All Vendors
deanon

Contactout

ContactOut's core product is deanonymization — resolving anonymous website visitors to real contact information — and it fires before consent on 54% of observed deployments across 47 sites.

126 IOCs50 detections54% pre-consent47 sites
85
Vendor Risk Score

How This Briefing Works

This report opens with key findings, then maps the gaps between what Contactout discloses and what BLACKOUT observed at runtime. From there: what it means for your organization, what to do about it, and the detection data and evidence underneath.

Key Findings

Key Findings

50 detections across 47 sites54% pre-consent activity
CRITICAL

Pre-Consent Activity

Contactout was observed loading and executing before user consent was obtained on 54% of sites where it was detected.

GDPRePrivacy
HIGH

Pending Analysis

6 BTI behavioral codes detected across 50 observations on 47 sites. Full claims extraction required for gap analysis.

Disclosure Gaps

Claims vs. Observed Behavior

1 gaps
1 HIGH

Pending Analysis

HIGH
They Claim

Claims analysis pending

Observed Behavior

6 BTI behavioral codes detected across 50 observations on 47 sites. Full claims extraction required for gap analysis.

Customer Impact

What This Means For You

If ContactOut is deployed on your site, your anonymous visitors are being identified by name and their contact information is being made commercially available. This is not a side effect of analytics — it is the product. The 54% pre-consent rate means visitors are deanonymized before they can consent or decline. Under GDPR, you bear responsibility as data controller for this processing, which almost certainly lacks lawful basis. Under CCPA, the commercial availability of resolved visitor data likely constitutes a "sale" of personal information requiring explicit opt-out mechanisms. Your privacy policy must disclose that anonymous visitors are being identified and their information shared with third parties — most do not.
Recommended Actions

What To Do About It

Role-specific actions based on observed behavior

If You Use Contactout

  • Verify your privacy policy explicitly discloses visitor deanonymization and the commercial availability of resolved contact data
  • Implement pre-load consent gating — ContactOut must not fire until visitors affirmatively consent to identification
  • Review your ContactOut agreement for data ownership clauses — confirm whether resolved identities from your visitors can be resold
  • Conduct a DPIA (Data Protection Impact Assessment) specifically covering ContactOut's deanonymization processing on your property

If You're Evaluating Contactout

  • Assess whether the sales intelligence value of ContactOut justifies the regulatory exposure of pre-consent deanonymization
  • Request ContactOut's Article 30 records and verify their claimed lawful basis for processing visitor data from your site
  • Evaluate whether first-party lead capture (forms, gated content) could replace ContactOut without the compliance burden
  • Consider the reputational risk if visitors discover they are being deanonymized without consent on your site

Negotiation Leverage

  • 54% pre-consent firing rate for a deanonymization tool — this is the highest-risk combination possible: identifying people without asking
  • Identity resolution (C14) is the product, not a side effect — your vendor contract must explicitly address who owns resolved visitor data and restrict resale
  • 6 BTI-C codes including defeat device (C01) and consent bypass (C09) — ContactOut actively circumvents the consent controls your legal team relies on
  • Maximum legal tail risk (100) — GDPR per-violation fines apply to each visitor deanonymized without consent, creating uncapped liability
  • Demand a consent-first deployment mode where ContactOut only resolves visitors who have explicitly opted in to identification
Runtime Detections

Runtime Detections

7 BTI-C CODES

BLACKOUT observed this vendor's JavaScript executing in a live browser and classified each hostile behavior using our BTI-C (Behavioral Threat Intelligence — Capability) taxonomy. These are not theoretical risks — each code below was triggered by something we watched this vendor's code actually do.

BTI-C01Defeat Device

Evasion infrastructure, auditor bypass

Impact: ContactOut deploys evasion infrastructure that can alter its behavior when auditing tools or consent checks are detected, making it difficult to verify whether deanonymization occurs during compliance reviews.

