Hacking attacks on UK companies

Jaguar Land Rover (JLR)

Jaguar Land Rover (JLR) has fallen victim to one of the most destructive cyberattacks in the history of the British automotive industry. The attack, which began on August 31, 2025, led to a complete halt to global production and caused a domino effect throughout the supply chain, generating losses estimated at £5-10 million per day. A group called "Scattered Lapsus$ Hunters" - a coalition of three well-known cybercriminal collectives - has claimed responsibility for the attack:

  • Scattered Spider - a loose network of young hackers, mostly teenagers from the UK and the US
  • Lapsus$ - a group known for attacks on large technology corporations
  • ShinyHunters - specializing in data theft and extortion.

The Scattered Spider is a particularly dangerous group, consisting mainly of young people, some as young as 16 years old, coming from an English-speaking hacker community called "The Com". The group was previously responsible for attacks on M&S (£300 million in losses), Co-op and Harrods.

The attackers used a combination of advanced techniques:

  • Social Engineering - manipulation of IT employees to gain access to systems
  • SAP NetWeaver vulnerability exploitation - exploitation of critical vulnerabilities CVE-2025-31324 and CVE-2025-42999
  • Lack of authorization in Visual Composer - allowed unauthorized access to systems

The main reason for the success of the attack was the exploitation of critical vulnerabilities in the SAP NetWeaver system. These vulnerabilities enabled attackers to:

  • Execution of arbitrary commands on SAP servers
  • Upload malicious executable files
  • Full System Control

Additional factors affecting the scale and effects of the attack were:

Read more

Cover Image of Critical vulnerability in Fortinet products

Critical vulnerability in Fortinet products

https://www.fortiguard.com/psirt/FG-IR-22-300 https://www.fortiguard.com/psirt/FG-IR-22-300

Summary An external control of file name or path vulnerability [CWE-73] in FortiNAC webserver may allow an unauthenticated attacker to perform arbitrary write on the system.

Affected Products FortiNAC version 9.4.0 FortiNAC version 9.2.0 through 9.2.5 FortiNAC version 9.1.0 through 9.1.7 FortiNAC 8.8 all versions FortiNAC 8.7 all versions FortiNAC 8.6 all versions FortiNAC 8.5 all versions FortiNAC 8.3 all versions

Critical vulnerability in Fortinet products

https://www.fortiguard.com/psirt/FG-IR-22-398

A heap-based buffer overflow vulnerability [CWE-122] in FortiOS SSL-VPN may allow a remote unauthenticated attacker to execute arbitrary code or commands via specifically crafted requests.

Affected Products FortiOS version 7.2.0 through 7.2.2 FortiOS version 7.0.0 through 7.0.8 FortiOS version 6.4.0 through 6.4.10 FortiOS version 6.2.0 through 6.2.11 FortiOS-6K7K version 7.0.0 through 7.0.7 FortiOS-6K7K version 6.4.0 through 6.4.9 FortiOS-6K7K version 6.2.0 through 6.2.11 FortiOS-6K7K version 6.0.0 through 6.0.14

How does the VPN work? – A question from the telegram.

My today’s answer to the question from the telegram – maybe someone will need such a summary of information about VPN


The VPN set itself encrypts the data, but what servers do I connect to, etc., it still goes to the ISP?

  • No matter how the VPN is set, whether it’s your own or bought, it should encrypt the data. If you set it yourself you know how it was configured and you know who has the encryption key – in case of purchased VPN not exactly.
  • As for the ISP – you have to get out of that VPN somewhere, so at the point of the appointment, when traffic from a VPN starts to come out of the world with a “normal” connection yes – this or that ISP sees what comes out of you unencrypted + DNS queries.

Using an external NordVPN service – it takes care of the encryption + isp doesn’t know what I’m doing, it just knows that I’m connecting to the server of this NordVPN. *Apparently yes, the ISP sees traffic to the nord, but:

    • The ISP knows it’s VPN traffic, so you have something to hide.
    • Nord knows where you went next.

Using the external one allows you to impersonate another country and use the foreign vod offer.

  • Yes, it is a very common use of VPN these days

    Read more