak of 700 internal documents by Rey.<\/p>\n<h2>Threat Actors and Their Methods<\/h2>\n<p>As I said above, the breach involved two primary actors: <strong>HELLCAT (Rey) and APTS<\/strong>. HELLCAT employs its &#8220;infostealer-playbook&#8221; strategy, using <a href=\"https:\/\/gridinsoft.com\/blogs\/infostealer-malware-top\/\">infostealer malware<\/a> to collect credentials. It focuses on Jira systems, which are integral to enterprise operations, making the stolen data highly valuable for further attacks.<\/p>\n<p>Infostealer malware, <a href=\"https:\/\/gridinsoft.com\/spyware\/lumma-stealer\">such as Lumma<\/a>, infects devices through phishing, malicious downloads, or compromised websites, exfiltrating login credentials that are often sold or hoarded on the Darknet. APTS followed a similar approach, exploiting the same type of credentials to access JLR\u2019s systems.<\/p>\n<figure id=\"attachment_30136\" aria-describedby=\"caption-attachment-30136\" style=\"width: 943px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2025\/03\/login-credentials.webp\" alt=\"The login credentials that were used to perform the breach, detected years ago by Hudson Rock\u2019s Cavalie\" width=\"943\" height=\"552\" class=\"size-full wp-image-30136\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2025\/03\/login-credentials.webp 943w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2025\/03\/login-credentials-300x176.webp 300w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2025\/03\/login-credentials-768x450.webp 768w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2025\/03\/login-credentials-860x503.webp 860w\" sizes=\"auto, (max-width: 943px) 100vw, 943px\" \/><figcaption id=\"caption-attachment-30136\" class=\"wp-caption-text\">The login credentials that were used to perform the breach, detected years ago by Hudson Rock\u2019s Cavalier (source: infostealers.com)<\/figcaption><\/figure>\n<p>The article also specifies that the credentials used were from a compromised LG Electronics employee (his email ending with \u00abon@lge.com\u00bb) with third-party access to JLR\u2019s Jira server. These credentials, detected in Hudson Rock\u2019s database <strong>since at least 2018, were viable as of 2021<\/strong>. Hudson Rock, a cybercrime intelligence provider, reported <strong>over 30,000,000 computers infected with infostealers<\/strong>, with thousands of companies, including JLR, having compromised Jira credentials from these infections.<\/p>\n<h2>Data Leaked and Scale<\/h2>\n<p>How about scale, the scale of the data breach is significant, with Rey leaking hundreds of internal files and gigabytes of Jira issues, though the exact size is not specified. APTS, on the other hand, <strong>leaked an additional 350 gigabytes of data<\/strong>, including proprietary documents, source codes, employee data, and partner information.<\/p>\n<figure id=\"attachment_30144\" aria-describedby=\"caption-attachment-30144\" style=\"width: 1719px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2025\/03\/additional-data-from-JLR-1.webp\" alt=\"APTS leaking additional data\" width=\"1719\" height=\"786\" class=\"size-full wp-image-30144\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2025\/03\/additional-data-from-JLR-1.webp 1719w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2025\/03\/additional-data-from-JLR-1-300x137.webp 300w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2025\/03\/additional-data-from-JLR-1-1024x468.webp 1024w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2025\/03\/additional-data-from-JLR-1-768x351.webp 768w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2025\/03\/additional-data-from-JLR-1-1536x702.webp 1536w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2025\/03\/additional-data-from-JLR-1-860x393.webp 860w\" sizes=\"auto, (max-width: 1719px) 100vw, 1719px\" \/><figcaption id=\"caption-attachment-30144\" class=\"wp-caption-text\">APTS leaking additional data from Jaguar Land Rover<\/figcaption><\/figure>\n<p>This additional leak was confirmed through a screenshot of a Jira dashboard shared by APTS. Some reports mention <strong>approximately 700 internal documents<\/strong> leaked by Rey, including development logs and tracking data.<\/p>\n<h2>Implications and Broader Context<\/h2>\n<p>The breach has significant implications for JLR and the broader cybersecurity landscape, which is obvious. The leaked data, particularly source codes and employee details, poses risks for further attacks, such as <a href=\"https:\/\/gridinsoft.com\/phishing\">phishing campaigns<\/a> or intellectual property theft.<\/p>\n<p>AI could amplify the impact of such large breaches, making stolen data more valuable for cybercriminals. And it&#8217;s all given JLR\u2019s size, <strong>with nearly 39,000 employees and over $37 billion<\/strong> in revenue in the previous year. The incident also shows the vulnerability of Jira systems for enterprise operations. And it is worth holding in mind, considering how widespread it is in modern day software engineering.<\/p>\n<p>Among JLR, there are previous victims of infostealer campaigns, <strong>including Telef\u00f3nica, Schneider Electric, and Orange<\/strong>. For example, the Telef\u00f3nica breach discusses similar tactics. One detail is the longevity of the exploited credentials, dating back to 2018 and remaining viable until at least 2021.<\/p>\n<p>This long-term vulnerability, detected by Hudson Rock\u2019s database, illustrates how stolen credentials can persist for years if not monitored, posing a continuous risk to organizations. This is particularly relevant for companies relying on third-party access, as seen with the LG Electronics employee\u2019s credentials.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Jaguar Land Rover suffered a significant data breach. Two hackers are said to have exploited stolen Jira credentials, leaking sensitive information. The leaked data, including source code, employee details, and proprietary documents. Jaguar Land Rover Breached In early March 2025, Jaguar Land Rover (JLR), a UK-based luxury car manufacturer, reportedly suffered a significant data breach. [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":30140,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","_sitemap_exclude":false,"_sitemap_priority":"","_sitemap_frequency":"","footnotes":""},"categories":[15],"tags":[619,697],"class_list":{"0":"post-30128","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security-news","8":"tag-cybersecurity","9":"tag-data-breach"},"featured_image_src":"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2025\/03\/GS_Blog_Behind-the-Breach_-How-Jaguar-Land-Rover-Fell-Victim-to-a-Dual-Cyber-Attack_1280x674.webp","author_info":{"display_name":"Stephanie Adlam","author_link":"https:\/\/gridinsoft.com\/blogs\/author\/adlam\/"},"_links":{"self":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/30128","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/comments?post=30128"}],"version-history":[{"count":12,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/30128\/revisions"}],"predecessor-version":[{"id":30158,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/30128\/revisions\/30158"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/media\/30140"}],"wp:attachment":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/media?parent=30128"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/categories?post=30128"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/tags?post=30128"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}