All Vendors
fraud_detection

Zenrows

Zenrows operates fraud detection and web scraping infrastructure while deploying defeat devices, behavioral biometrics, session recording, cross-domain sync, consent bypass, fingerprinting, persistence, and tag manager capabilities across customer websites. The platform positions itself as anti-bot solution while enabling comprehensive visitor surveillance that extends well beyond stated fraud prevention functionality.

80 IOCs28 detections93% pre-consent26 sites
80
Vendor Risk Score

How This Briefing Works

This report opens with key findings, then maps the gaps between what Zenrows discloses and what BLACKOUT observed at runtime. From there: what it means for your organization, what to do about it, and the detection data and evidence underneath.

Key Findings

Key Findings

28 detections across 26 sites93% pre-consent activity
CRITICAL

Pre-Consent Activity

Zenrows was observed loading and executing before user consent was obtained on 93% of sites where it was detected.

GDPRePrivacy
Disclosure Gaps

Claims vs. Observed Behavior

1 gaps

pending

UNKNOWN
They Claim

Requires claims extraction via CDT

Observed Behavior

Defeat device, behavioral biometrics, session recording, cross-domain sync, consent bypass, fingerprinting, persistence, and tag manager detected in runtime

Customer Impact

What This Means For You

Marketing teams lose conversion attribution when security challenges filter behavioral signals. Analytics teams face measurement distortion from fraud detection layer interference. Legal teams inherit maximum liability exposure when anti-bot platform deploys comprehensive surveillance. Revenue operations teams subsidize complete competitor intelligence through shared fraud monitoring infrastructure.
Recommended Actions

What To Do About It

Role-specific actions based on observed behavior

If You Use Zenrows

  • Audit defeat device deployment within fraud detection infrastructure
  • Review session recording retention for security challenge workflows
  • Verify cross-domain sync scope for fraud detection continuity
  • Audit tag manager capabilities for third-party script injection risk
  • Verify fingerprinting scope does not exceed fraud prevention requirements
  • Require consent collection before Zenrows surveillance initialization

If You're Evaluating Zenrows

  • Fraud detection solutions without embedded visitor surveillance
  • Privacy-respecting anti-bot platforms limiting tracking scope
  • Self-hosted security workflows eliminating cross-customer intelligence leakage

Negotiation Leverage

  • Challenge defeat device mechanisms within anti-bot infrastructure
  • Require disclosure of all surveillance capabilities beyond fraud detection
  • Demand opt-out from cross-customer fraud pattern analysis
  • Request data processing agreement amendments addressing visitor tracking through security layer
  • Audit tag management capabilities for third-party data sharing risk
  • Negotiate liability indemnification for maximum tracking deployed through fraud detection infrastructure
Runtime Detections

Runtime Detections

8 BTI-C CODES

BLACKOUT observed this vendor's JavaScript executing in a live browser and classified each hostile behavior using our BTI-C (Behavioral Threat Intelligence — Capability) taxonomy. These are not theoretical risks — each code below was triggered by something we watched this vendor's code actually do.

BTI-C01Defeat Device

Evasion infrastructure, auditor bypass

Impact: Detection evasion mechanisms obscure surveillance deployment within anti-bot infrastructure.

BTI-C06Behavioral Biometrics

Keystroke/mouse tracking

Impact: Interaction patterns captured to distinguish human from bot behavior and enhance fraud detection models.

BTI-C07Session Recording

Full session replay

Impact: Security challenge sessions captured in full fidelity, exposing how visitors navigate bot detection and revealing fraud trigger patterns.

BTI-C08Cross-Domain Sync

Identity stitching

Impact: Fraud detection synchronized across organizational properties and external security touchpoints.

BTI-C09Consent Bypass

Ignoring CMP signals

Impact: Tracking mechanisms active within security layer before visitor consent collection completes.

BTI-C10Fingerprinting

Device identification

Impact: Comprehensive device characteristics harvested for fraud detection persistence and bot identification.

BTI-C13Persistence Mechanisms

Long-lived identifiers

Impact: Long-lived tracking identifiers maintain fraud detection history beyond reasonable security timeframes.

BTI-C15Tag Manager

Container/loader (neutral)

Impact: Tag management capabilities enable dynamic third-party script injection through security infrastructure.

IOC Manifest

IOC Manifest

70 INDICATORS

Indicators of compromise across 4 categories. Use for detection rules, CSP policies, or Pi-hole blocklists.

TRACK
*cdn.zenrows.com/js/manifest.*.js*
Tracking script
TRACK
*cdn.zenrows.com/js/vendor.*.js*
Tracking script
TRACK
*cdn.zenrows.com/js/public.*.js*
Tracking script
EXFIL
*ssdata.zenrows.com/rsr8x8ttie5mpt1.js*
Data collection endpoint
TRACK
*cdn.zenrows.com/axios.*.js*
Tracking script
TRACK
*cdn.zenrows.com/scraper-preview-component.*.js*
Tracking script
TRACK
*cdn.zenrows.com/js/vendor-vue.*.js*
Tracking script
TRACK
*www.zenrows.com/cdn-cgi/challenge-platform/scripts/jsd/main.js*
Tracking script
TRACK
*cdn.zenrows.com/hljs.*.js*
Tracking script
TRACK
*www.zenrows.com/cdn-cgi/challenge-platform/h/b/scripts/jsd/*/main.js*
Tracking script
EXFIL
*ssdata.zenrows.com/mzidd11a6g7nxto.js*
Data collection endpoint
TRACK
cdn.zenrows.com/js/manifest.f1e2ddbe.js
Auto-extracted from scan
TRACK
cdn.zenrows.com/js/vendor.ac22839a.js
Auto-extracted from scan
TRACK
cdn.zenrows.com/js/public.dab91d0d.js
Auto-extracted from scan
EXFIL
ssdata.zenrows.com/rsr8x8ttie5mpt1.js
Auto-extracted from scan
EXFIL
ssdata.zenrows.com/mzidd11a6g7nxto.js
Auto-extracted from scan
TRACK
cdn.zenrows.com/js/vendor-vue.d3db57b1.js
Auto-extracted from scan
TRACK
cdn.zenrows.com/scraper-preview-component.d503dff4.js
Auto-extracted from scan
TRACK
cdn.zenrows.com/axios.366874db.js
Auto-extracted from scan
TRACK
cdn.zenrows.com/hljs.0462805c.js
Auto-extracted from scan
TRACK
www.zenrows.com/cdn-cgi/challenge-platform/scripts/jsd/main.js
Auto-extracted from scan
TRACK
www.zenrows.com/cdn-cgi/challenge-platform/h/b/scripts/jsd/d251aa49a8a3/main.js
Auto-extracted from scan
Ecosystem

Ecosystem & Supply Chain

Zenrows embeds within customer security workflows, creates measurement interference through fraud detection layer positioning, and establishes cross-customer monitoring channels observing anti-bot strategies and security friction patterns across shared customer base.
Evidence

Evidence Artifacts

Artifacts collected during analysis, available with evidence-tier access.

HAR Capture

Complete network capture with all requests and responses

IOC Manifest

80 detection signatures across scripts, domains, cookies, and network endpoints

Vendor Details