A weak username and password is all it takes to get data?

I don’t necessarily blame McDonalds directly for this, but apparently, they are using a chatbot to help them with hiring at the company.

Here’s the first paragraph of the article.

If you want a job at McDonald’s today, there’s a good chance you’ll have to talk to Olivia. Olivia is not, in fact, a human being, but instead an AI chatbot that screens applicants, asks for their contact information and résumé, directs them to a personality test, and occasionally makes them “go insane” by repeatedly misunderstanding their most basic questions.

The article continues:

On Wednesday, security researchers Ian Carroll and Sam Curry revealed that they found simple methods to hack into the backend of the AI chatbot platform on McHire.com, McDonald’s website that many of its franchisees use to handle job applications. Carroll and Curry, hackers with a long track record of independent security testing, discovered that simple web-based vulnerabilities—including guessing one laughably weak password—allowed them to access a Paradox.ai account and query the company’s databases that held every McHire user’s chats with Olivia. The data appears to include as many as 64 million records, including applicants’ names, email addresses, and phone numbers.

Think about this. 64 million records which includes names, emails and resume data. Depending on the resume, that could entail your address, phone number, other places worked, when you worked, and other pieces of info your resume could have included.

No wonder many years ago the guy that taught a class on resumes said not to include your full address on it. But I will preface this by saying that things change and I’m not going to tell people what they should do as I’m not fully versed on requirements these days.

When WIRED reached out to McDonald’s and Paradox.ai for comment, a spokesperson for Paradox.ai shared a blog post the company planned to publish that confirmed Carroll and Curry’s findings. The company noted that only a fraction of the records Carroll and Curry accessed contained personal information, and said it had verified that the account with the “123456” password that exposed the information “was not accessed by any third party” other than the researchers. The company also added that it’s instituting a bug bounty program to better catch security vulnerabilities in the future. “We do not take this matter lightly, even though it was resolved swiftly and effectively,” Paradox.ai’s chief legal officer, Stephanie King, told WIRED in an interview. “We own this.”

For those who want to read the linked blog post, here is that link. I’ve not read this.

In McDonald’s defense, the article says:

In its own statement to WIRED, McDonald’s agreed that Paradox.ai was to blame. “We’re disappointed by this unacceptable vulnerability from a third-party provider, Paradox.ai. As soon as we learned of the issue, we mandated Paradox.ai to remediate the issue immediately, and it was resolved on the same day it was reported to us,” the statement reads. “We take our commitment to cyber security seriously and will continue to hold our third-party providers accountable to meeting our standards of data protection.”

As researchers do, they poke around.

On a whim, Carroll says he tried two of the most common sets of login credentials: The username and password “admin,” and then the username and password “123456.” The second of those two tries worked. “It’s more common than you’d think,” Carroll says. There appeared to be no multifactor authentication for that Paradox.ai login page.

With those credentials, Carroll and Curry could see they now had administrator access to a test McDonald’s “restaurant” on McHire, and they figured out all the employees listed there appeared to be Paradox.ai developers, seemingly based in Vietnam. They found a link within the platform to apparent test job postings for that nonexistent McDonald’s location, clicked on one posting, applied to it, and could see their own application on the backend system they now had access to. (In its blog post, Paradox.ai notes that the test account had “not been logged into since 2019 and frankly, should have been decommissioned.”)

The research continues:

The personal information exposed by Paradox.ai’s security lapses isn’t the most sensitive, Carroll and Curry note. But the risk for the applicants, they argue, was heightened by the fact that the data is associated with the knowledge of their employment at McDonald’s—or their intention to get a job there. “Had someone exploited this, the phishing risk would have actually been massive,” says Curry. “It’s not just people’s personally identifiable information and résumé. It’s that information for people who are looking for a job at McDonald’s, people who are eager and waiting for emails back.”

So someone who wanted to phish these people would have a wealth of information to use depending on what was submitted. This is crazy.

For full details, please read McDonald’s AI Hiring Bot Exposed Millions of Applicants’ Data to Hackers Who Tried the Password ‘123456’ and thanks for reading!

At least the issue is fixed now, but just be aware of potential issues.


Discover more from The Technology blog and podcast

Subscribe to get the latest posts sent to your email.

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.