All Vendors
dsp

Infillion

Infillion is a DSP (demand-side platform) with a VRS of 80, combining low Oracle (15), maximum Broker (100), and high Counselor (70) threats. The platform deploys behavioral biometrics, session recording, cross-domain sync, identity resolution, and tag manager infrastructure to deliver programmatic advertising and audience targeting.

48 IOCs29 detections26 sites
80
Vendor Risk Score

How This Briefing Works

This report opens with key findings, then maps the gaps between what Infillion discloses and what BLACKOUT observed at runtime. From there: what it means for your organization, what to do about it, and the detection data and evidence underneath.

Key Findings

Key Findings

29 detections across 26 sites
Disclosure Gaps

Claims vs. Observed Behavior

1 gaps

pending

UNKNOWN
They Claim

Unknown

Observed Behavior

Requires claims extraction via CDT

Customer Impact

What This Means For You

Marketing teams using Infillion for programmatic buying face three critical risks: (1) Attribution corruption from probabilistic cross-device matching creating false conversion credit, (2) Systematic competitive intelligence broadcast through RTB bid stream revealing target audiences and campaign strategies, (3) High regulatory exposure from behavioral tracking, cross-domain sync, and identity resolution without adequate user consent. The platform's combined DSP/SSP model creates conflicts of interest where advertiser and publisher data are co-mingled.
Recommended Actions

What To Do About It

Role-specific actions based on observed behavior

If You Use Infillion

  • Demand transparency on cross-device matching methodology and false positive rates in attribution
  • Require contractual limits on bid stream data sharing and audience segment resale to competing advertisers
  • Implement privacy-preserving targeting using contextual signals rather than behavioral profiles
  • Configure attribution reporting to separate deterministic versus probabilistic conversion credit

If You're Evaluating Infillion

  • Request third-party audit of cross-domain tracking and identity resolution practices
  • Evaluate alternative programmatic platforms with privacy-first architectures (e.g., contextual DSPs)
  • Consider direct publisher relationships to eliminate RTB competitive intelligence broadcast
  • Assess whether DSP/SSP conflict of interest creates advertiser disadvantage in auction dynamics

Negotiation Leverage

  • Infillion VRS 80 = Broker (100) + Counselor (70) threat. RTB bid stream = competitive intelligence broadcast. Every impression leaks targeting data.
  • Cross-domain sync (BTI-C08) + identity resolution (BTI-C14) = tracking across publishers and devices without consent. Require GDPR compliance documentation.
  • Session recording (BTI-C07) of post-click behavior creates PII exposure. Demand data retention limits and redaction practices.
  • Combined DSP/SSP model creates conflict of interest. Publisher data informs advertiser targeting; advertiser data informs publisher yield optimization. Request disclosure.
  • Behavioral biometrics (BTI-C06) for audience modeling = special category data risk. Minimize behavioral targeting to reduce exposure.
  • Ask: What user data is included in bid requests? How is cross-device identity graph constructed? What is the data retention policy? Expect evasive answers.
Runtime Detections

Runtime Detections

6 BTI-C CODES

BLACKOUT observed this vendor's JavaScript executing in a live browser and classified each hostile behavior using our BTI-C (Behavioral Threat Intelligence — Capability) taxonomy. These are not theoretical risks — each code below was triggered by something we watched this vendor's code actually do.

BTI-C06Behavioral Biometrics

Keystroke/mouse tracking

Impact: Mouse tracking and interaction patterns captured across ad impressions feed audience models used for cross-publisher targeting.

BTI-C07Session Recording

Full session replay

Impact: Landing page interaction capture following ad clicks enables conversion path analysis and retargeting optimization based on granular user behavior.

BTI-C08Cross-Domain Sync

Identity stitching

Impact: Cookie syncing across multiple publishers enables user tracking across unrelated websites, creating comprehensive browsing profile without consent.

BTI-C09Consent Bypass

Ignoring CMP signals

BTI-C14Identity Resolution

PII deanonymization

Impact: Cross-device user linking enables persistent tracking across mobile, desktop, and CTV without explicit user consent or notification.

BTI-C15Tag Manager

Container/loader (neutral)

Impact: Client-side tag deployment on publisher properties creates third-party script execution enabling comprehensive page interaction capture.

IOC Manifest

IOC Manifest

43 INDICATORS

Indicators of compromise across 4 categories. Use for detection rules, CSP policies, or Pi-hole blocklists.

TRACK
*hello.infillion.com/js/forms2/js/forms2.js*
Tracking script
TRACK
*infillion.com/wp-content/themes/bricks-child/addsearch/dist/ui.js*
Tracking script
TRACK
*hello.infillion.com/index.php/form/getForm*
Tracking script
TRACK
*infillion.com/wp-content/themes/bricks/assets/js/bricks.js*
Tracking script
TRACK
*infillion.com/wp-includes/js/wp-emoji-release.js*
Tracking script
TRACK
hello.infillion.com/js/forms2/js/forms2.min.js
Auto-extracted from scan
TRACK
infillion.com/wp-content/themes/bricks/assets/js/bricks.min.js
Auto-extracted from scan
TRACK
infillion.com/wp-content/themes/bricks-child/addsearch/dist/ui.min.js
Auto-extracted from scan
TRACK
hello.infillion.com/index.php/form/getForm
Auto-extracted from scan
TRACK
infillion.com/wp-includes/js/wp-emoji-release.min.js
Auto-extracted from scan
Ecosystem

Ecosystem & Supply Chain

Infillion operates within the programmatic advertising ecosystem alongside Google DV360, The Trade Desk, and Amazon DSP. The platform's combined DSP/SSP model creates bidirectional data flow where publisher inventory insights inform advertiser targeting. RTB infrastructure means every impression generates bid requests to dozens of competing platforms, systematically broadcasting targeting data. Identity graph partnerships with data brokers enable cross-device tracking.
Evidence

Evidence Artifacts

Artifacts collected during analysis, available with evidence-tier access.

HAR Capture

Complete network capture with all requests and responses

IOC Manifest

48 detection signatures across scripts, domains, cookies, and network endpoints

Vendor Details