How This Briefing Works
This report opens with key findings, then maps the gaps between what impact.com discloses and what BLACKOUT observed at runtime. From there: what it means for your organization, what to do about it, and the detection data and evidence underneath.
Key Findings
Analysis pending. Findings will appear here once intelligence collection is complete.
Claims vs. Observed Behavior
pending
“Awaiting scanner verification”
Runtime analysis needed to confirm UTT payload size, cookie names and expiration windows, exact data fields transmitted per page view, and pre-consent script behavior.
pending
“Cross-device graph persistence unknown”
Need to verify whether cross-device identity graph data persists after cookie consent withdrawal and what data retention policies apply to the identity graph.
What This Means For You
What To Do About It
Role-specific actions based on observed behavior
Recommended Actions for impact.com
- →- Audit whether the UTT is loading on all pages or only conversion-relevant pages, and restrict deployment scope if possible. - Review impact.com's partner list quarterly to understand which third parties receive conversion data through the platform. - Evaluate server-to-server (API) tracking as an alternative to the client-side UTT to reduce browser-side data collection. - Ensure cookie consent mechanisms specifically disclose affiliate partner data sharing rather than bundling under generic marketing consent. - Request impact.com's data processing agreements covering cross-device identity graph data retention and sharing policies.
Negotiation Leverage
- →impact.com's value proposition depends on demonstrating affiliate-driven revenue, creating leverage for brands to demand transparency into what data the UTT collects, how long cross-device identity graph profiles persist, and which partners access conversion path data. Negotiate for contractual limits on data retention periods, require opt-out of cross-device graphing for EU/UK visitors, and demand audit rights over which affiliate partners receive your conversion data. The platform's shift toward server-side tracking is a positive signal — push for full migration off client-side UTT to reduce your attack surface.
IOC Manifest
Indicators of compromise across 4 categories. Use for detection rules, CSP policies, or Pi-hole blocklists.
Ecosystem & Supply Chain
Evidence Artifacts
Artifacts collected during analysis, available with evidence-tier access.
Complete network capture with all requests and responses
69 detection signatures across scripts, domains, cookies, and network endpoints