On their website, go to the sign in screen and click “Need help signing in”. Go through the prompts and watch the person’s username, and the legal name of all their employers (who have ever used ADP) appear on the screen.

Note: Whether or not you select “my current employer uses ADP”, it will still show you the full list of both current and previous employers (who use ADP).

From there, it is remarkably easy to gain access to paycheck information if you are a grocer, a landlord, a retailer, or anyone of the 2737429193 entities who may have a little extra data on them.

Edit: To address some of the comments, I feel I need to clear something up. I’m not saying this is some authoritarian configuration error ADP messed up on. It’s a standard login that works conveniently for ADP and also happens to be negligent in privacy protection. And it’s most likely completely legal for most people in the U.S.

  • AFaithfulNihilist@lemmy.world
    link
    fedilink
    arrow-up
    5
    ·
    3 hours ago

    It’s weird cuz when I go to the site I don’t see anything like that as even an option.

    I don’t see any option that says “need help signing in” and you have to type in your social security number before you even get to the page that has your phone number on it? What am I missing?

    • Matt/D@programming.dev
      link
      fedilink
      English
      arrow-up
      2
      ·
      2 hours ago

      I saw the need help signing in option. But after entering name and phone number, I had to enter last 4 of SSN, which I think is harder to find out

      Additionally, afterwards I got an email that my user ID was requested

    • Onno (VK6FLAB)@lemmy.radio
      link
      fedilink
      arrow-up
      28
      arrow-down
      2
      ·
      19 hours ago

      I hear you, but in the last year I’ve begun wondering if full public disclosure isn’t a better way to go these days.

      The sheer volume of breaches is overwhelming and in my experience (of over 40 years as an ICT professional) many companies sweep their failures under the carpet, hide behind crisis management teams and marketing speak, and ridicule those bringing issues to their attention.

      Their disclosure is abysmal if it’s made at all and there are precious few who reveal precisely what data was exfiltrated or how the issue was remediated.

      This way anyone can verify the issue and companies cannot hide, everyone sees precisely what’s leaked and can act accordingly.

      If you know of a more effective way, I’d love to hear it.

      • catloaf@lemm.ee
        link
        fedilink
        English
        arrow-up
        7
        arrow-down
        6
        ·
        19 hours ago

        Making the attempt at responsible disclosure is still more effective.

          • Serinus@lemmy.world
            link
            fedilink
            arrow-up
            8
            arrow-down
            2
            ·
            19 hours ago

            Well, this leak is out there now for whoever decided to use it. And it’s being publicized. That doesn’t seem good for the people having their payroll data leaked.

            • Aslanta@lemmy.worldOP
              link
              fedilink
              arrow-up
              8
              arrow-down
              2
              ·
              18 hours ago

              Hey, now. Don’t go blaming the person who is calling attention to negligence of another. 5 years ago, ADP had user support service to handle login issues. But with the diminishing right to privacy in recent years, it is much more convenient for them to simply give the information away.

              • catloaf@lemm.ee
                link
                fedilink
                English
                arrow-up
                1
                ·
                17 hours ago

                Seems even worse for them to know and to have malicious actors know as well. Effectively creating a zero-day is not a good thing.

    • aard@kyu.de
      link
      fedilink
      arrow-up
      33
      arrow-down
      1
      ·
      21 hours ago

      Depends on how the parties behaved in the past. There are a bunch of government entities which called police on me in the past when trying to work with them about discovered issues and as result also will just get anonymous 0-day drops in public forums for future issues.

      • borari@lemmy.dbzer0.com
        link
        fedilink
        arrow-up
        6
        arrow-down
        3
        ·
        20 hours ago

        If you really regularly disclosed vulnerabilities you’d know that for entities that don’t have vulnerability disclosure programs you can always report through CISA or ENISA.

        • aard@kyu.de
          link
          fedilink
          arrow-up
          9
          arrow-down
          2
          ·
          18 hours ago

          I expect the responsible person listed for some specific application to react to an email about it to fix it, and not send me police. Why would I want to jump through hoops for doing them a favour?

          Same applies also if there’s no easy way to send a mail to someone responsible.

          • borari@lemmy.dbzer0.com
            link
            fedilink
            arrow-up
            1
            arrow-down
            2
            ·
            7 hours ago

            Ok bro.

            Same applies also if there’s no easy way to send a mail to someone responsible.

            Yeah I’m pressing x for doubt you’ve ever disclosed anything. You got any CVE’s to your name?

  • winterayars@sh.itjust.works
    link
    fedilink
    arrow-up
    7
    ·
    18 hours ago

    I’ve had an ADP employer in the past and when i tried it prompted me for some additional personal info so this did not work for me.

    • stink@lemmygrad.ml
      link
      fedilink
      English
      arrow-up
      1
      ·
      3 hours ago

      I tried and it said I didn’t finish making my account haha, glad I didn’t!