{"id":4684,"date":"2025-07-18T21:26:12","date_gmt":"2025-07-18T21:26:12","guid":{"rendered":"https:\/\/techtrendfeed.com\/?p=4684"},"modified":"2025-07-18T21:26:12","modified_gmt":"2025-07-18T21:26:12","slug":"poor-passwords-tattle-on-ai-hiring-bot-maker-paradox-ai-krebs-on-safety","status":"publish","type":"post","link":"https:\/\/techtrendfeed.com\/?p=4684","title":{"rendered":"Poor Passwords Tattle on AI Hiring Bot Maker Paradox.ai \u2013 Krebs on Safety"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div>\n<p>Safety researchers lately revealed that the private info of tens of millions of people that utilized for jobs at <strong>McDonald\u2019s<\/strong> was uncovered after they guessed the password (\u201c123456\u201d) for the quick meals chain\u2019s account at <strong>Paradox.ai<\/strong>, an organization that makes synthetic intelligence primarily based hiring chatbots utilized by many Fortune 500 corporations. Paradox.ai stated the safety oversight was an remoted incident that didn&#8217;t have an effect on its different prospects, however current safety breaches involving its staff in Vietnam inform a extra nuanced story.<\/p>\n<div id=\"attachment_71672\" style=\"width: 759px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" aria-describedby=\"caption-attachment-71672\" decoding=\"async\" class=\" wp-image-71672\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2025\/07\/paradoxai.png\" alt=\"\" width=\"749\" height=\"330\" srcset=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2025\/07\/paradoxai.png 1438w, https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2025\/07\/paradoxai-768x339.png 768w, https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2025\/07\/paradoxai-782x345.png 782w\" sizes=\"auto, (max-width: 749px) 100vw, 749px\"\/><\/p>\n<p id=\"caption-attachment-71672\" class=\"wp-caption-text\">A screenshot of the paradox.ai homepage exhibiting its AI hiring chatbot \u201cOlivia\u201d interacting with potential hires.<\/p>\n<\/div>\n<p>Earlier this month, safety researchers <strong>Ian Carroll<\/strong> and <strong>Sam Curry<\/strong> <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/ian.sh\/mcdonalds\" target=\"_blank\" rel=\"noopener\">wrote about<\/a> easy strategies they discovered to entry the backend of the AI chatbot platform on McHire.com, the McDonald\u2019s web site that lots of its franchisees use to display screen job candidates. As first reported by <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.wired.com\/story\/mcdonalds-ai-hiring-chat-bot-paradoxai\/\" target=\"_blank\" rel=\"noopener\">Wired<\/a>, the researchers found that the weak password utilized by Paradox uncovered 64 million data, together with candidates\u2019 names, electronic mail addresses and cellphone numbers.<\/p>\n<p>Paradox.ai acknowledged the researchers\u2019 findings however stated the corporate\u2019s different consumer cases weren&#8217;t affected, and that no delicate info \u2014 akin to Social Safety numbers \u2014 was uncovered.<\/p>\n<p>\u201cWe&#8217;re assured, primarily based on our data, this take a look at account was not accessed by any third get together apart from the safety researchers,\u201d the corporate wrote in <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.paradox.ai\/blog\/responsible-security-update\" target=\"_blank\" rel=\"noopener\">a July 9 weblog put up<\/a>. \u201cIt had not been logged into since 2019 and admittedly, ought to have been decommissioned. We wish to be very clear that whereas the researchers might have briefly had entry to the system containing all chat interactions (NOT job functions), they solely considered and downloaded 5 chats in complete that had candidate info inside. Once more, at no level was any information leaked on-line or made public.\u201d<\/p>\n<p>Nevertheless, a overview of stolen password information gathered by a number of breach-tracking providers exhibits that on the finish of June 2025, a Paradox.ai administrator in Vietnam suffered a malware compromise on their system that stole usernames and passwords for quite a lot of inner and third-party on-line providers. The outcomes weren&#8217;t fairly.<\/p>\n<p>The password information from the Paradox.ai developer was stolen by a malware pressure often known as \u201c<strong>Nexus Stealer<\/strong>,\u201d a type grabber and password stealer that&#8217;s bought on cybercrime boards. The data snarfed by stealers like Nexus is commonly recovered and listed by information leak aggregator providers like <b>Intelligence X<\/b>, which experiences that the malware on the Paradox.ai developer\u2019s system uncovered a whole bunch of largely poor and recycled passwords (utilizing the identical base password however barely completely different characters on the finish).<\/p>\n<p>These purloined credentials present the developer in query at one level used the identical seven-digit password to log in to Paradox.ai accounts for various <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.paradox.ai\/clients-stories\" target=\"_blank\" rel=\"noopener\">Fortune 500 corporations listed as prospects on the corporate\u2019s web site<\/a>, together with <strong>Aramark<\/strong>, <strong>Lockheed Martin<\/strong>, <strong>Lowes<\/strong>, and <strong>Pepsi.<\/strong><\/p>\n<p>Seven-character passwords, significantly these consisting fully of numerals, are extremely weak to \u201cbrute-force\u201d assaults that may attempt a lot of attainable password combos in fast succession. In keeping with <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.hivesystems.com\/blog\/are-your-passwords-in-the-green\" target=\"_blank\" rel=\"noopener\">a much-referenced password power information<\/a> maintained by <strong>Hive Techniques<\/strong>, fashionable password-cracking methods can work out a seven quantity password kind of immediately.