The hacking collective known as Scattered Lapsus$ Hunters—which includes sub-groups like Lapsus$, Scattered Spider, and ShinyHunters—recently issued a public announcement declaring that they are “going dark” and “retiring” from further cyberattacks, saying their objectives have been fulfilled. They have admitted to multiple high-profile breaches, including the Jaguar Land Rover (JLR) hack that has severely disrupted production in the UK. Still, cybersecurity experts express serious doubts about whether the group will fully step away: past behavior patterns, the continued risk of law enforcement pressure, and the possibility of rebranding or split-off cells suggest that this may be more of a strategic lull than a permanent shutdown.
Sources: SecurityWeek, IT Pro
Key Takeaways
– Threat groups often announce “retirements” when under mounting legal or operational pressure—but those announcements can mask internal fracture, rebranding, or simply a pause.
– The operational, financial, and reputational damage to victims—like JLR with its stalled production, disrupted supply chains, and data exposure—is severe and long-lasting, even if the threat actors supposedly step back.
– Organizations should not let their guard down: cyber risk persists, especially given that past breaches may continue to have lingering effects, and new or existing groups might adopt methods or personnel formerly associated with Scattered Lapsus$ Hunters.
In-Depth
The announcement by Scattered Lapsus$ Hunters that they are retiring has sent ripples through cybersecurity circles. On the face of it, the move seems definitive: they say their objectives have been achieved, that they will “go dark,” and promise no new attacks in their name. Particularly after the high-profile Jaguar Land Rover intrusion, which led to production halts at multiple UK plants, supply chain chaos, and potential data exposure, their statement acknowledges both operational pressure (arrests, law enforcement actions) and reputational damage.
Yet multiple expert sources are deeply skeptical. In the cybersecurity industry, there is precedent for hack groups “retiring” only to reappear under new names, or operating quietly, selling access, or conducting attacks that won’t be immediately linked back to them.
The statement from Scattered Lapsus$ Hunters includes claims that future data breach disclosures attributed to them will actually result from past activities—not new ones—suggesting they expect ongoing attribution challenges and may still have unfinished backdoors or dormant operations.
For Jaguar Land Rover, the fallout continues. The production shutdown has been extended until at least September 24, 2025, costing the company—and its suppliers—tens of millions of pounds daily. JLR is also grappling with whether and how much data was compromised, especially personal and supplier data, and managing how to restore operations in a controlled manner, with forensic reviews.
From a strategic perspective, this episode underscores a few big lessons. First, no matter how bold or noisy a threat actor is, organizations must assume that public statements of retreat—or “going quiet”—are tactical. Incident response readiness, supply chain resilience, and continuous monitoring must remain high priorities. Secondly, law enforcement and attribution matter: arrests and domestic/international cooperation seem to have factored into the group’s decision‐making. Finally, the automotive sector (and legacy industries in general) face elevated risk because of just-in-time supply chains, globalized dependencies, and aging digital infrastructure overlaid with new attack vectors.
In short: while the “retirement” of Scattered Lapsus$ Hunters might bring a short break, it’s premature to believe the threat has gone away. Vigilance, robust cybersecurity strategy, and readiness for evolving threats are essential if companies—and countries—want to avoid finding themselves in a similar position again.

