When Basics Break: How Simple Security Failures Cripple Big Brands

A password of "123456" in 2025, supposedly protecting 64 million people's personal information. McDonald's just handed every UK SMB a masterclass in how vendor incompetence destroys lives.

Some security researchers got curious about Mickey Dee's dystopian AI hiring bot, spent 30 minutes guessing obvious passwords, and suddenly had access to every job application ever submitted to the Golden Arches. We're talking names, phone numbers, chat logs, the works.

While McDonald's and their AI vendor Paradox.ai play hot potato with blame, 64 million desperate job seekers discover their data was protected by supersized digital tissue paper.

This isn't just another data breach story. This is a textbook case of what happens when you bolt on shiny AI features but forget the basics, and it follows exactly the same pattern that cost M&S £300 million and exposed 20 million Co-op customer records just months ago.

The Password That Broke the Internet

Security researchers Ian Carroll and Sam Curry found the admin login page for McDonald's AI hiring system, tried "123456" as the password, and they were in. No multi-factor authentication, no proper access controls, and to top it off, there was an IDOR (Insecure Direct Object Reference) vulnerability.

That's where you can just change a number in the URL and see someone else's data. It's the sort of thing we warn about in first-year computer science, never mind in production systems handling millions of records.

Let me put this in perspective: McDonald's, a company with over 40,000 restaurants worldwide and revenues exceeding $23 billion annually, protected their global hiring database with a password that wouldn't secure a child's tablet. The same corporation that can track every pickle and french fry across their supply chain apparently can't manage basic authentication on systems containing millions of job applications.

The AI angle makes it even more infuriating. Everyone's so keen to automate hiring with clever chatbots and algorithmic screening, but they forget that if you don't lock the back door, it doesn't matter how clever your AI is. It's the old "move fast and break things" mindset, but now it's people's personal data on the line.

The Vendor Blame Game Olympics

Paradox.ai, the vendor behind this catastrophe, claimed the compromised account was a "dormant test account from 2019." But if it's still live and accessible in 2025, that's not "dormant," that's just bloody lazy system administration.

Here's the thing about vendors: they'll promise you the moon during sales calls, then leave test accounts with default passwords running in production for six years. And when researchers expose their incompetence, they fix it quietly and launch a bug bounty program, as if that's going to fix the culture.

This mirrors exactly what we saw in our recent podcast discussion about the DragonForce attacks on M&S and Co-op. Different attack vector, same fundamental problem: vendors who treat security as an afterthought and clients who don't verify their competence.

The M&S and Co-op Connection: Same Disease, Different Symptoms

Just months ago, we watched M&S lose £300 million and Co-op expose 20 million customer records, all because help desk staff at Tata Consultancy Services reset passwords for criminals who sounded convincing on the phone. As I detailed in my analysis of the parliamentary hearing, this wasn't sophisticated malware or nation-state actors. It was basic social engineering exploiting fundamental process failures.

The pattern is identical:

  • Major brand trusts vendor with critical systems

  • Vendor implements embarrassingly weak security controls

  • Criminals exploit basic vulnerabilities that shouldn't exist

  • Millions of customers pay the price

  • Everyone acts shocked and promises to do better

M&S Chairman Archie Norman told MPs the attack was "traumatic" and that "everybody at M&S experienced it." But the trauma was entirely preventable if they'd demanded their vendor implement basic call-back verification procedures.

McDonald's customers are about to experience the same trauma because nobody at McDonald's or Paradox.ai thought to implement authentication stronger than "123456."

The Human Cost of Corporate Negligence

Let's talk about what this actually means for real people. Those 64 million job applications represent desperate people seeking employment, often in difficult economic circumstances. They trusted McDonald's with:

  • Full names and contact details

  • Employment histories and references

  • Personal circumstances and availability

  • Chat logs with AI systems containing sensitive information

Now criminals have access to a treasure trove of personal data perfect for targeted phishing, employment fraud, and identity theft. Someone applying for a minimum-wage job at McDonald's shouldn't have to worry about their personal information being sold on criminal forums because the company couldn't secure a database with a proper password.