<\/p>\n<div id=\"attachment_71671\" style=\"width: 759px\" class=\"wp-caption aligncenter\"><img aria-describedby=\"caption-attachment-71671\" decoding=\"async\" loading=\"lazy\" class=\" wp-image-71671\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2025\/07\/hivesystems-pwdcrack.png\" alt=\"\" width=\"749\" height=\"395\" srcset=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2025\/07\/hivesystems-pwdcrack.png 1646w, https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2025\/07\/hivesystems-pwdcrack-768x405.png 768w, https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2025\/07\/hivesystems-pwdcrack-1536x810.png 1536w, https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2025\/07\/hivesystems-pwdcrack-782x412.png 782w, https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2025\/07\/hivesystems-pwdcrack-267x140.png 267w\" sizes=\"auto, (max-width: 749px) 100vw, 749px\"\/><\/p>\n<p id=\"caption-attachment-71671\" class=\"wp-caption-text\">Picture: hivesystems.com.<\/p>\n<\/div>\n<p>In response to questions from KrebsOnSecurity, Paradox.ai confirmed that the password information was lately stolen by a malware an infection on the private system of a longtime Paradox developer primarily based in Vietnam, and stated the corporate was made conscious of the compromise shortly after it occurred. Paradox maintains that few of the uncovered passwords have been nonetheless legitimate, and {that a} majority of them have been current on the worker\u2019s private system solely as a result of he had migrated the contents of a password supervisor from an outdated laptop.<\/p>\n<p>Paradox additionally identified that it has been requiring single sign-on (SSO) authentication since 2020 that enforces multi-factor authentication for its companions. Nonetheless, a overview of the uncovered passwords exhibits they included the Vietnamese administrator\u2019s credentials to the corporate\u2019s SSO platform \u2014 paradoxai.okta.com. The password for that account resulted in 202506 \u2014 presumably a reference to the month of June 2025 \u2014 and the digital cookie left behind after a profitable Okta login with these credentials says it was legitimate till December 2025.<span id=\"more-71668\"\/><\/p>\n<p>Additionally uncovered have been the administrator\u2019s credentials and authentication cookies for an account at <strong>Atlassian<\/strong>, a platform made for software program improvement and challenge administration. The expiration date for that authentication token likewise was December 2025.<\/p>\n<p>Infostealer infections are among the many main causes of information breaches and ransomware assaults at present, and so they end result within the theft of saved passwords and any credentials the sufferer sorts right into a browser. Most infostealer malware additionally will siphon authentication cookies saved on the sufferer\u2019s system, and relying on how these tokens are configured thieves could possibly use them to bypass login prompts and\/or multi-factor authentication.<\/p>\n<p>Very often these infostealer infections will open a backdoor on the sufferer\u2019s system that enables attackers to entry the contaminated machine remotely. Certainly, it seems that distant entry to the Paradox administrator\u2019s compromised system was supplied on the market lately.<\/p>\n<p>In February 2019, Paradox.ai <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.paradox.ai\/news\/paradox-receives-iso-27001-and-soc-2-type-ii-security-certifications\" target=\"_blank\" rel=\"noopener\">introduced<\/a> it had efficiently accomplished audits for 2 pretty complete safety requirements (ISO 27001 and SOC 2 Kind II). In the meantime, the corporate\u2019s safety disclosure this month says the take a look at account with the atrocious 123456 username and password was final accessed in 2019, however in some way missed of their annual penetration exams. So how did it handle to go such stringent safety audits with these practices in place?<\/p>\n<p>Paradox.ai instructed KrebsOnSecurity that on the time of the 2019 audit, the corporate\u2019s numerous contractors weren&#8217;t held to the identical safety requirements the corporate practices internally. Paradox emphasised that this has modified, and that it has up to date its safety and password necessities a number of occasions since then.<\/p>\n<p>It&#8217;s unclear how the Paradox developer in Vietnam contaminated his laptop with malware, however a more in-depth overview finds a Home windows system for one more Paradox.ai worker from Vietnam was compromised by related data-stealing malware on the finish of 2024 (that compromise included the sufferer\u2019s GitHub credentials). Within the case of each staff, the stolen credential information contains Internet browser logs that point out the victims repeatedly downloaded pirated motion pictures and tv exhibits, which are sometimes bundled with malware disguised as a video codec wanted to view the pirated content material.<\/p>\n<\/p><\/div>\n\n","protected":false},"excerpt":{"rendered":"<p>Safety researchers lately revealed that the private info of tens of millions of people that utilized for jobs at McDonald\u2019s was uncovered after they guessed the password (\u201c123456\u201d) for the quick meals chain\u2019s account at Paradox.ai, an organization that makes synthetic intelligence primarily based hiring chatbots utilized by many Fortune 500 corporations. Paradox.ai stated the [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":4686,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[58],"tags":[1580,2217,262,4122,4123,3870,4120,211,4121],"class_list":["post-4684","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-bot","tag-hiring","tag-krebs","tag-maker","tag-paradox-ai","tag-passwords","tag-poor","tag-security","tag-tattle"],"_links":{"self":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/4684","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=4684"}],"version-history":[{"count":1,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/4684\/revisions"}],"predecessor-version":[{"id":4685,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/4684\/revisions\/4685"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/media\/4686"}],"wp:attachment":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=4684"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=4684"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=4684"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}<!-- This website is optimized by Airlift. Learn more: https://airlift.net. Template:. Learn more: https://airlift.net. Template: 69d9690a190636c2e0989534. Config Timestamp: 2026-04-10 21:18:02 UTC, Cached Timestamp: 2026-05-14 20:04:25 UTC -->