All Vendors
data_enrichment

Fullenrich

Contact enrichment API with modest demand leakage through lookup pattern exposure to data providers.

11 IOCs103 detections101 sites
22
Vendor Risk Score

How This Briefing Works

This report opens with key findings, then maps the gaps between what Fullenrich discloses and what BLACKOUT observed at runtime. From there: what it means for your organization, what to do about it, and the detection data and evidence underneath.

Key Findings

Key Findings

103 detections across 101 sites
Disclosure Gaps

Claims vs. Observed Behavior

1 gaps

pending

UNKNOWN
They Claim

Requires claims extraction via CDT

Observed Behavior

Live website analysis pending

Customer Impact

What This Means For You

Sales and marketing teams gain automated contact enrichment but organization exposes pipeline focus through lookup patterns sent to upstream data providers. Every enrichment request signals which accounts you're targeting. Data quality depends on third-party sources with unknown collection methods and consent basis, creating potential GDPR exposure.
Recommended Actions

What To Do About It

Role-specific actions based on observed behavior

If You Use Fullenrich

  • Audit upstream data providers for GDPR compliance and consent documentation
  • Implement enrichment batching to reduce real-time lookup pattern exposure
  • Review data processing addendum for clarity on data provider relationships

If You're Evaluating Fullenrich

  • First-party data collection strategies to reduce third-party enrichment dependency
  • Alternative providers with transparent data sourcing and stronger privacy commitments
  • Self-hosted enrichment using purchased datasets to eliminate lookup signal leakage

Negotiation Leverage

  • Request exhaustive list of upstream data providers and explicit controls over which sources are used for enrichment
  • Demand contractual prohibition on Fullenrich or partners using your lookup patterns for competitive intelligence or benchmarking
  • Negotiate data sourcing transparency including consent basis and collection methods for all contact data returned
Runtime Detections

Runtime Detections

1 BTI-C CODES

BLACKOUT observed this vendor's JavaScript executing in a live browser and classified each hostile behavior using our BTI-C (Behavioral Threat Intelligence — Capability) taxonomy. These are not theoretical risks — each code below was triggered by something we watched this vendor's code actually do.

BTI-C08Cross-Domain Sync

Identity stitching

Impact: Synchronizes prospect identity across multiple data provider sources to compile enriched profiles

IOC Manifest

IOC Manifest

4 INDICATORS

Indicators of compromise across 2 categories. Use for detection rules, CSP policies, or Pi-hole blocklists.

No indicators in this category

Ecosystem

Ecosystem & Supply Chain

B2B data enrichment aggregator competing against Clearbit, ZoomInfo Enrich, and similar API-based contact data services. Part of sales intelligence infrastructure where enrichment becomes demand signal exposure.
Evidence

Evidence Artifacts

Artifacts collected during analysis, available with evidence-tier access.

HAR Capture

Complete network capture with all requests and responses

IOC Manifest

11 detection signatures across scripts, domains, cookies, and network endpoints

Vendor Details