All Vendors
data_enrichment

Hunter

Hunter deploys comprehensive surveillance: behavioral biometrics, session replay, cross-domain syncing, consent bypass, and tag manager persistence. Low Oracle risk, SEVERE Broker exposure (VRS 90), critical Counselor violations create maximum compliance disaster.

127 IOCs89 detections3% pre-consent87 sites
70
Vendor Risk Score

How This Briefing Works

This report opens with key findings, then maps the gaps between what Hunter discloses and what BLACKOUT observed at runtime. From there: what it means for your organization, what to do about it, and the detection data and evidence underneath.

Key Findings

Key Findings

89 detections across 87 sites3% pre-consent activity
MEDIUM

Pre-Consent Activity

Hunter was observed loading and executing before user consent was obtained on 3% of sites where it was detected.

GDPRePrivacy
Disclosure Gaps

Claims vs. Observed Behavior

1 gaps
Customer Impact

What This Means For You

Marketing teams gain email enrichment but inherit maximum surveillance liability: session recording + special category biometrics + cross-domain data transfers. Engineering teams lose control through tag manager deployment - vendor can modify tracking without customer awareness. Legal teams face indefensible regulatory enforcement across six GDPR provisions simultaneously.
Recommended Actions

What To Do About It

Role-specific actions based on observed behavior

If You Use Hunter

  • Remove Hunter from tag manager immediately - tag deployment makes compliance impossible
  • Demand deletion of all session replay, behavioral biometric, and cross-domain sync data
  • Request list of all data-sharing partners to assess total liability exposure
  • Terminate contract - VRS 90 represents unacceptable risk for email enrichment tool

If You're Evaluating Hunter

  • REJECT Hunter - VRS 90 surveillance for email finding is indefensible
  • Migrate to API-only enrichment: Clearbit API (no website tracking), ZoomInfo API (backend only)
  • Use manual email verification instead of automated surveillance infrastructure

Negotiation Leverage

  • Hunter VRS 90 represents extreme surveillance: session replay + behavioral biometrics + cross-domain syncing + tag manager persistence for email enrichment tool
  • Five simultaneous GDPR violations create indefensible regulatory position - no legitimate interest or business necessity defense for this architecture
  • Tag manager deployment prevents customer control - Hunter can modify tracking server-side without visibility or consent
  • Email enrichment DOES NOT require session recording or behavioral fingerprinting - architecture is vendor choice that transfers maximum liability to customer
Runtime Detections

Runtime Detections

5 BTI-C CODES

BLACKOUT observed this vendor's JavaScript executing in a live browser and classified each hostile behavior using our BTI-C (Behavioral Threat Intelligence — Capability) taxonomy. These are not theoretical risks — each code below was triggered by something we watched this vendor's code actually do.

BTI-C06Behavioral Biometrics

Keystroke/mouse tracking

Impact: Captures mouse movements, scroll patterns, interaction timing to create behavioral fingerprints. GDPR Article 9 special category data violation - requires explicit consent, pre-consent capture creates maximum penalty exposure.

BTI-C07Session Recording

Full session replay

Impact: Records full user sessions including email verification attempts (reveals marketing targets), form inputs, navigation patterns. May capture sensitive personal data without consent - creates privacy violation with severe reputational risk.

BTI-C08Cross-Domain Sync

Identity stitching

Impact: Syncs visitor identities with data broker/ad network partners before consent. Creates per-visitor violation multiplied by number of sync recipients - exponential penalty exposure through unauthorized data transfers.

BTI-C09Consent Bypass

Ignoring CMP signals

Impact: All tracking loads before consent opportunity - creates per-visitor GDPR Article 7 violation. Combined with session replay, biometrics, and cross-domain syncing, elevates to Article 9 special category + Article 44 data transfer violations.

BTI-C15Tag Manager

Container/loader (neutral)

Impact: Deployment via tag manager enables Hunter to modify surveillance behavior server-side without customer visibility. Customer cannot verify compliance even after configuration - creates uncontrollable ongoing liability.

IOC Manifest

IOC Manifest

118 INDICATORS

Indicators of compromise across 4 categories. Use for detection rules, CSP policies, or Pi-hole blocklists.

TRACK
*www.hunter.com/Util/Find/epi-util/find.js*
Tracking script
TRACK
*www.hunter.com/Static/ds2-assets/ds2-main.js*
Tracking script
TRACK
*www.hunter.com/Static/js/jquery-3.4.1.js*
Tracking script
TRACK
*www.hunter.com/Static/js/masonry.pkgd.js*
Tracking script
TRACK
*www.hunter.com/Static/js/slick.js*
Tracking script
TRACK
*www.hunter.com/Static/js/jquery.mask.js*
Tracking script
TRACK
*www.hunter.com/Static/js/imagesloaded.pkgd.js*
Tracking script
TRACK
*www.hunter.com/Static/js/jquery-confirm.js*
Tracking script
TRACK
*www.hunter.com/Static/js/jquery.fullscreen-min.js*
Tracking script
TRACK
*www.hunter.com/Static/js/jquery.multiselect.js*
Tracking script
TRACK
*www.hunter.com/dist/bundle.js*
Tracking script
TRACK
www.hunter.com/Util/Find/epi-util/find.js
Auto-extracted from scan
TRACK
www.hunter.com/Static/ds2-assets/ds2-main.js
Auto-extracted from scan
TRACK
www.hunter.com/Static/js/jquery-3.4.1.min.js
Auto-extracted from scan
TRACK
www.hunter.com/Static/js/slick.min.js
Auto-extracted from scan
TRACK
www.hunter.com/Static/js/jquery.multiselect.js
Auto-extracted from scan
TRACK
www.hunter.com/Static/js/jquery-confirm.js
Auto-extracted from scan
TRACK
www.hunter.com/Static/js/jquery.mask.min.js
Auto-extracted from scan
TRACK
www.hunter.com/Static/js/masonry.pkgd.min.js
Auto-extracted from scan
TRACK
www.hunter.com/Static/js/imagesloaded.pkgd.min.js
Auto-extracted from scan
TRACK
www.hunter.com/Static/js/jquery.fullscreen-min.js
Auto-extracted from scan
TRACK
www.hunter.com/dist/bundle.js
Auto-extracted from scan
Ecosystem

Ecosystem & Supply Chain

Hunter operates as B2B data enrichment tool (email finding/verification) but deploys surveillance architecture comparable to most aggressive ad tech. VRS 90 places Hunter in top 10% threat vendors. Higher risk than similar enrichment tools (Clearbit, ZoomInfo) that use API-only or consent-first architectures.
Loads (1)
Evidence

Evidence Artifacts

Artifacts collected during analysis, available with evidence-tier access.

HAR Capture

Complete network capture with all requests and responses

IOC Manifest

127 detection signatures across scripts, domains, cookies, and network endpoints

Vendor Details