Particle.news

Download on the App Store

McDonald’s and Paradox.ai Patch AI Hiring Bot Flaws After Massive Data Exposure

A default “123456” login on a dormant test account exposed 64 million applicants’ names and contact information.

Image
Image
Image
McDonald's Data Breach

Overview

  • Security researchers Ian Carroll and Sam Curry accessed a Paradox.ai administrative portal by guessing the default “123456” password.
  • An ID enumeration vulnerability then allowed the researchers to retrieve chat logs and contact details from up to 64 million McHire applicants.
  • Paradox.ai and McDonald’s deactivated the outdated test account and implemented platform patches under a mandated remediation order.
  • Paradox.ai has launched a bug bounty program aimed at uncovering future security weaknesses before they can be exploited.
  • Security experts warn that the exposed names, emails and phone numbers could fuel targeted phishing attempts and payroll fraud schemes.