All Vendors
fraud_detection

Doubleverify

DoubleVerify is a fraud detection vendor with a VRS of 80. Deploys comprehensive behavioral monitoring and identity resolution infrastructure disguised as advertising verification, creating persistent tracking for ad fraud prevention.

100 IOCs95 detections47% pre-consent93 sites
80
Vendor Risk Score

How This Briefing Works

This report opens with key findings, then maps the gaps between what Doubleverify discloses and what BLACKOUT observed at runtime. From there: what it means for your organization, what to do about it, and the detection data and evidence underneath.

Key Findings

Key Findings

95 detections across 93 sites47% pre-consent activity
HIGH

Pre-Consent Activity

Doubleverify was observed loading and executing before user consent was obtained on 47% of sites where it was detected.

GDPRePrivacy
Disclosure Gaps

Claims vs. Observed Behavior

1 gaps

pending

UNKNOWN
They Claim

Unknown

Observed Behavior

Requires claims extraction via CDT

Customer Impact

What This Means For You

Customers visiting sites with DoubleVerify face fraud detection surveillance that extends beyond bot verification to comprehensive behavioral profiling. Behavioral data including interaction patterns, mouse movements, scroll timing, and cross-campaign engagement are captured for fraud analysis but also create visitor authenticity signals that inform competitor targeting. Verified human traffic becomes high-value inventory for programmatic bidding.
Recommended Actions

What To Do About It

Role-specific actions based on observed behavior

If You Use Doubleverify

  • Audit DoubleVerify deployment to verify fraud detection scope is limited to advertising viewability, not site-wide visitor tracking
  • Disable cross-campaign identity synchronization and require campaign-specific fraud verification isolation
  • Review DPA for behavioral data sharing restrictions and prohibit visitor authenticity signals from feeding demand networks
  • Implement consent-conditional DoubleVerify load or verify legitimate interest legal basis is properly documented
  • Establish fraud detection data retention limits to prevent long-term behavioral profile accumulation

If You're Evaluating Doubleverify

  • Request DoubleVerify deployment with strict campaign-level isolation, no cross-site visitor tracking
  • Require contractual guarantee that fraud detection data does not feed programmatic demand networks or audience targeting
  • Verify DoubleVerify behavioral biometrics are limited to bot detection, not visitor engagement scoring
  • Assess alternative fraud detection vendors with transparent data isolation and minimal behavioral capture
  • Demand pricing concessions reflecting restricted deployment without cross-campaign identity resolution

Negotiation Leverage

  • VRS 80 classification with 100% CAC subsidization justifies significant discount if cross-campaign identity sync is disabled
  • 55% legal tail risk from consent bypass claims demands documented legitimate interest assessment and GDPR Article 6 compliance verification
  • Require contractual guarantee that visitor authenticity signals remain campaign-specific and do not feed external demand networks
  • Request quarterly attestation that fraud detection data does not enable cross-site visitor tracking beyond verification scope
  • Negotiate fraud detection scope limits (viewability only, no behavioral biometrics) and data retention restrictions (7 days maximum)
Runtime Detections

Runtime Detections

6 BTI-C CODES

BLACKOUT observed this vendor's JavaScript executing in a live browser and classified each hostile behavior using our BTI-C (Behavioral Threat Intelligence — Capability) taxonomy. These are not theoretical risks — each code below was triggered by something we watched this vendor's code actually do.

BTI-C06Behavioral Biometrics

Keystroke/mouse tracking

Impact: Mouse movements, scroll patterns, and interaction timing captured for bot detection algorithms, creating behavioral profiles beyond fraud verification.

BTI-C07Session Recording

Full session replay

BTI-C08Cross-Domain Sync

Identity stitching

Impact: Visitor authenticity IDs synchronized across advertising campaigns to track fraud patterns, enabling cross-site behavior correlation.

BTI-C09Consent Bypass

Ignoring CMP signals

Impact: DoubleVerify loads fraud detection infrastructure before consent acceptance, claiming operational necessity exemption.

BTI-C14Identity Resolution

PII deanonymization

Impact: Probabilistic identity matching used to reconnect visitors across campaigns for fraud pattern detection, creating persistent cross-site tracking.

BTI-C15Tag Manager

Container/loader (neutral)

Impact: DoubleVerify tag infrastructure coordinates fraud detection pixels across advertising platforms, creating comprehensive campaign-level surveillance.

IOC Manifest

IOC Manifest

75 INDICATORS

Indicators of compromise across 4 categories. Use for detection rules, CSP policies, or Pi-hole blocklists.

TRACK
*doubleverify.com/hubfs/hub_generated/template_assets/1/*/*/template_fwds_main.js*
Tracking script
TRACK
*doubleverify.com/hs/hsstatic/content-cwv-embed/static-1.*/embed.js*
Tracking script
TRACK
*doubleverify.com/hs/hsstatic/cos-i18n/static-1.53/bundles/project.js*
Tracking script
TRACK
*doubleverify.com/hs/hsstatic/HubspotToolsMenu/static-1.432/js/index.js*
Tracking script
TRACK
*doubleverify.com/hs/scriptloader/*.js*
Tracking script
TRACK
*doubleverify.com/_hcms/forms/v2.js*
Tracking script
TRACK
doubleverify.com/hubfs/hub_generated/template_assets/1/185471142289/1768511250166/template_fwds_main.min.js
Auto-extracted from scan
TRACK
doubleverify.com/hs/hsstatic/content-cwv-embed/static-1.1293/embed.js
Auto-extracted from scan
TRACK
doubleverify.com/hs/hsstatic/cos-i18n/static-1.53/bundles/project.js
Auto-extracted from scan
TRACK
doubleverify.com/_hcms/forms/v2.js
Auto-extracted from scan
TRACK
doubleverify.com/hs/scriptloader/46126064.js
Auto-extracted from scan
TRACK
doubleverify.com/hs/hsstatic/HubspotToolsMenu/static-1.432/js/index.js
Auto-extracted from scan
Ecosystem

Ecosystem & Supply Chain

DoubleVerify occupies the advertising verification layer, typically deployed alongside programmatic advertising platforms (Google Display & Video 360, The Trade Desk), brand safety tools (Integral Ad Science), and campaign measurement systems (Nielsen, Moat). The vendor creates fraud detection infrastructure that also enables comprehensive visitor tracking and cross-campaign identity resolution.
Evidence

Evidence Artifacts

Artifacts collected during analysis, available with evidence-tier access.

HAR Capture

Complete network capture with all requests and responses

IOC Manifest

100 detection signatures across scripts, domains, cookies, and network endpoints

Vendor Details