All Vendors
data_enrichment

Theirstack

Theirstack operates as a data enrichment platform with significant signal corruption and competitive intelligence risks. Pre-consent activation and behavioral tracking create legal exposure. The 90% CAC subsidization score reflects visitor behavioral data feeding competitor enrichment databases that enable targeted outreach.

4821 IOCs1 detections100% pre-consent1 sites
80
Vendor Risk Score

How This Briefing Works

This report opens with key findings, then maps the gaps between what Theirstack discloses and what BLACKOUT observed at runtime. From there: what it means for your organization, what to do about it, and the detection data and evidence underneath.

Key Findings

Key Findings

1 detection across 1 site100% pre-consent activity
CRITICAL

Pre-Consent Activity

Theirstack was observed loading and executing before user consent was obtained on 100% of sites where it was detected.

GDPRePrivacy
Disclosure Gaps

Claims vs. Observed Behavior

1 gaps

pending

UNKNOWN
They Claim

Requires claims extraction via CDT

Observed Behavior

Runtime evidence confirms C01/C06/C07/C09/C10 activation

Customer Impact

What This Means For You

Marketing spend trains competitor prospecting databases. Visitor behavioral data enriches competitor intelligence on which companies visit your site, what content they engage with, and when buying intent appears. Legal holds 100% exposure risk from consent bypass and fingerprinting. Enriched profiles accessible to competitors via data marketplace.
Recommended Actions

What To Do About It

Role-specific actions based on observed behavior

If You Use Theirstack

  • Immediate removal from data enrichment stack
  • Legal review of enrichment data sharing agreements
  • Audit CRM integrations for Theirstack data imports
  • Notify DPO of consent bypass behavior

If You're Evaluating Theirstack

  • First-party firmographic enrichment alternatives
  • Self-hosted visitor identification without data sharing
  • Consent-compliant company intelligence tools

Negotiation Leverage

  • Theirstack creates legal liability through consent bypass and behavioral tracking
  • 90% CAC subsidization funds competitor prospecting databases
  • Visitor enrichment data accessible to competitors via marketplace
  • Removal required before next privacy audit
  • No contractual limits prevent competitor access to enriched profiles
Runtime Detections

Runtime Detections

5 BTI-C CODES

BLACKOUT observed this vendor's JavaScript executing in a live browser and classified each hostile behavior using our BTI-C (Behavioral Threat Intelligence — Capability) taxonomy. These are not theoretical risks — each code below was triggered by something we watched this vendor's code actually do.

BTI-C01Defeat Device

Evasion infrastructure, auditor bypass

Impact: Bypasses consent controls to capture data regardless of user preferences

BTI-C06Behavioral Biometrics

Keystroke/mouse tracking

Impact: Captures unique behavioral patterns for identity resolution

BTI-C07Session Recording

Full session replay

Impact: Records visitor sessions for behavioral profiling

BTI-C09Consent Bypass

Ignoring CMP signals

Impact: Activates before consent mechanisms, defeating privacy controls

BTI-C10Fingerprinting

Device identification

Impact: Creates persistent visitor profiles for enrichment databases

IOC Manifest

IOC Manifest

4810 INDICATORS

Indicators of compromise across 3 categories. Use for detection rules, CSP policies, or Pi-hole blocklists.

