Threat IntelHIGH

UK Manufacturers - 80% Report Cyber Attacks in Past Year

Featured image for UK Manufacturers - 80% Report Cyber Attacks in Past Year
REThe Register Security
ESETJaguar Land RoverUK manufacturerscyber incidentsAI-assisted attacks
🎯

Basically, many UK factories are getting hit by cyberattacks, causing big problems and lost money.

Quick Summary

A staggering 80% of UK manufacturers reported cyber incidents last year, leading to operational disruptions and lost revenue. With the rise of AI-assisted attacks, the urgency for robust cybersecurity measures is clear. Companies must prioritize security at all levels to mitigate these risks.

What Happened

Nearly 80% of UK manufacturers reported experiencing a cyber incident in the past year, according to research by ESET. This alarming statistic indicates that cyberattacks are not just isolated events; they are becoming a routine threat in the manufacturing sector. The consequences of these incidents can be severe, leading to factory outages, lost revenue, and significant disruptions in the supply chain.

In a notable example, Jaguar Land Rover had to halt production due to a cyberattack, resulting in a ripple effect that impacted suppliers and delayed operations for weeks. The estimated economic fallout from this incident alone reached around £1.9 billion. Such incidents serve as a stark reminder of how quickly a cyber event can escalate into a major operational crisis.

Who's Affected

The impact of these cyber incidents extends beyond individual companies. Almost all manufacturers surveyed acknowledged that these attacks had direct operational consequences. Supply chain disruption and missed commitments were among the most cited issues. With nearly half of the respondents acknowledging that they have limited or no visibility into potential cybersecurity threats, the risk of further incidents remains high.

As the landscape evolves, AI-assisted attacks are increasingly viewed as the top threat by nearly half of the manufacturers. This shift indicates a growing sophistication in the tools used by cybercriminals, making it imperative for manufacturers to enhance their cybersecurity measures.

What Data Was Exposed

While specific data breaches were not detailed in the report, the financial implications of these cyber incidents are significant. Over half of the manufacturers reported that they suffered revenue losses due to cyber incidents, with some incidents costing upwards of £250,000. The operational downtime caused by these attacks not only affects immediate production but also has lingering effects on the overall business.

The lack of insight into potential threats is particularly concerning. One in five manufacturers admitted to having limited or no understanding of the cybersecurity risks they face, which could lead to further vulnerabilities and data exposure.

What You Should Do

To mitigate these risks, manufacturers must start treating cybersecurity as a strategic business decision rather than merely an IT issue. Only 22% of firms currently place cybersecurity ownership at the executive level, which is insufficient given the potential impact of these incidents.

Organizations should prioritize the following actions:

  • Enhance visibility into cybersecurity threats and vulnerabilities.
  • Invest in training for employees to recognize and respond to cyber threats.
  • Develop a proactive cybersecurity strategy that includes regular assessments and updates to security protocols.

By taking these steps, manufacturers can better protect themselves against the growing wave of cyber threats and minimize the risk of significant operational disruptions in the future.

🔒 Pro insight: The high percentage of reported incidents underscores a systemic issue in manufacturing cybersecurity, necessitating immediate board-level attention and strategic investment.

Original article from

REThe Register Security
Read Full Article

Related Pings

HIGHThreat Intel

Google Attributes Axios npm Supply Chain Attack to UNC1069

The Threat Google has officially attributed the recent supply chain attack on the Axios npm package to a North Korean threat group known as UNC1069. This group is notorious for its financially motivated cyber activities, particularly targeting the cryptocurrency sector. The attack involved the compromise of the package maintainer's npm account, allowing attackers to push two malicious versions of

The Hacker News·
HIGHThreat Intel

AI Bugpocalypse - North Korean Backdoor and Cisco Breach

The Threat In a startling turn of events, North Korean hackers have embedded a backdoor in a widely-used npm package, which boasts over 100 million downloads per week. This incident underscores the growing sophistication of cyber threats, particularly from state-sponsored actors. The implications of such a breach are severe, as it could potentially compromise countless applications relying on this

Risky Business·
HIGHThreat Intel

March 2026 Security News - Key Cyber Threats Recapped

March 2026 brought significant cybersecurity threats, including a major attack on Stryker and rising ransomware incidents. Organizations must enhance their cyber-resilience plans to combat these challenges.

WeLiveSecurity (ESET)·
HIGHThreat Intel

North Korea-Nexus Threat Actor Compromises Axios NPM Package

A North Korea-linked threat actor has compromised the axios NPM package. This attack affects millions of users and highlights serious supply chain vulnerabilities. Immediate action is required to secure affected systems.

Mandiant Threat Intel·
HIGHThreat Intel

macOS Feature - Prevents ClickFix Compromise Attacks

Apple's latest macOS feature helps prevent ClickFix attacks by alerting users before executing risky commands. This is vital for protecting user data from phishing threats. Stay safe and informed with this new security measure.

SC Media·
HIGHThreat Intel

Supply Chain Attack - Axios npm Package Compromised

A major supply chain attack has compromised the Axios npm package, affecting millions of applications. Users are at risk due to malicious versions published in a short time frame. Immediate action is needed to secure systems and prevent exploitation.

Arctic Wolf Blog·