All Vendors
data_enrichment

Peopledatalabs

People Data Labs fires 100% pre-consent with identity resolution and cross-domain sync — a data broker with a 1.2 billion record breach history now running behavioral surveillance on your visitors before they can opt out.

134 IOCs1 detections100% pre-consent1 sites
90
Vendor Risk Score

How This Briefing Works

This report opens with key findings, then maps the gaps between what Peopledatalabs discloses and what BLACKOUT observed at runtime. From there: what it means for your organization, what to do about it, and the detection data and evidence underneath.

Key Findings

Key Findings

1 detection across 1 site100% pre-consent activity
CRITICAL

Pre-Consent Activity

Peopledatalabs was observed loading and executing before user consent was obtained on 100% of sites where it was detected.

GDPRePrivacy
HIGH

Pending Analysis

7 BTI behavioral codes detected across 1 detection on 1 site. Full claims extraction required for gap analysis.

Disclosure Gaps

Claims vs. Observed Behavior

1 gaps
1 HIGH

Pending Analysis

HIGH
They Claim

Claims analysis pending

Observed Behavior

7 BTI behavioral codes detected across 1 detection on 1 site. Full claims extraction required for gap analysis.

Customer Impact

What This Means For You

If People Data Labs JavaScript is running on your site, your anonymous visitors are being identified and matched against a commercial database of over 1.5 billion profiles — at a 100% pre-consent rate. You are effectively operating a data collection endpoint for a data broker on your own property. Under CCPA, you may be classified as 'selling' personal information by enabling this data flow, triggering Do Not Sell obligations you may not be fulfilling. Under GDPR, enabling a data broker to perform identity resolution on your visitors without explicit consent and transparent disclosure is a fundamental processing violation. The 2019 breach history means your visitors' data enters an infrastructure with demonstrated security failures.
Recommended Actions

What To Do About It

Role-specific actions based on observed behavior

If You Use Peopledatalabs

  • Immediately audit whether People Data Labs JavaScript is intentionally deployed or was introduced via a tag manager without review
  • Verify whether your privacy notice discloses data broker enrichment as a processing activity
  • Check your CCPA compliance: enabling People Data Labs' identity resolution may constitute a 'sale' of personal information requiring Do Not Sell mechanisms
  • Review your vendor risk assessment for People Data Labs — ensure the 2019 breach is reflected in your risk scoring

If You're Evaluating Peopledatalabs

  • Assess whether the business value of People Data Labs' enrichment justifies the regulatory exposure of running their JavaScript on-site
  • Request People Data Labs' SOC 2 report and breach remediation documentation post-2019 incident
  • Evaluate server-side enrichment alternatives that do not require deploying data broker JavaScript on your customer-facing properties
  • Consider whether your organization's brand risk tolerance includes being associated with a data broker that exposed 1.2 billion records

Negotiation Leverage

  • 100% pre-consent firing rate on a data broker — every visitor is captured before consent, creating indefensible regulatory exposure
  • People Data Labs' 2019 breach exposed 1.2 billion records — demand current security audit results and breach notification procedures
  • Identity resolution (C14) is their core product: your visitors are being deanonymized and added to a commercial database sold to third parties
  • Under CCPA, enabling this data flow may classify your organization as selling personal information — verify Do Not Sell compliance
  • Demand contractual prohibition on using data collected from your properties to enrich profiles sold to your competitors
Runtime Detections

Runtime Detections

7 BTI-C CODES

BLACKOUT observed this vendor's JavaScript executing in a live browser and classified each hostile behavior using our BTI-C (Behavioral Threat Intelligence — Capability) taxonomy. These are not theoretical risks — each code below was triggered by something we watched this vendor's code actually do.

BTI-C01Defeat Device

Evasion infrastructure, auditor bypass

Impact: People Data Labs deploys evasion infrastructure that may behave differently during compliance testing, making it difficult to verify the full scope of data collection during audits.

BTI-C06Behavioral Biometrics

Keystroke/mouse tracking

Impact: A data broker collecting behavioral biometric patterns from your visitors creates enrichment data that enhances their commercial profiles — your visitors' interaction patterns become a sellable data product.

BTI-C07Session Recording

Full session replay

Impact: Session replay capability on a data enrichment platform means People Data Labs can observe exactly how your visitors interact with your site, adding behavioral context to their identity profiles.

BTI-C08Cross-Domain Sync

Identity stitching

Impact: Cross-domain identity stitching is core to People Data Labs' business. Every site running their JavaScript contributes to a cross-site identity graph that powers their commercial data products.

BTI-C09Consent Bypass

Ignoring CMP signals

Impact: 100% pre-consent firing rate means every visitor to your site has their data captured by a data broker before any consent mechanism can intervene. This is indefensible under any privacy framework.

BTI-C10Fingerprinting

Device identification

Impact: Device fingerprinting by a data broker creates persistent identifiers that feed their enrichment pipeline. Your visitors are fingerprinted and added to People Data Labs' commercial database without consent.

BTI-C14Identity Resolution

PII deanonymization

Impact: PII deanonymization is People Data Labs' core product. Their on-site JavaScript identifies your anonymous visitors and matches them to their database of billions of personal records — this is not a side effect, it is the primary function.

IOC Manifest

IOC Manifest

109 INDICATORS

Indicators of compromise across 4 categories. Use for detection rules, CSP policies, or Pi-hole blocklists.