BTI-C06Behavioral Biometrics

Keystroke/mouse tracking

Impact: Behavioral tracking augments ContactOut's identity resolution by associating interaction patterns with resolved identities, creating enriched contact profiles that include behavioral signatures beyond basic contact information.

BTI-C08Cross-Domain Sync

Identity stitching

BTI-C09Consent Bypass

Ignoring CMP signals

Impact: 54% pre-consent firing rate — the highest in this group — means ContactOut begins identifying visitors before consent mechanisms engage. Deanonymization without consent is a direct violation of GDPR Article 6 and ePrivacy requirements.

BTI-C10Fingerprinting

Device identification

Impact: Device fingerprinting supports persistent identification across sessions, enabling ContactOut to maintain identity resolution even when users clear cookies or use privacy tools — directly undermining user attempts to remain anonymous.

BTI-C14Identity Resolution

PII deanonymization

Impact: This is ContactOut's core product: converting anonymous visitors into named individuals with contact details. Every resolved identity becomes a commercial asset in ContactOut's database, available for purchase by any subscriber regardless of the visitor's relationship to the original site.

BTI-C15Tag Manager

Container/loader (neutral)

Impact: Container/loader behavior detected — ContactOut uses tag management infrastructure to orchestrate its script deployment, potentially loading additional tracking capabilities dynamically.

IOC Manifest

IOC Manifest

124 INDICATORS

Indicators of compromise across 4 categories. Use for detection rules, CSP policies, or Pi-hole blocklists.

TRACK
*contactout.com/build/assets/cta.*.js*
Tracking script
TRACK
*contactout.com/build/assets/main-front.*.js*
Tracking script
TRACK
*contactout.com/build/assets/burger.*.js*
Tracking script
TRACK
*contactout.com/build_front/assets/user-onboard-tracking.*.js*
Tracking script
TRACK
*contactout.com/build/assets/hero.*.js*
Tracking script
TRACK
*contactout.com/js/pub/alpine-tooltip.js*
Tracking script
TRACK
*contactout.com/js/tracking-scripts.js*
Tracking script
TRACK
*contactout.com/cdn-cgi/challenge-platform/scripts/jsd/main.js*
Tracking script
TRACK
*contactout.com/cdn-cgi/challenge-platform/h/b/scripts/jsd/*/main.js*
Tracking script
TRACK
contactout.com/js/pub/alpine-tooltip.min.js
Auto-extracted from scan
TRACK
contactout.com/js/tracking-scripts.js
Auto-extracted from scan
TRACK
contactout.com/build_front/assets/user-onboard-tracking.c42b6802.js
Auto-extracted from scan
TRACK
contactout.com/build/assets/main-front.9aa64e04.js
Auto-extracted from scan
TRACK
contactout.com/build/assets/burger.310ab25e.js
Auto-extracted from scan
TRACK
contactout.com/build/assets/hero.2995aca8.js
Auto-extracted from scan
TRACK
contactout.com/build/assets/cta.35297fe5.js
Auto-extracted from scan
TRACK
contactout.com/cdn-cgi/challenge-platform/scripts/jsd/main.js
Auto-extracted from scan
TRACK
contactout.com/cdn-cgi/challenge-platform/h/b/scripts/jsd/7f3d2ee44814/main.js
Auto-extracted from scan
Ecosystem

Ecosystem & Supply Chain

ContactOut positions itself as a recruitment and sales intelligence tool, competing directly with ZoomInfo, Apollo, Lusha, and RB2B in the visitor deanonymization market. It integrates with Salesforce, HubSpot, and LinkedIn, feeding resolved contact data into CRM and outreach workflows. ContactOut frequently co-deploys alongside other marketing automation and analytics tools, layering deanonymization on top of existing tracking infrastructure. The company's Chrome extension and API products suggest a broader data collection network that extends beyond individual site deployments.
Loads (1)
Evidence

Evidence Artifacts

Artifacts collected during analysis, available with evidence-tier access.

HAR Capture

Complete network capture with all requests and responses

IOC Manifest

126 detection signatures across scripts, domains, cookies, and network endpoints

Vendor Details