All Vendors
deanon

ABMatic

Session replay and behavioral biometrics vendor. Extreme liability exposure from comprehensive surveillance without consent. Maximum revenue impact from CAC subsidization and legal tail risk.

82 IOCs2 detections100% pre-consent2 sites
70
Vendor Risk Score

How This Briefing Works

This report opens with key findings, then maps the gaps between what ABMatic discloses and what BLACKOUT observed at runtime. From there: what it means for your organization, what to do about it, and the detection data and evidence underneath.

Key Findings

Key Findings

2 detections across 2 sites100% pre-consent activity
CRITICAL

Pre-Consent Activity

ABMatic was observed loading and executing before user consent was obtained on 100% of sites where it was detected.

GDPRePrivacy
Disclosure Gaps

Claims vs. Observed Behavior

1 gaps

pending

UNKNOWN
They Claim

Requires claims extraction via CDT

Observed Behavior

Live website analysis pending

Customer Impact

What This Means For You

For security teams: Session recordings capture authentication flows and sensitive form data, creating breach notification obligations if ABMatic storage is compromised. For legal: Every recorded session is a GDPR data subject access request requiring video reconstruction with PII redaction. For marketing: Complete behavioral profiles sold to competitors at 10-100x markup over your visitor acquisition cost. For sales: Behavioral intent signals leak to competitors before your team can act.
Recommended Actions

What To Do About It

Role-specific actions based on observed behavior

If You Use ABMatic

  • Immediate contract termination - no compliant configuration possible
  • Engage legal counsel for joint controller liability assessment under GDPR Article 26
  • Submit GDPR data deletion request for all historical session recordings
  • Audit data sharing agreements to identify downstream intent data buyers

If You're Evaluating ABMatic

  • Replace with consent-first analytics (Plausible, Simple Analytics, Fathom)
  • Assess first-party intent signal capture via owned events
  • Calculate CAC subsidization cost: (ABMatic fee + leaked intent value to competitors)

Negotiation Leverage

  • Session recording without consent violates GDPR Article 6 and CCPA biometric disclosure - contract is legally unenforceable
  • Behavioral biometrics constitute special category data under GDPR Article 9 - require Data Protection Impact Assessment or cease processing
  • Tag manager deployment without consent governance makes site operator joint controller - demand DPA amendment recognizing shared liability
  • Intent data resale subsidizes competitor targeting - require complete data sharing audit with buyer identification and pricing transparency
Runtime Detections

Runtime Detections

6 BTI-C CODES

BLACKOUT observed this vendor's JavaScript executing in a live browser and classified each hostile behavior using our BTI-C (Behavioral Threat Intelligence — Capability) taxonomy. These are not theoretical risks — each code below was triggered by something we watched this vendor's code actually do.

BTI-C06Behavioral Biometrics

Keystroke/mouse tracking

Impact: Captures keystroke dynamics, mouse movement patterns, and scroll behavior for identity resolution. Creates CCPA biometric data disclosure requirements and GDPR Article 9 special category processing violations.

BTI-C07Session Recording

Full session replay

Impact: Records complete user sessions including form inputs and page interactions. Every recording is potential GDPR data breach requiring notification if accessed by unauthorized parties. Creates indefinite data retention liability.

BTI-C09Consent Bypass

Ignoring CMP signals

Impact: Executes session recording and biometric capture before consent collection. Documented in pre-consent timeline analysis. Creates strict liability under ePrivacy Directive.

BTI-C13Persistence Mechanisms

Long-lived identifiers

Impact: Maintains visitor profiles across sessions via probabilistic and deterministic matching. Extends GDPR data subject access request scope to all historical sessions.

BTI-C14Identity Resolution

PII deanonymization

Impact: Links anonymous sessions to known identities via email, form fills, and third-party data. Converts pseudonymous data to personal data, triggering full GDPR obligations.

BTI-C15Tag Manager

Container/loader (neutral)

Impact: Deploys via tag management system, enabling dynamic updates without change control. Creates audit trail gaps and prevents technical enforcement of consent requirements.

IOC Manifest

IOC Manifest

80 INDICATORS

Indicators of compromise across 5 categories. Use for detection rules, CSP policies, or Pi-hole blocklists.

TRACK
*abmatic.ai/hs/hsstatic/content-cwv-embed/static-1.*/embed.js*
Tracking script
TRACK
*abmatic.ai/hs/hsstatic/cos-i18n/static-1.53/bundles/project.js*
Tracking script
TRACK
*abmatic.ai/hs/hsstatic/HubspotToolsMenu/static-1.432/js/index.js*
Tracking script
TRACK
*abmatic.ai/hubfs/hub_generated/module_assets/1/*/*/module_menu-section.js*
Tracking script
TRACK
*clients.abmatic.ai/AkX9vu5KLybU.js*
Tracking script
TRACK
*abmatic.ai/hubfs/hub_generated/template_assets/1/*/*/template_main.js*
Tracking script
TRACK
*abmatic.ai/hs/scriptloader/*.js*
Tracking script
TRACK
clients.abmatic.ai
Tracking script
TRACK
abmatic.ai
Tracking script
TRACK
clients.abmatic.ai/AkX9vu5KLybU.js
Auto-extracted from scan
TRACK
abmatic.ai/hs/hsstatic/content-cwv-embed/static-1.1293/embed.js
Auto-extracted from scan
TRACK
abmatic.ai/hubfs/hub_generated/template_assets/1/34300838680/1768825236650/template_main.min.js
Auto-extracted from scan
TRACK
abmatic.ai/hs/hsstatic/cos-i18n/static-1.53/bundles/project.js
Auto-extracted from scan
TRACK
abmatic.ai/hubfs/hub_generated/module_assets/1/34300854685/1768500537927/module_menu-section.min.js
Auto-extracted from scan
TRACK
abmatic.ai/hs/scriptloader/7732693.js
Auto-extracted from scan
TRACK
abmatic.ai/hs/hsstatic/HubspotToolsMenu/static-1.432/js/index.js
Auto-extracted from scan
Ecosystem

Ecosystem & Supply Chain

Enterprise ABM platform feeding intent data marketplaces. Common co-deployments: Demandbase (account identification), 6sense (intent scoring), ZoomInfo (contact enrichment), Clearbit (firmographic overlay). Session recordings sold to competitive intelligence platforms.
Evidence

Evidence Artifacts

Artifacts collected during analysis, available with evidence-tier access.

HAR Capture

Complete network capture with all requests and responses

IOC Manifest

82 detection signatures across scripts, domains, cookies, and network endpoints

Vendor Details