BLACKOUT://VENDOR_INTEL/CHEQ
VENDOR_DBINTEL READY
deanon
CHEQ

CHEQ

100Hypocrisy
90Revenue Risk

Executive Summary

CHEQ (cheq.ai) positions itself as "The Global Leader in Go-to-Market Security," offering bot detection, click fraud prevention, and compliance tools. However, BLACKOUT runtime analysis reveals CHEQ operates exactly the surveillance infrastructure they market protection against. Their own website exhibits an 88.3% pre-consent tracking rate across 103 detections, with 18 vendors firing before consent and tracking persisting after consent rejection. This represents a textbook case of compliance theater: SOC2, ISO 27001, GDPR, and CCPA badges displayed alongside systematic privacy violations including undisclosed Clearbit B2B de-anonymization and Hotjar session recording. The irony is foundational: CHEQ sells tools to detect the exact behaviors they deploy against their own visitors.

Revenue Threat Profile

4 COLLAPSE VECTORS

How this vendor creates financial exposure. Each score (0-100) reflects observed runtime behavior and documented business practices.

100

CAC Subsidization

critical

CHEQ corrupts measurement by operating undisclosed Clearbit B2B de-anonymization and ZoomInfo identity resolution on their own site while selling tools that claim to detect similar surveillance. Companies evaluating CHEQ for bot detection may be unknowingly submitting their visitors to the same identification techniques they seek protection from. Attribution data from CHEQ-monitored properties may be influenced by CHEQ's own data collection agenda.

40

Signal Corruption

high

CHEQ owns Deduce (identity resolution), ClickCease, and Ensighten - creating a surveillance conglomerate with visibility across thousands of customer websites. Clearbit integration on cheq.ai actively de-anonymizes business visitors, potentially feeding intelligence about competitor prospects. With 15,000+ customer deployments, CHEQ has unprecedented access to cross-site visitor behavior that could inform their own go-to-market activities.

100

Legal Tail Risk

critical

CHEQ deploys obfuscated tracking infrastructure (takingbackjuly.com CNAME cloaking) that mirrors botnet evasion techniques they claim to detect. Hotjar session recording on a security vendor site creates attack surface for session replay attacks. The 29 cookies set pre-consent include persistent device IDs that could be exploited if CHEQ infrastructure is compromised.

0

GTM Attack Surface

low

CHEQ displays GDPR, CCPA, SOC2, and ISO 27001 compliance badges while maintaining 88.3% pre-consent tracking - a direct violation of GDPR Article 6 and 7. After consent rejection, all tracking cookies persist (documented in forensic analysis). This consent theater creates regulatory liability for any organization citing CHEQ's compliance claims in their own vendor assessments. The gap between displayed certifications and runtime behavior is the largest we have documented in the GTM security space.

Profile: cheqFirst Seen: 2025-12-28Last Updated: 2026-01-22
Confidence:HIGH

Profile by BLACKOUT Threat Intelligence