How This Briefing Works
This report opens with key findings, then maps the gaps between what Optimove discloses and what BLACKOUT observed at runtime. From there: what it means for your organization, what to do about it, and the detection data and evidence underneath.
Key Findings
Analysis pending. Findings will appear here once intelligence collection is complete.
Claims vs. Observed Behavior
data_collection
“Does not collect customer-identifying demographic data”
Behavioral profiling depth creates detailed individual dossiers regardless of demographic labels; CDP centralizes data from multiple sources into unified profiles
compliance
“GDPR compliant with SOC 2 Type-II and ISO 27001”
CNIL imposed 1M euro fine in December 2025 for GDPR processor violations including unauthorized retention, unauthorized processing, and missing Records of Processing Activities
data_breach
“Protects sensitive information and manages consent”
46.9 million user breach via Deezer engagement; unauthorized data copies persisted nearly a year post-notification and were sold on darknet
pending
“Awaiting scanner verification”
Runtime behavior analysis pending to confirm OptiTrack cookie deployment timing, Web SDK data transmission patterns, and consent gate implementation
What This Means For You
What To Do About It
Role-specific actions based on observed behavior
Recommended Actions for Optimove
- →- Review your Data Processing Agreement with Optimove in light of the December 2025 CNIL enforcement action and verify that processor obligations address the specific violations found (retention, scope, recordkeeping). - Audit OptiTrack cookie deployment and Web SDK initialization to confirm consent is collected before behavioral tracking begins on your properties. - Request confirmation from Optimove on data retention periods, sub-processor list, and Records of Processing Activities status post-CNIL remediation. - Evaluate controller liability exposure: as a data controller engaging Optimove as processor, the CNIL precedent establishes that Optimove has documented processor compliance failures. - Assess whether Optimove predictive model outputs (churn scores, lifetime value predictions) constitute profiling under GDPR Article 22 and whether your privacy notice adequately discloses automated decision-making.
Negotiation Leverage
- →Optimove's negotiation position is critically weakened by the December 2025 CNIL 1 million euro fine for GDPR processor violations and the associated 46.9 million user data breach. This is the strongest leverage point available: Optimove has a documented regulatory finding of unauthorized data retention, unauthorized processing beyond contracted purposes, and failure to maintain Records of Processing Activities. In contract negotiations, demand: enhanced DPA terms that specifically address the CNIL-identified violations, contractual indemnification for controller liability arising from processor non-compliance, independent audit rights beyond standard SOC 2 certification, mandatory breach notification SLAs with defined remediation timelines (the Deezer case revealed nearly a year-long delay in unauthorized data deletion), and explicit restrictions on predictive model training using your customer behavioral data. The CNIL decision is public record and creates negotiation leverage that Optimove cannot dispute.
Runtime Detections
BLACKOUT observed this vendor's JavaScript executing in a live browser and classified each hostile behavior using our BTI-C (Behavioral Threat Intelligence — Capability) taxonomy. These are not theoretical risks — each code below was triggered by something we watched this vendor's code actually do.
Keystroke/mouse tracking
Full session replay
Identity stitching
IOC Manifest
Indicators of compromise across 3 categories. Use for detection rules, CSP policies, or Pi-hole blocklists.
Ecosystem & Supply Chain
Evidence Artifacts
Artifacts collected during analysis, available with evidence-tier access.
Complete network capture with all requests and responses
69 detection signatures across scripts, domains, cookies, and network endpoints