The cyber threat facing Britain’s infrastructure sharpened again this week after London North Eastern Railway (LNER) confirmed a security incident that exposed passenger contact information and limited journey data via a third-party supplier.
While the breach did not compromise financial credentials or password systems, it has raised concerns across the insurance and risk management sectors, with cyber liability protections now firmly in the spotlight.
The intrusion, which LNER disclosed on Wednesday, is believed to have involved unauthorised access to customer files managed externally. Although train operations and sales platforms remain unaffected, the rail operator warned customers to exercise caution regarding any unexpected communications, particularly messages requesting personal information.
A spokesperson for LNER stated the company was treating the incident with “the highest priority,” and had engaged cybersecurity specialists to assess the scope of the intrusion and tighten external defences. “We are working closely with our supplier and will issue further updates as more becomes known,” the spokesperson added.
The breach follows a wave of cyber-attacks targeting UK organisations this year, with high-street retailers such as Marks & Spencer and Harrods, and manufacturers like Jaguar Land Rover (JLR), also falling victim. JLR, the country’s largest automotive producer, confirmed this week that a previously reported breach has indeed affected “some data,” and production disruption continues.
The insurance implications of these incidents are being closely watched by the market. David Widdick, ACII and senior placement broker at Verlingue, noted that “cyber remains the biggest business risk in 2025, and it’s clear this will continue into next year.” He added that events such as those affecting LNER, JLR, and M&S illustrate the relentless pace of cyber criminality and the growing challenge facing corporate IT teams.
“Internal IT departments will tell you that protecting systems is a constant battle,” Widdick said. “We’re now seeing cyber insurance limits being tested in record time, which is why we’re strongly advising clients to review their existing cover and ensure their limits remain fit for today’s risk landscape.”
This latest event further highlights a perennial weak point in cyber defence strategies: third-party service providers. The reliance on external vendors to manage customer data, process transactions or support logistics creates layers of exposure that many firms struggle to fully monitor or control.
Cyber insurers, meanwhile, are recalibrating underwriting criteria, with emphasis increasingly placed on the governance and security protocols of vendor ecosystems. Insurers have been urging policyholders to implement stronger contractual obligations and oversight measures for suppliers, particularly those handling sensitive data.
With 2025 shaping up to be a watershed year for cyber risk, the insurance industry finds itself at a crossroads. Capacity is tightening, premiums are rising, and risk engineering is becoming an essential part of policy conversations.
For LNER, the operational fallout may be minimal, but the reputational cost - and the lessons for cyber insurers – will likely be significant. As the boundaries between core systems and external partnerships blur, the case for robust cyber risk governance has never been clearer.