Beneath the Chain

A detailed examination of how one cyber incident disrupted operations across an entire supply chain.

This publication explores the potential pathways, attacker behaviour, and business impacts surrounding the recent JLR cyber attack. It maps observed tradecraft to MITRE ATT&CK techniques and highlights how access and identity weaknesses can amplify systemic risk.

Understand how disruption at one point in a supply chain can quickly spread across suppliers, partners, and critical operations, and what that means for resilience planning.

Download now

Download your free copy

Your details


What’s inside

  • Analysis of the operational and financial ripple effects following the JLR cyber attack.
  • Insight into attacker behavior and potential intrusion pathways, mapped to MITRE ATT&CK techniques.
  • Exploration of how identity misuse and supplier dependencies amplify business impact.
  • Practical takeaways for improving recovery planning and supplier assurance through adversarial testing.