The research shows that data from job applications is particularly valuable to criminals because it contains verified personal information from people actively seeking employment. This makes victims more susceptible to fake job offer scams and employment-related fraud.

The AI Security Delusion

The McDonald's breach perfectly illustrates the dangerous delusion that AI somehow equals security. Companies rush to deploy chatbots and algorithmic hiring tools to appear innovative, but they skip foundational security checks because they assume smart technology means secure technology.

I've seen this everywhere: vendors promoting AI-powered solutions with sophisticated natural language processing and machine learning capabilities, while their admin panels are secured with passwords that wouldn't protect a social media account.

As Dr. Sarah Chen noted in our podcast discussion, there's this assumption that if the AI is clever, the system must be secure. But the evidence says otherwise. We're seeing security failures across the AI vendor ecosystem because companies prioritize functionality over protection.

The rush to automate hiring with AI has created a perfect storm: sensitive personal data from vulnerable job seekers, processed by systems with marketing-driven development cycles, secured by vendors who treat cybersecurity as a compliance checkbox rather than a business imperative.

Why This Keeps Happening: The Vendor Risk Reality

The uncomfortable truth is that vendor risk management in most organizations is theatre. Companies sign contracts with liability clauses they never intend to enforce, conduct security assessments they don't understand, and trust vendors with business-critical systems they can't monitor.

Here's what actually happens during most vendor security reviews:

  • Vendor provides a security questionnaire filled with marketing language

  • Client's procurement team checks boxes without understanding technical implications

  • Legal team negotiates liability clauses that sound impressive but prove worthless during breaches

  • IT team integrates vendor systems without proper security validation

  • Everyone assumes someone else verified the vendor's competence

When McDonald's selected Paradox.ai for their hiring platform, did anyone actually test whether admin accounts used secure passwords? Did anyone verify that test systems were properly decommissioned? Did anyone check for basic vulnerabilities like IDOR flaws?

Based on the evidence, the answer is clearly no.

The Pattern We Must Break

McDonald's, M&S, Co-op, AT&T, Change Healthcare, 23andMe: different industries, different attack vectors, identical root cause. Organizations outsource critical functions to vendors without ensuring those vendors can actually secure the systems they're providing.

The attackers aren't getting more sophisticated. They're getting more efficient at exploiting the same basic failures that have plagued the industry for decades:

  • Weak authentication: Passwords like "123456" or easily bypassed help desk procedures

  • Poor access controls: Admin panels accessible without proper verification

  • Insecure development: IDOR vulnerabilities and test accounts left in production

  • Vendor accountability gaps: Blame-shifting when inevitably discovered

Every one of these failures was preventable using security controls available in 2015, never mind 2025.

What This Means for Your Business

If you're running a UK SME and thinking "well, that's McDonald's problem," you're missing the point entirely. The same vendors who failed McDonald's are probably bidding for your contracts right now. The same security gaps that cost M&S £300 million exist in systems you depend on every day.

Ask yourself:

  • Do you know what passwords your vendors use for admin access to your data?

  • Have you tested your vendors' security controls, or just reviewed their marketing materials?

  • Do you have contractual mechanisms to force vendors to fix security failures?

  • Can you monitor vendor access to your systems and data?

Most UK SMBs can't answer these questions because they assume vendor selection is primarily about features and price. Security gets relegated to a checkbox exercise that satisfies procurement requirements but provides no actual protection.

The Solution Nobody Wants to Hear

Preventing these disasters requires fundamental changes to how businesses approach vendor relationships:

Security-First Vendor Selection: Don't just ask if vendors have ISO certifications. Test their security controls. Try basic password attacks. Check for common vulnerabilities. If they can't demonstrate basic competence, find vendors who can.

Continuous Vendor Monitoring: Security isn't a one-time assessment. Vendors' security postures change, new vulnerabilities emerge, and systems evolve. Regular testing and monitoring should be contractual requirements, not optional extras.

Meaningful Liability Transfer: Force vendors to accept financial responsibility for security failures that impact your operations. If they're not willing to stand behind their cybersecurity promises, find vendors who will.

