NHI Forum
Read full article here: https://www.oasis.security/blog/mcdonalds-ai-hiring-breach-nonhuman-identity/?source=nhimg
In June 2025, researchers uncovered a critical flaw in McDonald’s AI-powered hiring platform, McHire, exposing sensitive data from an estimated 64 million job applicants. The issue stemmed from weak default credentials, the admin username and password were both set to “123456” — which provided access to live hiring data, including applicant names, contact details, and chatbot transcripts.
Once inside, an IDOR (Insecure Direct Object Reference) vulnerability allowed researchers to enumerate applicant IDs and retrieve records at scale. Had attackers exploited this, they could have executed targeted phishing campaigns, identity theft, or fraud using the exposed personal data.
While McDonald’s responded quickly by disabling the credentials and patching the API, the breach exposed a deeper systemic risk: poor management of non-human identities (NHIs) such as service accounts, bots and API keys.
Why This Matters
- Massive Data Exposure - Millions of applicants had their PII — including names, emails, and phone numbers - put at risk, with potential for identity theft.
- Brand and Trust Damage - McDonald’s reputation as a secure employer was undermined, eroding applicant confidence.
- Regulatory Fallout - GDPR and similar laws could trigger legal action and fines, compounding financial and reputational costs.
- AI Adoption vs. Security Gap - Enterprise adoption of AI grew 187% between 2023–2025, yet security spending only rose 43%, creating a dangerous imbalance.
This incident demonstrates how overlooked machine accounts and weak credentials can become the weakest link in enterprise AI security.
Best Practices to Avoid NHI Breaches
- Treat NHIs as First-Class Citizens - Enforce unique, strong, and rotated credentials for bots, APIs, and service accounts.
- Eliminate Defaults and Hard-Coded Secrets - Replace static credentials with vaulting and automated rotation.
- Adopt Federated Authentication - Use workload identity federation, mutual TLS, and short-lived tokens instead of long-lived secrets.
- Maintain a Complete NHI Inventory - Track all service accounts, bots, and keys — and assign ownership to prevent “orphaned” accounts.
- Continuously Monitor and Audit - Scan for leaked secrets, track abnormal NHI behavior, and detect privilege escalations early.
How Oasis Security Helps
The McHire breach underscores the urgency of securing NHIs. Oasis NHI Security Cloud delivers:
- Agentless Discovery - Automatic identification of NHIs across SaaS, cloud, and on-premises environments.
- Policy-Driven Orchestration - Automated credential rotation, decommissioning, and lifecycle enforcement.
- Automated ITDR for NHIs - Continuous monitoring and anomaly detection for compromised or misused machine identities.
With Oasis, organizations gain visibility, governance, and protection for all NHIs, ensuring that AI-driven platforms remain secure and compliant.
Key Takeaway
The McDonald’s breach wasn’t just about a “123456” password, it was about NHI neglect. Organizations must bring NHIs under the same governance and security rigor as human accounts, or risk massive breaches, lost trust, and regulatory penalties.