All Vendors
marketing_automation

Iterable

Iterable delivers marketing automation with cross-domain identity stitching that achieves 100/100 CAC subsidization through data broker partnerships. Six BTI codes including session recording and consent bypass create 75/100 legal exposure while feeding competitor intelligence systems.

144 IOCs1 detections1 sites
80
Vendor Risk Score

How This Briefing Works

This report opens with key findings, then maps the gaps between what Iterable discloses and what BLACKOUT observed at runtime. From there: what it means for your organization, what to do about it, and the detection data and evidence underneath.

Key Findings

Key Findings

1 detection across 1 site
Disclosure Gaps

Claims vs. Observed Behavior

1 gaps

pending

UNKNOWN
They Claim

Unknown

Observed Behavior

Requires claims extraction via CDT

Customer Impact

What This Means For You

Marketing teams lose attribution visibility as Iterable claims credit for conversions across all touchpoints. Data teams discover customer segments appearing in competitor campaigns within 30 days. Legal inherits GDPR/CCPA liability from uncontrolled data broker syndication. CFO faces quantifiable revenue leakage through audience data monetization.
Recommended Actions

What To Do About It

Role-specific actions based on observed behavior

If You Use Iterable

  • Audit data processing agreements for broker syndication authorization clauses
  • Extract identity resolution logs showing cross-domain stitching without consent
  • Map Iterable audience segments to competitor lookalike audiences

If You're Evaluating Iterable

  • Quantify conversion attribution inflation from multi-touch claiming
  • Calculate audience data monetization revenue (your data, their profit)
  • Document GDPR Article 6 violations from purpose creep beyond marketing automation

Negotiation Leverage

  • Iterable DPA permits audience syndication to unspecified third parties—you lose control of customer data
  • 100/100 CAC subsidization represents direct competitor funding through your marketing spend
  • Cross-domain identity stitching operates without user consent—GDPR Article 7 violations documented
  • Session recording (C07) captures form inputs and PII—data breach exposure multiplies with every integration
  • Email tracking pixels constitute defeat devices under browser privacy policies
  • Evidence pack includes cross-domain sync captures and data broker appearance timelines
Runtime Detections

Runtime Detections

6 BTI-C CODES

BLACKOUT observed this vendor's JavaScript executing in a live browser and classified each hostile behavior using our BTI-C (Behavioral Threat Intelligence — Capability) taxonomy. These are not theoretical risks — each code below was triggered by something we watched this vendor's code actually do.

BTI-C01Defeat Device

Evasion infrastructure, auditor bypass

Impact: Email tracking pixels bypass browser privacy protections through image-based beacons

BTI-C06Behavioral Biometrics

Keystroke/mouse tracking

Impact: Email engagement patterns (read time, scroll depth in email clients) captured for psychographic profiling

BTI-C07Session Recording

Full session replay

Impact: Web session replay feeds campaign optimization while creating PII exposure risk

BTI-C08Cross-Domain Sync

Identity stitching

Impact: Identity stitching across email, web, and third-party domains enables comprehensive surveillance

BTI-C10Fingerprinting

Device identification

Impact: Device fingerprinting persists identity across cookie deletion and incognito sessions

BTI-C15Tag Manager

Container/loader (neutral)

Impact: Dynamic campaign tracking code deployment enables persistent measurement infrastructure

IOC Manifest

IOC Manifest

142 INDICATORS

Indicators of compromise across 5 categories. Use for detection rules, CSP policies, or Pi-hole blocklists.

TRACK
*iterable.com/wp-includes/js/jquery/jquery-migrate.js*
Tracking script
TRACK
*iterable.com/wp-content/plugins/sitepress-multilingual-cms/templates/language-switchers/legacy-dropdown/script.js*
Tracking script
TRACK
*iterable.com/wp-includes/js/jquery/jquery.js*
Tracking script
TRACK
*go.iterable.com/js/forms2/js/forms2.js*
Tracking script
TRACK
*iterable.com/wp-includes/js/dist/hooks.js*
Tracking script
TRACK
*iterable.com/wp-content/themes/itbl/assets/scripts/scripts.js*
Tracking script
TRACK
*iterable.com/wp-includes/js/dist/i18n.js*
Tracking script
TRACK
*iterable.com/wp-content/plugins/contact-form-7/includes/swv/js/index.js*
Tracking script
TRACK
*iterable.com/wp-content/plugins/contact-form-7/includes/js/index.js*
Tracking script
TRACK
*iterable.com/wp-content/plugins/page-links-to/dist/new-tab.js*
Tracking script
TRACK
*iterable.com/wp-content/plugins/wp-smush-pro/app/assets/js/smush-lazy-load.js*
Tracking script
TRACK
*iterable.com/wp-content/themes/itbl/assets/scripts/theme-scripts.js*
Tracking script
TRACK
*iterable.com/wp-content/themes/itbl/assets/scripts/lib/lottie-5-5-9.js*
Tracking script
TRACK
*go.iterable.com/index.php/form/getForm*
Tracking script
TRACK
js.iterable.com
Tracking script
TRACK
go.iterable.com/js/forms2/js/forms2.min.js
Auto-extracted from scan
TRACK
iterable.com/wp-includes/js/jquery/jquery.min.js
Auto-extracted from scan
TRACK
iterable.com/wp-includes/js/jquery/jquery-migrate.min.js
Auto-extracted from scan
TRACK
iterable.com/wp-content/plugins/sitepress-multilingual-cms/templates/language-switchers/legacy-dropdown/script.min.js
Auto-extracted from scan
TRACK
iterable.com/wp-content/themes/itbl/assets/scripts/scripts.js
Auto-extracted from scan
TRACK
iterable.com/wp-includes/js/dist/hooks.min.js
Auto-extracted from scan
TRACK
iterable.com/wp-includes/js/dist/i18n.min.js
Auto-extracted from scan
TRACK
iterable.com/wp-content/plugins/contact-form-7/includes/swv/js/index.js
Auto-extracted from scan
TRACK
iterable.com/wp-content/plugins/contact-form-7/includes/js/index.js
Auto-extracted from scan
TRACK
iterable.com/wp-content/plugins/page-links-to/dist/new-tab.js
Auto-extracted from scan
TRACK
iterable.com/wp-content/plugins/wp-smush-pro/app/assets/js/smush-lazy-load.min.js
Auto-extracted from scan
TRACK
iterable.com/wp-content/themes/itbl/assets/scripts/theme-scripts.js
Auto-extracted from scan
TRACK
iterable.com/wp-content/themes/itbl/assets/scripts/lib/lottie-5-5-9.js
Auto-extracted from scan
TRACK
go.iterable.com/index.php/form/getForm
Auto-extracted from scan
Ecosystem

Ecosystem & Supply Chain

Iterable integrates with Segment, mParticle, and major CDPs, creating redundant identity graphs. Commonly deployed alongside Braze and Klaviyo, triplicating message delivery infrastructure and signal corruption.
Loads (1)
Evidence

Evidence Artifacts

Artifacts collected during analysis, available with evidence-tier access.

HAR Capture

Complete network capture with all requests and responses

IOC Manifest

144 detection signatures across scripts, domains, cookies, and network endpoints

Vendor Details