Description

The HELLCAT ransomware group has taken responsibility for a major data breach at Jaguar Land Rover (JLR), leading to the exposure of a significant amount of confidential data. This includes internal documents, source code, employee information, and details about partners. This attack is similar to past incidents involving major corporations like Telefónica, Schneider Electric, and Orange, demonstrating the group's strategy of leveraging compromised employee login details, particularly those stolen from Atlassian Jira platforms. A crucial aspect of this breach is the growing effectiveness of using infostealer malware to obtain credentials, which are then used to gain unauthorized entry into vital company systems. In this case, the compromised login details belonged to an employee of LG Electronics who was infected by an infostealer and had access to JLR’s Jira server. This enabled the threat actor, known as “Rey,” to leak numerous internal files from JLR. Hudson Rock, a cybersecurity firm that monitors infostealer infections, has observed that thousands of organizations have Jira-related compromised credentials due to such infections, highlighting the widespread nature of this danger. Subsequent to Rey's initial announcement, a second threat actor, operating under the name “APTS,” came forward, claiming to have exploited similar credentials from 2021 to infiltrate JLR’s systems. This led to an even larger data leak, estimated at 350 gigabytes. APTS shared screenshots of a Jira dashboard, revealing further sensitive information and confirming that the credentials used matched those in Hudson Rock’s database. This incident emphasizes the critical importance of strong credential management practices, including regular rotation and the implementation of multi-factor authentication, to address the persistent threat posed by infostealer malware and prevent the misuse of old credentials.