EXFIL
*www.peopledatalabs.com/_next/static/chunks/*.js*
Data collection endpoint
EXFIL
*www.peopledatalabs.com/_next/static/chunks/turbopack-*.js*
Data collection endpoint
EXFIL
*www.peopledatalabs.com/_vercel/speed-insights/script.js*
Data collection endpoint
EXFIL
*www.peopledatalabs.com/_vercel/insights/script.js*
Data collection endpoint
EXFIL
*status.peopledatalabs.com/api/v2/status.json*
Data collection endpoint
EXFIL
www.peopledatalabs.com/_next/static/chunks/925c06fa586c0def.js
Auto-extracted from scan
EXFIL
www.peopledatalabs.com/_next/static/chunks/f494480f4e83bbf5.js
Auto-extracted from scan
EXFIL
www.peopledatalabs.com/_next/static/chunks/605cd0be4f752193.js
Auto-extracted from scan
EXFIL
www.peopledatalabs.com/_next/static/chunks/9a89dd0f67b0e675.js
Auto-extracted from scan
EXFIL
www.peopledatalabs.com/_next/static/chunks/b31573c916ec3d3b.js
Auto-extracted from scan
EXFIL
www.peopledatalabs.com/_next/static/chunks/turbopack-22508be52c24d9ff.js
Auto-extracted from scan
EXFIL
www.peopledatalabs.com/_next/static/chunks/0ee0c34507affa0c.js
Auto-extracted from scan
EXFIL
www.peopledatalabs.com/_next/static/chunks/fc79ca973cb6b571.js
Auto-extracted from scan
EXFIL
www.peopledatalabs.com/_next/static/chunks/d51f155ce718dd0f.js
Auto-extracted from scan
EXFIL
www.peopledatalabs.com/_next/static/chunks/d20b4a0da73ccb7e.js
Auto-extracted from scan
EXFIL
www.peopledatalabs.com/_next/static/chunks/c731be8ee4328bb6.js
Auto-extracted from scan
EXFIL
www.peopledatalabs.com/_next/static/chunks/5af2ea7463f19359.js
Auto-extracted from scan
EXFIL
www.peopledatalabs.com/_next/static/chunks/66922e96129b9af8.js
Auto-extracted from scan
EXFIL
www.peopledatalabs.com/_next/static/chunks/eee4b0f979e0a28c.js
Auto-extracted from scan
EXFIL
www.peopledatalabs.com/_next/static/chunks/de6a67c534b03494.js
Auto-extracted from scan
EXFIL
www.peopledatalabs.com/_next/static/chunks/7d4976ca47b3d1c4.js
Auto-extracted from scan
EXFIL
www.peopledatalabs.com/_next/static/chunks/6abd9a6b8776baba.js
Auto-extracted from scan
EXFIL
www.peopledatalabs.com/_next/static/chunks/bb0de69d863b810a.js
Auto-extracted from scan
EXFIL
www.peopledatalabs.com/_next/static/chunks/64b4ceee5ce1d6e2.js
Auto-extracted from scan
EXFIL
www.peopledatalabs.com/_next/static/chunks/e2223129386b2c54.js
Auto-extracted from scan
EXFIL
www.peopledatalabs.com/_next/static/chunks/4a949b946b034704.js
Auto-extracted from scan
EXFIL
www.peopledatalabs.com/_next/static/chunks/8080d10d3eeb9ac4.js
Auto-extracted from scan
EXFIL
www.peopledatalabs.com/_next/static/chunks/a47d9d12cd7af806.js
Auto-extracted from scan
EXFIL
www.peopledatalabs.com/_next/static/chunks/832a0981e824995f.js
Auto-extracted from scan
EXFIL
www.peopledatalabs.com/_vercel/insights/script.js
Auto-extracted from scan
EXFIL
www.peopledatalabs.com/_vercel/speed-insights/script.js
Auto-extracted from scan
EXFIL
www.peopledatalabs.com/_next/static/chunks/565639235fae301f.js
Auto-extracted from scan
EXFIL
www.peopledatalabs.com/_next/static/chunks/5e39ad3f7d5fda70.js
Auto-extracted from scan
EXFIL
www.peopledatalabs.com/_next/static/chunks/67f3b81c001a68ce.js
Auto-extracted from scan
EXFIL
www.peopledatalabs.com/_next/static/chunks/9640074faa1d8842.js
Auto-extracted from scan
EXFIL
www.peopledatalabs.com/_next/static/chunks/3a119315eba87019.js
Auto-extracted from scan
Ecosystem

Ecosystem & Supply Chain

People Data Labs operates as a B2B data broker, competing with ZoomInfo, Clearbit, and Apollo in the data enrichment space. They claim a dataset of over 1.5 billion unique person profiles aggregated from public records, social media, and commercial data sources. In 2019, a server containing 1.2 billion People Data Labs records was found exposed on an unsecured Elasticsearch instance — one of the largest data exposures in history. People Data Labs integrates with CRM platforms, sales engagement tools, and marketing automation systems, serving as a data supply layer for revenue operations teams.
Evidence

Evidence Artifacts

Artifacts collected during analysis, available with evidence-tier access.

HAR Capture

Complete network capture with all requests and responses

IOC Manifest

134 detection signatures across scripts, domains, cookies, and network endpoints

Vendor Details