How This Briefing Works
This report opens with key findings, then maps the gaps between what Lead Forensics discloses and what BLACKOUT observed at runtime. From there: what it means for your organization, what to do about it, and the detection data and evidence underneath.
Key Findings
Analysis pending. Findings will appear here once intelligence collection is complete.
Claims vs. Observed Behavior
collection
“Does not identify personal IP addresses or mobile devices”
All visitor IPs are collected and transmitted to Lead Forensics servers; business/personal classification occurs after collection, not before
sharing
“Does not share, rent, or sell data to third parties”
The 1.4B IP database is enriched by aggregate traffic from all customer websites, which benefits all platform users including potential competitors
compliance
“GDPR compliant via Legitimate Interest Assessment”
Legitimate interest for deanonymization faces increasing regulatory challenge, particularly when combined with contact enrichment that appends PII without data subject consent
pending
“Awaiting scanner verification”
Pre-consent loading behavior, cookie deployment patterns, and actual third-party network requests not yet verified by BLACKOUT scanner
What This Means For You
What To Do About It
Role-specific actions based on observed behavior
Recommended Actions for Lead Forensics
- →- Audit whether the Lead Forensics JavaScript loads before or after consent is obtained, and verify that no data is transmitted pre-consent - Request a complete Data Processing Agreement (DPA) and review the specific third-party data suppliers involved in contact enrichment - Verify that your privacy policy explicitly discloses the use of IP-based visitor identification and contact data enrichment - Assess whether legitimate interest is a defensible legal basis for deanonymization in your operating jurisdictions - Monitor the data flowing into your CRM from Lead Forensics to ensure contact records have valid opt-out mechanisms
Negotiation Leverage
- →Customers have meaningful leverage in negotiations with Lead Forensics because the platform depends on widespread JavaScript deployment across customer websites to maintain and grow its IP database. Key questions to ask: What specific third-party data suppliers provide the contact enrichment data? How is your IP database maintained and what role does aggregate customer traffic play in enrichment? What happens to data collected from our website visitors if we terminate the contract? What is the data retention period for visitor IP addresses that do not match a business record?
- →Contractual protections to demand include: explicit data deletion upon contract termination with certification, indemnification for regulatory actions arising from Lead Forensics' data practices, a prohibition on using your website traffic data to enrich the broader database or benefit other customers, and right-to-audit clauses covering both Lead Forensics and their third-party data suppliers.
Runtime Detections
BLACKOUT observed this vendor's JavaScript executing in a live browser and classified each hostile behavior using our BTI-C (Behavioral Threat Intelligence — Capability) taxonomy. These are not theoretical risks — each code below was triggered by something we watched this vendor's code actually do.
Evasion infrastructure, auditor bypass
Keystroke/mouse tracking
Full session replay
Identity stitching
Ignoring CMP signals
Impact: The tracking snippet must load before consent to capture the IP address during the HTTP handshake, creating a structural tension with consent-first requirements under ePrivacy and GDPR.
Device identification
PII deanonymization
Container/loader (neutral)
IOC Manifest
Indicators of compromise across 4 categories. Use for detection rules, CSP policies, or Pi-hole blocklists.
Ecosystem & Supply Chain
Evidence Artifacts
Artifacts collected during analysis, available with evidence-tier access.
Complete network capture with all requests and responses
137 detection signatures across scripts, domains, cookies, and network endpoints