Johnson County Schools lost $3.36M
to a fake vendor email.
suss. caught it in the domain. A pearson.quest email impersonating Pearson Education triggered 85% risk before a single dollar moved.
Two wire transfers. $3.36 million gone. Only $742K recovered. Here's how a free pilot would have stopped it at the first email.
What happened
Sources: The Record (Recorded Future News), Insurance Journal
How suss. would have caught it
We ran a reconstructed version of this scam email through our production API. Here's what fired.
5 threat indicators fired
Recommended actions
- 1DO NOT process this wire transfer
- 2Verify the banking change by calling Pearson at their official number — not from this email
- 3Compare the sender domain (pearson.quest) against the real vendor domain (pearson.com)
- 4Forward to IT security and your district's fraud prevention team
- 5If payment was already sent, contact your bank immediately to initiate a wire recall
The cost of no protection
Why K-12 districts are prime targets
Purpose-built BEC detection
Domain Typosquatting
Compares sender domains against known vendors. Catches .quest, .info, .xyz, and other suspicious TLDs impersonating trusted brands.
Wire Transfer Fraud
Detects wire instructions embedded in email bodies, new routing numbers, and bank account change requests.
Vendor Impersonation
Identifies display name mismatches, sender domain age, and communication patterns inconsistent with known vendor relationships.
Urgency & Pressure Tactics
Flags artificial deadlines, service disruption threats, and escalation language designed to bypass verification procedures.
With suss. vs. without
Without suss.
- Email arrives from "Pearson Education" — looks legitimate
- Finance director sees display name, not the .quest domain
- First wire transfer of $1.68M processed
- Second wire transfer of $1.68M processed days later
- Fraud discovered after both payments clear
- $2.6M in public school funds permanently lost
With suss.
- Email arrives — suss. scans it automatically
- Domain typosquatting detected: pearson.quest vs pearson.com
- 85% HIGH RISK verdict returned in under 1 second
- Finance director calls Pearson at their real number
- Fraud confirmed — both wire transfers blocked
- $3.36M saved, zero disruption to students
How the pilot works
Start a free 30-day pilot
Zero IT integration required. The extension scans emails automatically and flags threats before payments are processed.
Built for K-12 districts — protect every finance team member from vendor impersonation.
Free for qualified school districts and government institutions