Cybercriminals are evolving their tactics, attacks are no longer limited to data theft. Hackers now aim to disrupt operations, manipulate staff using AI, and exploit trusted platforms such as CRM systems and development tools.
What happened: Hackers exploited JLR’s internal systems using stolen credentials from a project management tool (Jira), gaining access to sensitive systems controlling manufacturing and electric vehicle charging.
The attack began on Sunday 31 August as the latest batch of new registration plates became available on Monday 1 September. The attack was detected while it was happening. The company shut down its IT systems to reduce damage.
Impact:
Why it matters: This attack underscores the vulnerability of large manufacturers to operational disruption from compromised credentials. The extended shutdown highlights the critical need for robust cyber security measures in the automotive industry.
Who was behind it: A hybrid group using tactics associated with Scattered Spider, LAPSUS$, and ShinyHunters.
What happened: A third-party supplier responsible for managing Co-op’s loyalty program was compromised. Hackers accessed systems containing personal details of 6.5 million customers, including names, contact information, and purchase history. The breach occurred because of weaknesses in the supplier’s security, not Co-op’s own systems.
Impact:
Why it matters: This incident demonstrates that even companies with strong internal security can face exposure through their suppliers. It shows the need for careful cyber security checks of third-party vendors. This includes regular audits, breach response clauses in contracts, and ongoing monitoring. Businesses must treat their entire partner ecosystem as part of their cyber risk strategy.
What happened: Hackers stole login details and tokens from popular CRM and marketing platforms including Salesforce, Mailchimp, and HubSpot. These platforms are used by big global brands like Google, Cisco, and Pandora, giving attackers access to sensitive customer data and communication tools.
Impact:
Why it matters: CRM and marketing platforms are central to modern business operations. If compromised, attackers can impersonate your brand, damage customer trust, and bypass internal security. Businesses need to protect their internal systems and the cloud platforms they use. This includes setting strong access controls and watching for unusual activity.
What happened: Attackers used AI-generated deepfake video calls to impersonate senior executives at Arup. The visuals and voice were realistic enough to convince employees to authorise a £25 million transfer.
Impact:
Why it matters: AI-driven impersonation is a growing threat. Traditional security tools won’t detect these scams. Businesses must implement robust verification protocols for financial transactions, such as multi-person approvals, voice authentication and validation of unusual requests.
What happened: A ransomware group infiltrated HCRG Care Group’s IT systems, encrypted files, and demanded a £2 million ransom. Sensitive patient data, including medical records, was leaked online when the ransom wasn’t paid.
Impact:
Why it matters: Healthcare providers are high-value targets due to the sensitivity of their data and the urgency of their services. This incident underscores the need for strong backups, ransomware response plans, and staff training to detect and prevent attacks.
The cyber threat landscape in Q3 2025 has taught us a key lesson. Businesses and public organisations should not wait to respond. They need to be proactive. From supply chain compromises to AI-driven fraud, attacks are growing in sophistication and potential impact. A multi-layered approach combining technology, people and processes is essential.
Now is the time to future-proof your organisation’s cybersecurity posture. Our Managed Cyber Security services provide 24/7 protection, proactive threat detection, and expert guidance tailored to your specific needs.
We also offer free consultations to help you identify vulnerabilities, prioritise improvements, and align your security strategy with business objectives. Take the first step in safeguarding your operations, contact us today to schedule your free consultation.