THREAT DETECTION ACTIVE
5 ZERO-DAYS ACTIVE

THREAT INTELLIGENCEFOR THE REVENUE STACK

BLACKOUT is CrowdStrike for GTM — a threat intelligence OS that maps every vendor in your stack, quantifies structural revenue risk, and feeds clean signal into the systems that run your business.

BLACKOUT://THREAT_INTEL/LIVE
OPERATIONAL
VENDORS DETECTED
0
ACTIVE THREATS
0
RISK SCORE
HIGH
LIVE_THREAT_FEED
RB2Bcritical
Clearbit Revealcritical
TrenDemonhigh
0
VENDOR SIGNATURES
0
THREAT PATTERNS
0
DEFEAT DEVICES
0%
DETECTION RATE
FREE DOWNLOADNO GATE

THREAT HUNT REPORT 2025

Our comprehensive analysis of GTM stack surveillance infrastructure. Vendor behaviors, defeat devices, data exfiltration patterns.

DOWNLOAD NOWPDF
BLACKOUT://INTEL_REPORT
BLACKOUT
2025 THREAT HUNT

The Devil's Regex

Commercial Intelligence
Exfiltration Analysis

98
Vendors
14
Critical
6
Defeat
TLP:WHITEDEC 2025
5 ZERO-DAYS DISCLOSED
2025-12-04// ACTIVE THREAT

ZeroSense + DemonScript

We found five zero-day vulnerabilities in the 6sense/TrenDemon stack by visiting their privacy policy page with a HAR recorder. eval() RCE, supply chain compromise, and cross-customer PII leakage.

9.1
ZeroSense
PII Cache
9.8
DemonScript
eval() RCE
9.8
RollCredits
Video RCE
7.5
MaCook'd
Cookie Theft
10
PollyWannaCrack
Supply Chain
KEY FINDING: MARKETING FUNNEL = KILL CHAIN

Video players are weaponized as execution triggers. When the video ends, eval(postCompletionScript) fires. TrenDemon SDK contains 6 distinct eval() vectors.

MODULE: THREAT_CLASSIFICATION

DEFEAT DEVICES

ID Resolution Scripts

Scripts designed to circumvent browser privacy controls. Reverse-engineer visitor identity without consent.

4 ACTIVE

PRE-CONSENT EXFIL

Data Collection Before Opt-In

Data capture begins before consent banners appear. Behavioral tracking fires on page load.

137 SIGNATURES

VENDOR CHAINS

Hidden Data Flows

Undisclosed data sharing between marketing tools. Your "vendor" has vendors you don't know about.

EXPOSURE: HIGH
MODULE: KILL_CHAIN_FRAMEWORK

THE GTM
KILL CHAIN

The step-by-step marketing campaign process maps 1:1 to the Lockheed Martin Cyber Kill Chain. This isn't a metaphor. It's a framework.

EXPLORE THE KILL CHAIN
BLACKOUT://KILL_CHAIN/LIVE
$ diff --malicious-actor --vendor
PHASE_1RECON
MALICIOUS_ACTOR
Reconnaissance
VENDOR
Intent Data & ABM
1/7 PHASESVIEW ALL
MODULE: SYSTEM_PROMPT

YOUR GTM STACK IS A
LIABILITY

Your vendor's SOC 2 badge doesn't prove what their JavaScript does at runtime. We map what's running. We prove what it does. All from the outside.

SCAN YOUR SITE