By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Tech Consumer JournalTech Consumer JournalTech Consumer Journal
  • News
  • Phones
  • Tablets
  • Wearable
  • Home Tech
  • Streaming
Reading: Bug Hunters Gain Access to 64 Million McDonald’s Job Applicants’ Info by Using the Password ‘123456’
Share
Sign In
Notification Show More
Font ResizerAa
Tech Consumer JournalTech Consumer Journal
Font ResizerAa
  • News
  • Phones
  • Tablets
  • Wearable
  • Home Tech
  • Streaming
Search
  • News
  • Phones
  • Tablets
  • Wearable
  • Home Tech
  • Streaming
Have an existing account? Sign In
Follow US
  • Contact
  • Blog
  • Complaint
  • Advertise
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
Tech Consumer Journal > News > Bug Hunters Gain Access to 64 Million McDonald’s Job Applicants’ Info by Using the Password ‘123456’
News

Bug Hunters Gain Access to 64 Million McDonald’s Job Applicants’ Info by Using the Password ‘123456’

News Room
Last updated: July 11, 2025 1:48 pm
News Room
Share
SHARE

A recruitment platform used by McDonald’s is alleged to have had such poor cybersecurity that researchers were able to log into it using a non-password and thus gain access to information on tens of millions of job applicants, including contact details and chat logs between the user and the restaurant’s AI bot.

The platform in question, called McHire, operates a chatbot, dubbed Olivia. Job applicants chat with Olivia, who, in an effort to decide whether they’re worthy of flipping hamburgers or not, assesses them via a personality test. The bot was created by a company called Paradox.ai.

Security researchers Sam Curry and Ian Carroll found that, using the username/password combination 123456/123456, they were able to log into the application, where they were given access to a treasure trove of information on job applicants. Indeed, Curry and Carroll were able to “retrieve the personal data of more than 64 million applicants,” the researchers write.

Their write-up is as hilarious as it is disturbing. The duo notes:

“Without much thought, we entered “123456” as the username and “123456” as the password and were surprised to see we were immediately logged in! It turned out we had become the administrator of a test restaurant inside the McHire system.

The information included names, email addresses, phone numbers, addresses, the state where the job candidate lived, and the auth token they used to gain access to the website. Additionally, Curry and Carroll could see “every chat interaction [from every person] that has ever applied for a job at McDonald’s.”

It’s all pretty shameful stuff, although not particularly surprising. Cybersecurity has never been prioritized in the corporate world, which is why everything is getting hacked all the time. Many software programs are designed without any apparent concern for security at all. Still, the level of incompetence here is pretty damn bad and should be considered embarrassing for everyone involved.

Curry and Carroll write that they disclosed the security problems to Paradox.ai and McDonald’s on June 30th. On the same day, the restaurant chain confirmed that the credentials in question were “no longer usable to access the app.” On July 1st, Paradox.ai. communicated to the researchers that the issues had “been resolved.” In a blog post, Paradox clarified what had happened: “On June 30, two security researchers reached out to the Paradox team about a vulnerability on our system. We promptly investigated the issue and resolved it within a few hours of being notified.” The company went on to say:

Using a legacy password, the researchers logged into a Paradox test account related to a single Paradox client instance. We’ve updated our password security standards since the account was created, but this test account’s password was never updated. Once logged into the test account, the researchers identified an API endpoint vulnerability that allowed them to access information related to chat interactions in the affected client instance. Unfortunately, none of our penetration tests previously identified the issue.

Gizmodo reached out to both companies for more information.

Read the full article here

You Might Also Like

MAGA Billionaire’s Favorite New School Does Not Have Teachers, Allows Kids to Earn Money

CDC Director Denies Report She’s Been Fired by Trump Regime (HHS Says She’s Out)

OpenAI Admits Safety Controls ‘Degrade,’ As Wrongful Death Lawsuit Grabs Headlines

One of the Most Shocking Scenes in ‘Weapons’ Is Now Online

How Marvel’s Huge Budget for ‘Eternals’ Actually Worked Against It

Share This Article
Facebook Twitter Copy Link Print
Previous Article ‘It’s an Incredible Tool. But It’s Going to Make Idiots’
Next Article The Most Accurate Way to Play Game Boy Games Is Available Again, but There’s a Catch
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1kLike
69.1kFollow
134kPin
54.3kFollow

Latest News

The New ‘Toxic Avenger’ Is Helping Avenge Real-World Health Care Debt
News
Famous Painting Looted by Nazis Spotted on Real Estate Website, Disappears Again
News
Our First Look at Nicolas Cage’s Jesus Horror Movie Is 20 Seconds of Agony
News
Google Delivers the AI Phone That Apple Promised
News
RFK Jr. Promises to Reveal the ‘Cause’ of Autism Next Month
News
Marshall Now Has a Big Party Speaker That’s Perfect for Pretending You’re in a Band
News
The Top Diseases We Choose to Stay Ignorant About, According to Scientists
News
Microsoft Locks Down Building After Protesters Breach President’s Office
News

You Might also Like

News

AI Is Crushing the Early Career Job Market, Stanford Study Finds

News Room News Room 6 Min Read
News

Smart Glasses, Buggy Voice Assistant

News Room News Room 8 Min Read
News

This Visiting Interstellar Comet Just Keeps Getting Weirder

News Room News Room 4 Min Read
Tech Consumer JournalTech Consumer Journal
Follow US
2024 © Prices.com LLC. All Rights Reserved.
  • Privacy Policy
  • Terms of use
  • For Advertisers
  • Contact
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?