TRACK
*theirstack.com/_next/static/chunks/*.js*
Tracking script
TRACK
*theirstack.com/_next/static/chunks/turbopack-*.js*
Tracking script
TRACK
*theirstack.com/_vercel/insights/script.js*
Tracking script
TRACK
*theirstack.com/_vercel/speed-insights/script.js*
Tracking script
TRACK
theirstack.com/_next/static/chunks/624f2ec5ad9eedd1.js
Auto-extracted from scan
TRACK
theirstack.com/_next/static/chunks/cf3b35ce42b77e22.js
Auto-extracted from scan
TRACK
theirstack.com/_next/static/chunks/b376272fb7be3862.js
Auto-extracted from scan
TRACK
theirstack.com/_next/static/chunks/b7c0a3e088e02e68.js
Auto-extracted from scan
TRACK
theirstack.com/_next/static/chunks/aad4f00e7c047859.js
Auto-extracted from scan
TRACK
theirstack.com/_next/static/chunks/turbopack-0f0d30445ce94a42.js
Auto-extracted from scan
TRACK
theirstack.com/_next/static/chunks/8aeeb80b0a5db31c.js
Auto-extracted from scan
TRACK
theirstack.com/_next/static/chunks/ebe94f77d09738d4.js
Auto-extracted from scan
TRACK
theirstack.com/_next/static/chunks/2856384632315b56.js
Auto-extracted from scan
TRACK
theirstack.com/_next/static/chunks/4e474750a6cb7c87.js
Auto-extracted from scan
TRACK
theirstack.com/_next/static/chunks/4236febfbdbfe2a8.js
Auto-extracted from scan
TRACK
theirstack.com/_next/static/chunks/c4c19d90e8e42207.js
Auto-extracted from scan
TRACK
theirstack.com/_next/static/chunks/9eed01afc7e61b7b.js
Auto-extracted from scan
TRACK
theirstack.com/_next/static/chunks/300a8ef341bad9f8.js
Auto-extracted from scan
TRACK
theirstack.com/_next/static/chunks/1a52cf8a55e517f7.js
Auto-extracted from scan
TRACK
theirstack.com/_next/static/chunks/a841f541adce9784.js
Auto-extracted from scan
TRACK
theirstack.com/_next/static/chunks/6678759cb2a9f2df.js
Auto-extracted from scan
TRACK
theirstack.com/_vercel/speed-insights/script.js
Auto-extracted from scan
TRACK
theirstack.com/_vercel/insights/script.js
Auto-extracted from scan
TRACK
theirstack.com/_next/static/chunks/646e0a8a88a226bf.js
Auto-extracted from scan
TRACK
theirstack.com/_next/static/chunks/577de4193377348b.js
Auto-extracted from scan
TRACK
theirstack.com/_next/static/chunks/45f9b4b27224e632.js
Auto-extracted from scan
TRACK
theirstack.com/_next/static/chunks/382e5c7602aa5a50.js
Auto-extracted from scan
TRACK
theirstack.com/_next/static/chunks/502ffc1510773ab1.js
Auto-extracted from scan
TRACK
theirstack.com/_next/static/chunks/343b7a3e0d50dd9e.js
Auto-extracted from scan
TRACK
theirstack.com/_next/static/chunks/4f5140666f5b11ae.js
Auto-extracted from scan
TRACK
theirstack.com/_next/static/chunks/57dacd092286f765.js
Auto-extracted from scan
TRACK
theirstack.com/_next/static/chunks/20b7887a27413ab6.js
Auto-extracted from scan
TRACK
theirstack.com/_next/static/chunks/ebf2c082b069cf49.js
Auto-extracted from scan
TRACK
theirstack.com/_next/static/chunks/83993bd71f4f3e9f.js
Auto-extracted from scan
TRACK
theirstack.com/_next/static/chunks/94e4532314bbbeab.js
Auto-extracted from scan
TRACK
theirstack.com/_next/static/chunks/feadc2760e1e2532.js
Auto-extracted from scan
Ecosystem

Ecosystem & Supply Chain

Theirstack integrates with B2B data providers, CRM systems, and sales engagement platforms. Visitor behavioral data flows to enrichment databases where competitors purchase access to company intelligence and intent signals. Partnership with firmographic data providers enables cross-referencing of visitor behavior with company attributes.
Evidence

Evidence Artifacts

Artifacts collected during analysis, available with evidence-tier access.

HAR Capture

Complete network capture with all requests and responses

IOC Manifest

4821 detection signatures across scripts, domains, cookies, and network endpoints

Vendor Details