McD's hired a company called Paradox.AI to run an "AI" chatbot to conduct hiring interviews for its restaurants. Pretty basic stuff. I'm a little unclear as to how much of the application/interview/hiring process Paradox was responsible for, but it at least conducted an online interview with the applicants.
There was a recent data spill from Paradox that exposed "64 million records, including applicants’ names, email addresses and phone numbers." That's a lot of records. Then again, McDonald's has a lot of locations and high turnover.
Security researchers were able to get in to McDonald's access portal by guessing their password. Said password?
1
2
3
4
5
6.
I guess I'd better change the combination on my luggage.
https://krebsonsecurity.com/2025/07/poor-passwords-tattle-on-ai-hiring-bot-maker-paradox-ai/
The most common passwords for 2025, thus far, are:
123456
123456789
qwerty
password
12345
12345678
111111
1234567
123123
1234567890
https://www.passwordmanager.com/most-common-passwords-latest-statistics/
Now, here's the ridiculous part: it would be pretty trivial for the programmers at Paradox to BLOCK THE USE OF PASSWORDS LIKE THIS! These are common patterns, and it would be easy to test the password and say "NO! You have to use a good password!" There are APIs that enforce good password measures, and clearly they are not using them.
Paradox should be black-listed as a company not to do business with if they allow passwords like this.
Oh, and other Paradox clients? Several Fortune 500 corps including Aramark, Lockheed Martin, Lowes, and Pepsi.
There was a recent data spill from Paradox that exposed "64 million records, including applicants’ names, email addresses and phone numbers." That's a lot of records. Then again, McDonald's has a lot of locations and high turnover.
Security researchers were able to get in to McDonald's access portal by guessing their password. Said password?
1
2
3
4
5
6.
I guess I'd better change the combination on my luggage.
https://krebsonsecurity.com/2025/07/poor-passwords-tattle-on-ai-hiring-bot-maker-paradox-ai/
The most common passwords for 2025, thus far, are:
123456
123456789
qwerty
password
12345
12345678
111111
1234567
123123
1234567890
https://www.passwordmanager.com/most-common-passwords-latest-statistics/
Now, here's the ridiculous part: it would be pretty trivial for the programmers at Paradox to BLOCK THE USE OF PASSWORDS LIKE THIS! These are common patterns, and it would be easy to test the password and say "NO! You have to use a good password!" There are APIs that enforce good password measures, and clearly they are not using them.
Paradox should be black-listed as a company not to do business with if they allow passwords like this.
Oh, and other Paradox clients? Several Fortune 500 corps including Aramark, Lockheed Martin, Lowes, and Pepsi.
no subject
Date: 2025-07-18 05:22 pm (UTC)no subject
Date: 2025-07-18 06:18 pm (UTC)Absolute insanity that someone would set up a third-party portal with a password like that. I'd sack that person.
no subject
Date: 2025-07-18 06:24 pm (UTC)That said, I agree about McDogFood's security ineptitude. This was not a matter of things that don't matter, except perhaps from the POV from some highly entitled staffer or executive. (Who cares if our applicants' records are leaked? They're just "little people".)
no subject
Date: 2025-07-18 06:28 pm (UTC)I have a weak password for sites that don't matter: a social media site that demands an account that I'm not likely to revisit, for example. And I'm sure it's been compromised, and I don't care. But for my important sites, the ones that use a credit card, those passwords are unique for each site and don't get re-used. I have a formula that is easy for me to remember. And I can always do a reset if I have to. When I can, sites that want a credit card I just route through PayPal which uses 2FA through my phone: the site gets a long strong unique password and the site doesn't have my credit card info!
no subject
Date: 2025-07-18 08:55 pm (UTC)I too don't care if someone else uses my account to play cards, but I do care if they use that site as a stepping stone to hack the rest of my life.
no subject
Date: 2025-07-18 09:05 pm (UTC)I give it a burner email address, that lasts just long enough for the account creation to be verified - deleted when the inevitable spam arrives, if not sooner. And who knows what my name, address and other demographic info look like the day I create the account.
I used to favor rude remarks about overly intrusive demands for information, along with demographics no human would believe. Then I decided I didn't need to even give them that much info. So Israel (Izzy) Forreal has been retired, in favor of semi-random combinations. Though I did enjoy signing up one time as Donald Trump, resident in Antarctica, with a semi-accurate profession.
Come to think of it, these days it's easier to let my software assign a good, unique, password along with the temporarily usable email address. But there was a time ...
no subject
Date: 2025-07-18 09:12 pm (UTC)Somewhere there is a site that has a wrong birth date for me, exactly because I didn't want to give the correct one. It is amazing where that date turns up.
no subject
Date: 2025-07-18 09:51 pm (UTC)I've started using such disposable emails, but not OS-generated passwords. Perhaps I should.
no subject
Date: 2025-07-18 09:50 pm (UTC)Interesting....