How This Briefing Works
This report opens with key findings, then maps the gaps between what Moloco discloses and what BLACKOUT observed at runtime. From there: what it means for your organization, what to do about it, and the detection data and evidence underneath.
Key Findings
Claims vs. Observed Behavior
pending
“Requires claims extraction via CDT”
Live website analysis pending
What This Means For You
What To Do About It
Role-specific actions based on observed behavior
If You Use Moloco
- →Conversion API implementation to control data shared with Moloco platform
- →Server-side event forwarding to minimize client-side tracking footprint
- →Audience exclusion lists to prevent targeting of your first-party visitors
If You're Evaluating Moloco
- →Privacy Sandbox compatibility signals for future tracking evolution
- →First-party data clean room integration to limit raw data exposure
- →Alternative DSPs with transparent attribution and minimal client-side tracking
Negotiation Leverage
- →Request contractual limits on using your conversion data to train Moloco's ML models or enrich network-wide targeting
- →Demand transparency into downstream data sharing with publishers and SSP partners in their bidding ecosystem
- →Negotiate data residency commitments and explicit controls over cross-border data movement within Moloco infrastructure
Runtime Detections
BLACKOUT observed this vendor's JavaScript executing in a live browser and classified each hostile behavior using our BTI-C (Behavioral Threat Intelligence — Capability) taxonomy. These are not theoretical risks — each code below was triggered by something we watched this vendor's code actually do.
Identity stitching
Impact: Synchronizes user identity across advertiser properties and publisher inventory to enable cross-site targeting and attribution
Long-lived identifiers
Impact: Deploys aggressive storage persistence to maintain user tracking across privacy actions and browser sessions
IOC Manifest
Indicators of compromise across 2 categories. Use for detection rules, CSP policies, or Pi-hole blocklists.
No indicators in this category
Ecosystem & Supply Chain
Evidence Artifacts
Artifacts collected during analysis, available with evidence-tier access.
Complete network capture with all requests and responses
8 detection signatures across scripts, domains, cookies, and network endpoints