McDonalds ai hiring of chatbot exposed data of work candidates
NEWNow you can listen to News articles!
Many companies now trust AI to handle parts of the hiring process. The Bots screen resumes, filters the candidates and manages preliminary communication before entering a human. McDonald’s uses a hiring platform with AI called Mchire, which works with the Paradox.AI chatbot, Olivia, to optimize its recruitment process.
While AI brings convenience, it also comes with data privacy risks. This was clear when two security investigators responsibly revealed a critical vulnerability that presented a small number of candidate records, despite the fact that some early reports suggested a much greater violation.
Register for my free Cyberguy report
Get my best technological tips, urgent security alerts and exclusive offers delivered directly to your inbox. In addition, you will get instant access to my definitive scam survival guide, free when it joins me Cyberguy.com/newsletter
How Chatbots of AIs are helping computer pirates to point to their bank accounts

A sign of McDonald’s (Kurt “Cyberguy” Knutsson)
What did the researchers find on the AI hiring platform of McDonald’s?
On June 30, 2025, security researchers Ian Carroll and Sam Curry discovered vulnerability in a paradox test. Using weak and obsolete credentials, they agreed to a trial portal and discovered a non -authenticated API point linked to chat interaction records.
They recovered seven chat records, five of which included candidate information based on the United States, such as:
- Complete names
- Email addresses
- Phone numbers
- IP addresses
The remaining two records did not include personal data. In particular, the full employment requests, social security numbers or financial information, and confidential fields remained protected were not exposed.

A sign of McDonald’s (Kurt “Cyberguy” Knutsson)
Paradox.AI confirms the scope of security vulnerability
Paradox.AI responded quickly, disabled the test account immediately and patching the end point exposed to a few hours after notification. In a public statement, the company confirmed that only five candidate records containing personal information were accessed, and only by the two researchers who ethically revealed the problem.
The company states that the incident hit only a paradox client, which is believed to be McDonald’s, and no other paradox. Customers or systems were affected. There is no evidence of malicious access or that the data has been leaked or publicly filtered. The company continued to say that “we are sure that, according to our records, this test account was not accessed by a third party other than security researchers.”
What is artificial intelligence (AI)?
What McDonald’s and Paradox.AI are doing now
Paradox.AI admitted that the test account, established before 2019, should have been dismantled, and that inherited credentials no longer comply with current password standards. In response to the incident, the company has:
- Revoked the credentials of the inherited test account
- Deployed a patch to close the vulnerable end point
- Launched an error reward program
- Public contact was added for security concerns at security@paradox.ai
In response, McDonald’s issued a statement:
“We are disappointed by this unacceptable vulnerability of a third -party provider, Paradox.AI. As we knew about the problem, we order Paradox.AI to remedy the problem immediately, and it was resolved the same day that we were informed. We took our commitment to cyber security and we will continue to be responsible for our suppliers of third party responsible to comply with our data protection standards.”

A sign of McDonald’s (Kurt “Cyberguy” Knutsson)
Were 64 million job requests really?
The first reports suggested that vulnerability could have exposed up to 64 million job requests. However, the researchers never confirmed this number and the Paradox research. The only records accessed were the seven chat samples taken by the researchers to verify the problem.
We communicated with Paradox.AI, and a representative told us: “Our public publication should serve as the official Paradox statement. It provides context, as well as some clarification of the inaccuracies published in other media.” According to his statement, Paradox.
Although the underlying vulnerability was real, it was only accessed at a very limited data range, thanks to the shares of the researchers and the rapid response of the supplier.
Could these data have been used maliciously?
While the researchers agreed to personal information in five records, there is no evidence that the attackers once exploit this data. However, hypothetically, these data could be used for several scams, such as:
- Make recruiters to collect more personal information
- PHISHING ELECTRONIC POST DELIVERY Under the appearance of incorporation
- Go to employment applicants with false job offers
The nature of the exposed data makes it sensitive, even if the scope was limited.
Get the News business on the fly by clicking here
6 steps to protect your personal data when using online hiring platforms
Mchire’s violation shows how easily personal information can be exposed when IA tools collect employment application data. These six steps can help you protect your information before, during and after applying.
1. Limit the personal data you share
Just share the necessary information to complete the application. Do not provide confidential details such as your social security number, bank account information or the address of the full house unless you are sure that the platform is legitimate and safe.
2. Get an email from alias for employment applications
An Alias email address is an additional email address that can be used to receive emails in the same mailbox as the main email address. It acts as a forwarding address, directing the emails to the main email address. It also maintains your search for organized work, helps you detect scam Quickly and reduces damage if a company badly manages its data.
See my review of the best safe and private email services in Cyberguy.com/mail
3. Verify the HTTPS and the Red Flags
Before completing any forms, see that the URL of the website begins with https: // and that the site looks safe and professional. Avoid platforms or bots that ask vague or repetitive questions or redirect it without a clear reason
4. Consider a data disposal service
Incidents such as Mchire Breach show the ease with which personal data can be exposed, even when he believes that he is only requesting a job. A data recovery service helps reduce its online footprint scanning hundreds of data corridor sites and requesting the elimination of your information. This reduces the risk that your personal data is filtered, exploited in phishing scams or used for supplantation.
While no service promises to eliminate all its Internet data, having an elimination service is excellent if you want to constantly monitor and automate the process of eliminating your information from hundreds of sites continuously for a longer period of time.
See my best selections to obtain data removal services and get a free scan to find out if your personal information is now available on the web visiting Cyberguy.com/delete
Get a free scan to find out if your personal information is already on the web: Cyberguy.com/freescan
5. Use strong and unique passwords for job search accounts
If you create accounts on hiring platforms, avoid reusing passwords from other services. A weak or reused password may facilitate the attackers to compromise their data if a site is violated. Consider using a password administrator to generate and store safe passwords.
See the best password administrators reviewed by 2025 experts in Cyberguy.com/Passwords
6. Monitor the signs of misuse of identity or scam messages
After requesting work, keep alert for emails or text messages that look “deactivated”. Scammers often use filtered data to impersonate recruiters or employers, especially after high profile infractions. Be attentive to applications for incorporation or false messages that request confidential information such as bank data or ID. In case of doubt, verify directly with the company.
Click here to get the News application
Kurt key takeway
This incident was a serious but limited security problem. Thanks to the responsible dissemination of the researchers and the rapid response of Paradox.AI, the exhibition was contained to only five candidate records, and did not filter or used personal data. That said, the event is a reminder: when the AI is involved in hiring, the privacy of the data must continue to be a main concern. Even small supervisions, such as a forgotten test account, can put the data of real people at risk.
Do you think more transparency of companies is needed when your data is involved in the hiring process? Get us knowing in Cyberguy.com/contact
Register for my free Cyberguy report
Get my best technological tips, urgent security alerts and exclusive offers delivered directly to your inbox. In addition, you will get instant access to my definitive scam survival guide, free when it joins me Cyberguy.com/newsletter
Copyright 2025 Cyberguy.com. All rights reserved.
Kurt “Cyberguy” Knutsson is a award -winning technological journalist who has a deep love for technology, equipment and devices that improve life with their contributions for News & News Business Startzing Mornings in “News & Friends”. Do you have a technological question? Get the free Kurt’s free newsletter, share your voice, an idea of the story or comment on Cyberguy.com.


