Technology
McDonald’s hiring AI bot used ‘123456’ password, exposing data of 64M applicants

A major security flaw in McDonald’s AI hiring platform exposed personal details of millions of job seekers, raising concerns over third-party data handling and AI security.
A serious data breach in McDonald’s AI-powered hiring platform, McHire, has exposed personal information belonging to up to 64 million job applicants, according to a report by Wired. The breach, discovered by security researchers Ian Carroll and Sam Curry, has raised red flags about corporate cybersecurity, third-party vendor oversight, and the emerging risks posed by AI recruitment tools.
The vulnerability stemmed from a misconfigured account associated with Olivia, an AI chatbot developed by Paradox.ai, which manages McHire for McDonald’s. Researchers found that this account used the weak password “123456,” granting unauthorised access to vast volumes of sensitive data including names, email addresses, and phone numbers of applicants who had interacted with the platform since its inception.
Paradox.ai confirmed the breach and said that, although the account had been exposed, there was no evidence it had been accessed by malicious actors. The company acted swiftly to patch the vulnerability and has announced plans to launch a bug bounty programme to prevent similar incidents in the future. “Security and trust are critical to our product,” the company said in a statement to Wired. “We’re taking this matter seriously.”
McDonald’s, in response, expressed “deep disappointment” over the breach and reiterated its commitment to maintaining rigorous data protection standards. “We take data privacy seriously and are working closely with our vendor to ensure all proper protocols were followed,” a McDonald’s spokesperson said.
A cautionary tale in third-party vendor risk
The breach is a stark reminder of the vulnerability organisations face when outsourcing critical infrastructure to third-party providers. A 2017 survey by the Ponemon Institute revealed that 56% of companies had experienced data breaches originating from third-party vendors, with each compromised record costing an average of $16 more to remediate compared to internal breaches.
Compounding the risk, most organisations lack a comprehensive inventory of third-party access points—57% fail to maintain such records, according to industry research. In McDonald’s case, the exposed account had reportedly gone unused since 2019 and was never decommissioned, highlighting the long-term risks of forgotten or orphaned digital assets.
Weak passwords and simple errors, big consequences
The use of “123456” as a password for a system managing millions of personal records is a textbook example of how human error remains one of the most common causes of data breaches. Despite decades of awareness campaigns, weak passwords and failure to implement multi-factor authentication remain pervasive in many business environments.
A study cited by cybersecurity firm Shred-it found that 47% of business leaders identified employee negligence as the primary cause of data breaches. Such oversights continue to cost organisations billions of dollars globally. The average data breach in 2017 was estimated to cost $3.6 million, according to the same study.
AI hiring tools and the need for AI-specific security protocols
The breach also draws attention to the specific challenges that come with deploying AI-driven systems in recruitment and HR functions. AI platforms like Olivia not only collect and store sensitive applicant data but also use algorithms to interact with users, making them prime targets for phishing and manipulation.
Security researchers warned that the leaked data could be exploited by attackers posing as McDonald’s recruiters, especially targeting job seekers who may be in vulnerable financial situations.
While security frameworks tailored for AI systems—such as the NIST AI Risk Management Framework and Microsoft’s Responsible AI practices—are available, adoption remains inconsistent. Many organisations still treat AI platforms as conventional IT systems, without the layered protections needed for complex, autonomous tools.
Topics
Author
Loading...
Loading...






