Burger King owners face probe into security flaws that exposed employee accounts and systems

Fast food giant Burger King has landed in hot water after ethical hackers revealed that its online systems were wide open to attack. The flaws were so serious that hackers could peek into employee accounts, listen to drive-thru conversations, and even order store equipment.

Flaws Found Across Burger King, Popeyes, and Tim Hortons

The shocking part is that these holes were found not only in Burger King’s systems but also in those of other brands owned by its parent company. That includes Tim Hortons and Popeyes, which together operate more than 30,000 outlets worldwide.

The hackers described the company’s defenses as being “as solid as a paper Whopper wrapper in the rain.” Their report, which was briefly published online before being taken down, painted a picture of careless mistakes and weak protection across multiple platforms.

The hackers discovered that the main assistant platforms of Burger King, Popeyes, and Tim Hortons all shared the same serious problems. The affected domains were assistant.bk.com, assistant.popeyes.com, and assistant.timhortons.com.

With access to these systems, attackers could enter staff accounts, make changes to employee information, and interfere with the technology used in restaurants.

They explained that once inside, it was possible to listen to drive-thru recordings, which captured conversations between customers and staff. They could also control the tablets used by restaurants, order new devices directly through the company’s own website, and even send messages straight to individual outlets.

The ethical hackers stressed that they did not misuse or keep any data while exploring these issues. They followed responsible disclosure rules and only reported the problems to the company.

How the Security Blunders Were Uncovered

The hackers said the discovery of these gaps was surprisingly easy. One of the first mistakes they found came from a signup system that allowed anyone to create an account without restriction. They described it as the “Anyone Can Join This Party” setup because the developers had forgotten to switch off public signups.

When they explored further, they uncovered another weak point through a system known as GraphQL introspection. This flaw allowed them to bypass email checks entirely.  After entering the system, the hackers were able to give themselves administrator rights. That gave them broad control, including access to employee IDs, internal codes, and store configuration details.

CISA warns China-linked hacking group continues long-running campaign against 80 countries

They also checked the company’s equipment ordering website. They found the password was written directly in the page’s HTML. Anyone with basic knowledge could see it. The tablets used at drive-thrus had a similar problem. The system used “admin” as the default password, making them easy to access.

Another surprising find was the code behind the bathroom rating screens used inside restaurants. With the access they had, the hackers joked that they could leave five-star reviews for bathrooms anywhere in the world without leaving home.

Ethical Hackers Left Unacknowledged

Despite revealing flaws of such scale, the ethical hackers said the company never acknowledged their work. They insisted that they reported everything responsibly and did not retain or misuse any of the data they came across.

How Cyber Attacks on Industrial Control Systems Can Endanger Lives ?

Their report, however, made clear just how careless the company had been with its defenses. From plain text passwords to hard coded logins and open signup systems, the mistakes revealed a long list of weak practices.

The hackers gave the company the information to fix the gaps. They were not happy with how their work was treated. In the end, they added a cheeky line in their report. They wrote that Wendy’s is better than Burger King.

Renuka Bangale
Renuka Bangale
Renuka is a distinguished Chartered Accountant and a Certified Digital Threats Analyst from Riskpro, renowned for her expertise in cybersecurity. With a deep understanding of cybercrimes, malware, cyber warfare, and espionage, she has established herself as an authority in the field. Renuka combines her financial acumen with advanced knowledge of digital threats to provide unparalleled insights into the evolving landscape of information security. Her analytical prowess enables her to dissect complex cyber incidents, offering clarity on risks and mitigation strategies. As a key contributor to Newsinterpretation’s information security category, Renuka delivers authoritative articles that educate and inform readers about emerging threats and best practices.

TOP 10 TRENDING ON NEWSINTERPRETATION

Oracle warns of extortion emails hitting E-Business Suite users amid software gaps

Oracle has confirmed that customers using its E-Business Suite...

Newsom warns California colleges of losing state funds if they sign Trump education compact

California Governor Gavin Newsom has issued a strong warning...

Vance accuses Democrats of shutting down America to protect AOC’s political power

The United States government entered a shutdown on Wednesday,...

AI is making phishing, ransomware, and cybercrime more dangerous for accountants

Artificial intelligence is making cyberattacks faster, smarter, and more...

Kamala Harris: “Republicans just shutdown the government to make your health care cost more”

The United States federal government officially shut down early...

AOC takes center stage: “Trump is bluffing — Democrats must not blink” as shutdown looms

Rep. Alexandria Ocasio-Cortez (D-N.Y.) has called on her Democratic...

Hacker gains access to FEMA and Border Patrol systems in multi-week breach

Massive Hack Hits FEMA and Border Patrol A major cyberattack...

Government shutdown 2025 begins with essential services continuing while nonessential workers furloughed

The United States federal government officially entered a Government...

Midterm manipulation fury: Newsom warns Americans are paying price for GOP power games

Midterm Politics and Impeachment ControversyPublic Reaction and Urgency in...

“Pay more and enjoy nothing”—Newsom torches Trump’s tariff push as costs for food, cars, and flights soar

California Governor Gavin Newsom has strongly criticized President Donald...

Oracle warns of extortion emails hitting E-Business Suite users amid software gaps

Oracle has confirmed that customers using its E-Business Suite...

Newsom warns California colleges of losing state funds if they sign Trump education compact

California Governor Gavin Newsom has issued a strong warning...

Vance accuses Democrats of shutting down America to protect AOC’s political power

The United States government entered a shutdown on Wednesday,...

AI is making phishing, ransomware, and cybercrime more dangerous for accountants

Artificial intelligence is making cyberattacks faster, smarter, and more...

Kamala Harris: “Republicans just shutdown the government to make your health care cost more”

The United States federal government officially shut down early...

AOC takes center stage: “Trump is bluffing — Democrats must not blink” as shutdown looms

Rep. Alexandria Ocasio-Cortez (D-N.Y.) has called on her Democratic...

Hacker gains access to FEMA and Border Patrol systems in multi-week breach

Massive Hack Hits FEMA and Border Patrol A major cyberattack...

Government shutdown 2025 begins with essential services continuing while nonessential workers furloughed

The United States federal government officially entered a Government...

Related Articles

Popular Categories

error: Content is protected !!