Range Rover Evoque and Land Rover Discovery Sport lines at Halewood are the last to restart
All JLR production lines are now back up and running more than six weeks after a cyber attack that incapacitated its global operations.
On Thursday, production lines at its Halewood plant – which builds the Range Rover Evoque and Land Rover Discovery Sport – restarted for the first time since the 1 September attack.
Work to transform the plant as part of a £500 million project to produce JLR's incoming EVs has also restarted.
This follows Land Rover Defender and Discovery lines at Nitra, Slovakia, as well as Range Rover and Range Rover Sport lines at Solihull, which came back online last week.
Initial production output is understood to be limited, given that JLR has referred to the resumption of operations as a “controlled, phased restartâ€.
Operations at the Wolverhampton engine plant, Birmingham battery centre and Solihull body and paint shop are now all back up and running, as are stamping operations in Castle Bromwich, Halewood and Solihull.
A statement regarding the restart at Halewood read: “This is another important moment for JLR, for our suppliers and our people.Â
“We’re all super-proud of the resilience of our people and their energy to get back to doing what they do best – building world-class British luxury vehicles for our global clients.â€
The cyber attack on 1 September brought all factories to a halt and incapacitated JLR, forcing it to shut down its internal computer systems in an effort to protect data from being stolen.
This resulted in production shutdowns at all of its global plants, created issues with parts ordering and stifled retailers.
The consequences of the cyber attack are estimated to have cost JLR a £1.5 billion drop in revenue.
Figures released by the firm last week show that, in the three-month period including the September shutdown, sales to dealers plummeted by nearly a quarter to 66,165.
That represents a loss of 21,138 cars compared with the same period in 2024.
“It has been a challenging quarter for JLR,†outgoing CEO Adrian Mardell said in a statement. However, he said that sales in July and August had been “in line with our expectations†before the cyber attack.
JLR will present its second-quarter financial report in November.

Government to underwrite £1.5bn JLR loan
The UK government said it will guarantee a £1.5 billion loan to JLR, to help it support suppliers who have been hit by the production shutdown.
The loan to the Tata-owned car maker will be issued by a commercial bank but will be underwritten by the UK government.
As well as costing JLR an estimated £50 million a week, the cyber attack has badly hit JLR's suppliers.Â
It's estimated that around 150,000 people are employed by some 700 British firms that supply JLR, and the UK government had been investigating ways to support them, such as a furlough scheme or loans.
It will instead underwrite a single loan to JLR through the Export Development Guarantee (EDG), with JLR repaying the money over a period of five years.Â
Business secretary Peter Kyle said on 27 September that the loan guarantee "will help support the supply chain and protect skilled jobs in the West Midlands, Merseyside and throughout the UK".
Chancellor Rachel Reeves added that the loan would help JLR "support their supply chain and protect a vital part of the British car industry".

JLR hack: what happened?
Autocar first reported issues affecting JLR on 1 September, when dealers couldn't register new cars on 'new plate day', traditionally one of the year's busiest for registrations.
In an effort to combat the hack, JLR began “shutting down" its systems on 2 September. It has not produced any cars globally since, leading to millions of pounds of lost income.
The extent of the issues meant JLR brought police and cybersecurity experts in to “restart our global applications in a controlled and safe mannerâ€.
During this process, which included an investigation, it was discovered that "some data" was "affected", according to JLR. Those affected will be contacted, the firm said.
It's not officially known what data was taken or if a ransom demand has been made, but it is thought it most likely involves customer data, given the involvement of the police.
Who has claimed responsibility for JLR hack?
On 3 September, a group of hackers calling themselves Scattered Lapsus$ Hunters claimed responsibility for the attack on JLR.
This is the same group that hacked Marks & Spencer in May, causing the British retailer seven weeks of disruption and costing £300 million in lost operating profit.
It claimed to have obtained JLR customer data after exploiting a similar flaw in the car maker's IT system. The claim was made on a Telegram messenger group, where a user linked to the hackers posted a screenshot of what appeared to show JLR's internal system.
A member of the group revealled that a well-known flaw in SAP Netweaver, a third-party software used by JLR, was exploited to access the data.
The US's Cybersecurity and Infrastructure Security Agency warned about the flaw earlier this year. An update for the software was released, but whether JLR applied it is unknown.
It's also not known what data was taken or if a ransom demand has been made of JLR.