
I've got some time while my AWS infra deploys, so let's talk about McDonald's and Paradox.
There was a Cybersecurity incident recently impacting the McDonald's hiring chatbot. WIRED wrote up an article about it here: https://www.wired.com/story/mcdonalds-ai-hiring-chat-bot-paradoxai It's an interesting story, that leans heavily on fears about AI being unreliable and unsecure etc. I'm sure it got plenty of clicks, but Andy Greenberg missed the point.
Yes, McDonald's has a piece of shit recruitment chatbot. Or, more accurately, they paid Paradox to integrate their shitty AI chatbot into the maccas ERP and slap the golden arches logo on it. But, the cybersecurity issues are not caused by AI. That's just clickbait smeared on top.
Do you have any idea just how many things have to go wrong for this cybersecurity incident to have occurred? The amount of incompetent asshats that need to be involved (or not involved, as it were)?
What we have here, kids, is called Systemic Failure.
I love the term. It just rolls off the tongue, like “12 month consulting and remediation project, 5 people, billed T&M plus expenses”.
Systemic Failure is when your corporation fucks up, then does it again and again and again, and no matter how hard you try, it just seems to keep happening. By all appearances, Paradox (and McDonald's) have systemic failures in their cybersecurity implementation and governance.
Maccas needed an app to streamline recruitment. Trawling through their target market of child labour and people desperately needing income is a lot of, well, work. It's expensive and slow. So someone decided to automate the hell out of it and use an LLM (AI) as the happy interface to replace HR.
So far, so good. It's not a terrible idea, to be honest.
An exec would have asked “how hard can it be?” and gotten an answer with lots of zeros in it. Too many zeros, and too many months. So after a quick google, they came up with a new plan: “Paradox.ai says they can do it for a fraction of that and in just x months!”.
Paradox's tagline is literally:
“Conversational recruiting software that automates the work your teams don't have time for.”
It's a match made in heaven.
And right there is where it went to shit for McDonald's. Not the test user account that wasn't disabled back in 2019, and not the AI integration. The real story, is a sadly common one in the cybersecurity industry:
Let's break this down a bit, so it's easy to see the failure.
A tech company started back in 2016 that provides a conversational AI agent for recruitment.
Their real value-add is not the chatbot “Olivia” though, it's the back end integrations. They have done the grunt work of hooking it into all the major ERP services like Workday, HCM and SAP. Nobody wants to run a project with custom SAP integration, that shits a nightmare. Far easier to pay a SaaS provider for a working solution.
So how can a $214B company hire $1.5B company, who then exposes the details of 64 million people?
According to Paradox, it's simple: Someone forgot to reset a password. Hahahahaha silly engineers. But don't stress, it's all fixed now 🤣🤞
Official version here: https://www.paradox.ai/blog/responsible-security-update
Let's look at the things Paradox had to fuck up to create this password issue. To add some validity to my ranting, let's look at it through the lens of ISO 27001 standards. After all, both Paradox and McDonald's hold this certification so they should be familiar with the framework.
We'll need:
That's a good starting point.
When you see a company delivering systems this poorly, you've got to wonder how seriously they take cybersecurity. Obviously, vendors will make plenty of promises, but what evidence (or lack of) do we have that they make a real commitment to securing their systems?
Check the headcount. Cybersecurity is complex and expensive, even more so in a rapidly scaling and changing tech company. If they are doing it, you'll see it in the headcount.
If I look up Paradox on LinkedIn, I see 815 associated members. Let's call it 800 on the safe side.
3 staff, out of 800, to provide cybersecurity for a $1.5B company that holds 10s (if not 100s) of millions of PII records.
Those 3 people are doing an awful lot of heavy lifting to meet Paradox's claim of:
"Paradox is committed to your data security and privacy”
No tech/security function even made the leadership page. An interesting take on leadership, for an AI-driven tech company. https://www.paradox.ai/about/leadership

Hello? Is the CISCO there? Olivia?
ISO 27001 requires supplier security agreements (A.15.1.1) and periodic audits or reviews of third parties (A.15.2.1).
McDonald's failed to ensure Paradox met baseline controls. I'm sure they asked. Probably sent them a comprehensive spreadsheet of items to tick off before the commercials were signed. But nobody checked.
This breach applied to the global recruiting activities of McDonald's. While they attest no data was taken by other parties, any breach would trigger privacy regulations in the EU, UK, and Australia. Moreover, many of those applicants were minors, so aspects of the GDPR, UK ICO and Australian Privacy Act.
Now, McDonald's does have a CISO. Looks like they actually have several Mike Gordon, Nate Partridge and Jerome Pickett M.B.A., M.A. (Maybe loan one to Paradox?). I'm sure one of them signed off on the Paradox contracts and governance 🤔
Yes and No.
Sure, they dodged a bullet and some friendlies found the issue before a ransomware crew did. It looks like no data was stolen and they have removed the vulnerable account. Many would say it's not that big a deal at this point. Maccas sure as fuck is.
Except its systemic failure, remember? When a company fucks up like this, you just know it's part of the culture and operating model. Especially a startup. That VC money was meant to 10x the $250M, not piss around with delays due to security and governance. They want to go fast and scoop up market share before the cash runs out.
Which means they make a mess and don't spend budget on cleaning up as they go. That “Tech debt” just stacks up, to be dealt with post IPO.
So you end up with things like old accounts, bad password and shitty Route53 subdomains for mchire.com











AI gets a lot of shit recently, but humans are still better at building crap cybersecurity.
THE END