How This Briefing Works
This report opens with key findings, then maps the gaps between what Findymail discloses and what BLACKOUT observed at runtime. From there: what it means for your organization, what to do about it, and the detection data and evidence underneath.
Key Findings
Pre-Consent Activity
Findymail was observed loading and executing before user consent was obtained on 100% of sites where it was detected.
Claims vs. Observed Behavior
consent
“Unknown - requires claims extraction via CDT”
Deploys pre-consent tracking script on customer websites
What This Means For You
What To Do About It
Role-specific actions based on observed behavior
If You Use Findymail
- →Verify deployment uses API-only integration (no website script)
- →Confirm sales team accesses Findymail portal directly, not via website tag
- →Request written confirmation that no client-side tracking occurs
If You're Evaluating Findymail
- →Require vendor to demonstrate API-only integration capability before contract
- →Demand contractual liability shift for any consent bypass violations
- →Evaluate alternative enrichment tools with confirmed backend-only architecture (Clearbit API, ZoomInfo API)
Negotiation Leverage
- →Findymail creates consent liability through website deployment when API integration eliminates need for client-side presence
- →Vendor must contractually guarantee API-only integration or assume 100% liability for consent violations
- →Request technical architecture review: if enrichment works without website tag, why does tag exist?
- →Comparable tools (Hunter API, Clearbit API) provide same capability without client-side deployment risk
Runtime Detections
BLACKOUT observed this vendor's JavaScript executing in a live browser and classified each hostile behavior using our BTI-C (Behavioral Threat Intelligence — Capability) taxonomy. These are not theoretical risks — each code below was triggered by something we watched this vendor's code actually do.
Ignoring CMP signals
Impact: Script loads and initializes before user consent, creating per-visitor violation liability. Enforcement agencies can assess fines based on total visitor counts, not actual data collected.
IOC Manifest
Indicators of compromise across 3 categories. Use for detection rules, CSP policies, or Pi-hole blocklists.
Ecosystem & Supply Chain
Evidence Artifacts
Artifacts collected during analysis, available with evidence-tier access.
Complete network capture with all requests and responses
61 detection signatures across scripts, domains, cookies, and network endpoints