Burger King owners face probe into security flaws that exposed employee accounts and systems

Fast food giant Burger King has landed in hot water after ethical hackers revealed that its online systems were wide open to attack. The flaws were so serious that hackers could peek into employee accounts, listen to drive-thru conversations, and even order store equipment.

Flaws Found Across Burger King, Popeyes, and Tim Hortons

The shocking part is that these holes were found not only in Burger King’s systems but also in those of other brands owned by its parent company. That includes Tim Hortons and Popeyes, which together operate more than 30,000 outlets worldwide.

The hackers described the company’s defenses as being “as solid as a paper Whopper wrapper in the rain.” Their report, which was briefly published online before being taken down, painted a picture of careless mistakes and weak protection across multiple platforms.

The hackers discovered that the main assistant platforms of Burger King, Popeyes, and Tim Hortons all shared the same serious problems. The affected domains were assistant.bk.com, assistant.popeyes.com, and assistant.timhortons.com.

With access to these systems, attackers could enter staff accounts, make changes to employee information, and interfere with the technology used in restaurants.

They explained that once inside, it was possible to listen to drive-thru recordings, which captured conversations between customers and staff. They could also control the tablets used by restaurants, order new devices directly through the company’s own website, and even send messages straight to individual outlets.

The ethical hackers stressed that they did not misuse or keep any data while exploring these issues. They followed responsible disclosure rules and only reported the problems to the company.

How the Security Blunders Were Uncovered

The hackers said the discovery of these gaps was surprisingly easy. One of the first mistakes they found came from a signup system that allowed anyone to create an account without restriction. They described it as the “Anyone Can Join This Party” setup because the developers had forgotten to switch off public signups.

When they explored further, they uncovered another weak point through a system known as GraphQL introspection. This flaw allowed them to bypass email checks entirely.  After entering the system, the hackers were able to give themselves administrator rights. That gave them broad control, including access to employee IDs, internal codes, and store configuration details.

CISA warns China-linked hacking group continues long-running campaign against 80 countries

They also checked the company’s equipment ordering website. They found the password was written directly in the page’s HTML. Anyone with basic knowledge could see it. The tablets used at drive-thrus had a similar problem. The system used “admin” as the default password, making them easy to access.

Another surprising find was the code behind the bathroom rating screens used inside restaurants. With the access they had, the hackers joked that they could leave five-star reviews for bathrooms anywhere in the world without leaving home.

Ethical Hackers Left Unacknowledged

Despite revealing flaws of such scale, the ethical hackers said the company never acknowledged their work. They insisted that they reported everything responsibly and did not retain or misuse any of the data they came across.

How Cyber Attacks on Industrial Control Systems Can Endanger Lives ?

Their report, however, made clear just how careless the company had been with its defenses. From plain text passwords to hard coded logins and open signup systems, the mistakes revealed a long list of weak practices.

The hackers gave the company the information to fix the gaps. They were not happy with how their work was treated. In the end, they added a cheeky line in their report. They wrote that Wendy’s is better than Burger King.

Renuka Bangale
Renuka Bangale
Renuka is a distinguished Chartered Accountant and a Certified Digital Threats Analyst from Riskpro, renowned for her expertise in cybersecurity. With a deep understanding of cybercrimes, malware, cyber warfare, and espionage, she has established herself as an authority in the field. Renuka combines her financial acumen with advanced knowledge of digital threats to provide unparalleled insights into the evolving landscape of information security. Her analytical prowess enables her to dissect complex cyber incidents, offering clarity on risks and mitigation strategies. As a key contributor to Newsinterpretation’s information security category, Renuka delivers authoritative articles that educate and inform readers about emerging threats and best practices.

TOP 10 TRENDING ON NEWSINTERPRETATION

Political battle ignites — Obama backs Newsom in war over Trump’s Prop 50 redistricting

A new political showdown is unfolding as Barack Obama...

Trump’s pardon of Binance chief Zhao marks dramatic end to America’s crypto crackdown

President Donald Trump has granted a presidential pardon to...

Kim Kardashian’s Scary Health Reveal: Brain Aneurysm Linked to Kanye West Divorce Stress

Kim Kardashian Opens Up About a Scary Health Moment In...

Gavin Newsom blasts Trump over federal agents in California — calls it ‘right out of the dictator’s handbook’

California Governor Gavin Newsom has strongly criticized President Donald...

Atlanta Airport suspect idolized Trump, defended Confederate flag — now charged with terror threats

Authorities in Georgia have arrested Billy Joe Cagle, a...

Explosive courtroom twist — Comey accuses Trump administration of ‘abuse of power’ in legal battle

Former FBI Director James Comey’s legal team has launched...

Tempers erupt after Marine shell explodes over I-5 — Newsom accuses Trump, Vance of reckless stunt

California Governor Gavin Newsom has unleashed a fierce attack...

Related Articles

Popular Categories

error: Content is protected !!