{"text":[[{"start":10.24,"text":"A hacker who calls himself “Rey” has claimed to have breached Jaguar Land Rover for the second time in just six months, in a move that has halted production of all the carmaker’s vehicles in the UK."}],[{"start":24.27,"text":"The English-speaking hacker claimed responsibility for the attack late on Tuesday evening by posting a screenshot of what purported to be internal JLR data on the messaging app Telegram. "}],[{"start":37.85,"text":"“[Gang], this so easy,” read the post, which was sent to more than 50,000 subscribers to a Telegram channel."}],[{"start":46.03,"text":"Cyber experts say they believe “Rey” is the same individual previously linked to the hacker group Hellcat, which claimed to have breached JLR in March and to have stolen confidential data. JLR declined to comment on the previous incident in March."}],[{"start":63.269999999999996,"text":"The organisation, which uses the same tactics as the “Scattered Spider” collective linked to the high-profile attacks on retailers including M&S, has previously claimed to have attacked companies such as telecom giants Orange and Telefónica. "}],[{"start":79.91,"text":"Following the breach, JLR halted production of its vehicles in the UK from Monday after shutting down its systems to respond to the cyber incident. Production has not restarted and workers at the affected plants have been asked to stay at home."}],[{"start":97.49,"text":"A spokesperson for JLR said: “We are aware of the claims relating to the recent cyber incident and we are continuing to actively investigate.” JLR declined to confirm if Rey or Hellcat were the responsible party. "}],[{"start":112.58999999999999,"text":"Rey’s post claiming responsibility for the attack was quickly followed by others on the Telegram channel, called “Scattered LAPSUS$ hunters 4.0,” with another user joking: “Where is my new car, Land Rover?”"}],[{"start":127.57999999999998,"text":"The attacks follow a spate of high-profile breaches of big companies in recent months, including Co-op, Harrods and Qantas. "}],[{"start":136.41,"text":"Jake Moore, global cyber security adviser at ESET, said the nature of the JLR attack showed how young hacking groups were “brazenly confident” about not getting caught, which added “extra salt in the wound” for victims."}],[{"start":151.09,"text":"“This group is after money and notoriety, and it’s often successful,” he added. "}],[{"start":156.84,"text":"Aiden Sinnott, principal threat researcher at UK cyber security group Sophos, added that the hackers, often in their mid-teens to early twenties, carried out the attacks on big household names across sectors."}],[{"start":171.94,"text":"It was also challenging for authorities to disband the groups, which were not structurally organised like traditional cyber criminal groups nor headed by any single individual, he said."}],[{"start":184.19,"text":"Sinnott added: “They’re just doing these hacks for fun and for kudos.”"}],[{"start":197.46,"text":""}]],"url":"https://audio.ftmailbox.cn/album/a_1757027864_6449.mp3"}