Internal Capability Building: Stop relying entirely on vendor security claims. Develop internal capability to assess, monitor, and validate vendor security controls. This doesn't require massive investment, just competent professionals who understand the basics.

The Basics Still Work (When Actually Implemented)

The most frustrating aspect of the McDonald's breach is how easily preventable it was. Strong passwords, multi-factor authentication, proper access controls, and secure development practices would have stopped this attack completely.

These aren't cutting-edge security technologies requiring massive investment. They're fundamental controls that should be standard in any system handling personal data:

  • Proper authentication: No shared passwords, mandatory MFA for admin access, regular credential rotation

  • Access controls: Principle of least privilege, proper session management, audit logging

  • Secure development: Input validation, proper testing, systematic vulnerability assessment

  • Lifecycle management: Proper decommissioning of test systems, regular security reviews

The technology exists, the best practices are well-documented, and the implementation costs are negligible compared to breach consequences. The only missing ingredient is organizational commitment to actually implementing these controls.

The Bottom Line: Stop Pretending This Is Hard

McDonald's just proved that a company with unlimited resources and global reach can't implement basic password security on systems containing 64 million records. M&S and Co-op proved that billion-pound retailers can be destroyed by phone calls to poorly trained help desk staff.

These aren't sophisticated nation-state attacks requiring military-grade defenses. They're basic competence failures that destroy businesses because leaders prioritize shiny features over fundamental security.

The criminals targeting UK businesses aren't laughing because they're technically superior. They're laughing because we keep making the same elementary mistakes while acting surprised when they exploit our incompetence.

Your choice is simple: implement basic security controls now, or become next month's cautionary tale about how "nobody could have predicted" that vendors using "123456" as passwords might get breached.

The basics work. They're proven, affordable, and available to every business regardless of size or budget. The only question is whether you'll implement them before or after criminals demonstrate why they matter.

Source Article
Cybersecurity News McDonald's AI Hiring Bot Leaks Data of Millions
The Small Business Cyber Security Guy M&S Co-op DragonForce Ransomware Parliamentary Hearing Analysis
Security Researchers Ian Carroll and Sam Curry - McDonald's Vulnerability Discovery
Parliamentary Business Committee M&S and Co-op Executive Testimony (July 8, 2025)
Computer Weekly DragonForce Ransomware Attacks on UK Retailers
OWASP Insecure Direct Object Reference Vulnerability Guide
Paradox.ai Official vendor statements on security incident
NCSC Vendor Risk Management Guidance
Noel Bradford

Noel Bradford – Head of Technology at Equate Group, Professional Bullshit Detector, and Full-Time IT Cynic

As Head of Technology at Equate Group, my job description is technically “keeping the lights on,” but in reality, it’s more like “stopping people from setting their own house on fire.” With over 40 years in tech, I’ve seen every IT horror story imaginable—most of them self-inflicted by people who think cybersecurity is just installing antivirus and praying to Saint Norton.

I specialise in cybersecurity for UK businesses, which usually means explaining the difference between ‘MFA’ and ‘WTF’ to directors who still write their passwords on Post-it notes. On Tuesdays, I also help further education colleges navigate Cyber Essentials certification, a process so unnecessarily painful it makes root canal surgery look fun.

My natural habitat? Server rooms held together with zip ties and misplaced optimism, where every cable run is a “temporary fix” from 2012. My mortal enemies? Unmanaged switches, backups that only exist in someone’s imagination, and users who think clicking “Enable Macros” is just fine because it makes the spreadsheet work.

I’m blunt, sarcastic, and genuinely allergic to bullshit. If you want gentle hand-holding and reassuring corporate waffle, you’re in the wrong place. If you want someone who’ll fix your IT, tell you exactly why it broke, and throw in some unsolicited life advice, I’m your man.

Technology isn’t hard. People make it hard. And they make me drink.

https://noelbradford.com
Previous
Previous

VPNs are Critical in a Hybrid Working World - But Without MFA They Are Almost Pointless

Next
Next

From 17 Project Management Tools to Zero Productivity: The Communication Chaos Epidemic