{"id":14430,"date":"2025-07-11T12:12:37","date_gmt":"2025-07-11T12:12:37","guid":{"rendered":"https:\/\/newestek.com\/?p=14430"},"modified":"2025-07-11T12:12:37","modified_gmt":"2025-07-11T12:12:37","slug":"mcdonalds-ai-hiring-tools-password-123456-exposes-data-of-64m-applicants","status":"publish","type":"post","link":"https:\/\/newestek.com\/?p=14430","title":{"rendered":"McDonald\u2019s AI hiring tool\u2019s password? \u2018123456\u2019: Exposes data of 64M applicants"},"content":{"rendered":"<div>\n<div id=\"remove_no_follow\">\n<div class=\"grid grid--cols-10@md grid--cols-8@lg article-column\">\n<div class=\"col-12 col-10@md col-6@lg col-start-3@lg\">\n<div class=\"article-column__content\">\n<section class=\"wp-block-bigbite-multi-title\">\n<div class=\"container\"><\/div>\n<\/section>\n<p>A security oversight in McDonald\u2019s AI-powered hiring platform \u201cMcHire\u201d was found exposing sensitive applicant data belonging to as many as 64 million job seekers.<\/p>\n<p>Discovered in late June 2025 by security researchers Ian Carroll and Sam Curry, the issue was a default admin login and an insecure direct object reference (IDOR) in an internal API that allowed access to applicants\u2019 chat histories with \u2018Olivia\u2019, McHire\u2019s automated recruiter bot.<\/p>\n<p>\u201cThe McDonald\u2019s breach confirms that even sophisticated AI systems can be compromised by elementary security oversights,\u201d said Aditi Gupta, senior manager for professional services consulting at Black Duck. \u201cThe rush to deploy new technology must not compromise basic security principles. Organizations must prioritize fundamental security measures to ensure uncompromised trust in their software, especially for the increasingly regulated, AI-powered world.\u201d<\/p>\n<p>The flaws, discovered during a security review following Reddit<a href=\"https:\/\/www.reddit.com\/r\/mildlyinfuriating\/comments\/1lo9s75\/mcdonalds_hiring_ai_is_making_me_go_insane\/\" target=\"_blank\" rel=\"noreferrer noopener\"> complaints<\/a> over the bot\u2019s \u201cnonsensical answers,\u201d were promptly resolved by McDonald\u2019s and Paradox.ai (Olivia\u2019s creator) upon disclosure.<\/p>\n<h2 class=\"wp-block-heading\" id=\"default-logins-and-idor-lead-to-massive-leaks\">Default logins and IDOR lead to massive leaks<\/h2>\n<p>According to a blog<a href=\"https:\/\/ian.sh\/mcdonalds\" target=\"_blank\" rel=\"noreferrer noopener\"> post<\/a> by Carroll, McHire\u2019s administrative interface for restaurant franchisees accepted the default username \u201c123456\u201d and password \u201c123456.\u201d Logging in with those credentials immediately granted access, not just to a test environment but to live administrative dashboards.<\/p>\n<p>\u201cAlthough the app tries to force single sign-on (<a href=\"https:\/\/www.csoonline.com\/article\/510713\/sso-explained-single-sign-on-definition-examples-and-terminology.html\">SSO<\/a>) for McDonald\u2019s, there is a smaller link for \u2018Paradox team members\u2019 that caught our eye,\u201d Carroll said. \u201cWithout much thought, we entered \u2018123456\u2019 as the password and were surprised to see we were immediately logged in!\u201d<\/p>\n<p>Once inside, researchers additionally discovered an internal API endpoint using a predictable parameter to fetch applicant data. By simply decrementing the ID value, Caroll and Curry retrieved full applicant PII, including chat transcripts, contact info, and job-form data. This IDOR exploit exposed not just contact details but also timestamps, shift preferences, personality test outcomes, and even tokens that could impersonate candidates on McHire.<\/p>\n<p>\u201cThis incident is a prime example of what happens when organizations deploy technology without an understanding of how it works or how it can be operated by untrusted users,\u201d Desired Effect CEO Evan Dornbush said. \u201cWith AI systems handling millions of sensitive data points, organizations must invest in understanding and mitigating pre-emergent threats, or they\u2019ll find themselves playing catch-up, with their customers\u2019 trust on the line.\u201d<\/p>\n<h2 class=\"wp-block-heading\"><a><\/a>Rapid patching saved the day<\/h2>\n<p>Following disclosure on June 30, 2025, Paradox.ai and McDonald\u2019s acknowledged the vulnerability within the hour. By July 1, default credentials were disabled and the endpoint was secured. Paradox.ai also pledged to conduct further security audits, Carroll noted in the blog.<\/p>\n<p>\u201cEven though there\u2019s no indication the data has been used maliciously yet, the scale and sensitivity of the exposure (~64 million applicants) could fuel targeted phishing, smishing\/vishing, and even social engineering campaigns,\u201d said Randolf Barr, chief information security officer at Cequence Security. \u201cCombined with AI tooling, attackers could craft incredibly personalized and convincing threats.\u201d<\/p>\n<p>McDonald\u2019s and Paradox.ai did not immediately respond to queries sent by CSO.<\/p>\n<p>Cybersecurity lapses are becoming increasingly common in recruitment environments, likely due to a focus on speed, automation, and scale at the expense of security. Earlier this week, online applicant tracking platform TalentHook was found &gt;<a href=\"https:\/\/cybernews.com\/security\/talenthook-data-leak-exposes-millions\/\" target=\"_blank\" rel=\"noopener\">leaking almost<\/a><a href=\"https:\/\/cybernews.com\/security\/talenthook-data-leak-exposes-millions\/\" target=\"_blank\" rel=\"noreferrer noopener\"> 26 million PII files<\/a> through a <a href=\"https:\/\/www.csoonline.com\/article\/570683\/microsoft-azure-blob-leak-a-lesson-to-cisos-about-cloud-security-responsibility.html\">misconfigured Azure Blob<\/a> storage container.<\/p>\n<p>Emphasizing the need to bring hiring workflows into mainstream cybersecurity, Kobi Nissan, Co-founder and CEO at MineOS, said, \u201cAny AI system that collects or processes personal data must be subject to the same privacy, security, and access controls as core business systems. That means authentication, auditability, and integration into broader risk workflows, not siloed deployments that fly under the radar.\u201d<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>A security oversight in McDonald\u2019s AI-powered hiring platform \u201cMcHire\u201d was found exposing sensitive applicant data belonging to as many as 64 million job seekers. Discovered in late June 2025 by security researchers Ian Carroll and Sam Curry, the issue was a default admin login and an insecure direct object reference (IDOR) in an internal API that allowed access to applicants\u2019 chat histories with \u2018Olivia\u2019, McHire\u2019s&#8230; <\/p>\n<p class=\"more\"><a class=\"more-link\" href=\"https:\/\/newestek.com\/?p=14430\">Read More<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-14430","post","type-post","status-publish","format-standard","hentry","category-uncategorized","is-cat-link-borders-light is-cat-link-rounded"],"_links":{"self":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts\/14430","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=14430"}],"version-history":[{"count":0,"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts\/14430\/revisions"}],"wp:attachment":[{"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=14430"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=14430"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=14430"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}