New Haven lost $6M
while the fraud was inside
their own email.
suss. flags the pattern, not just the sender. Our API scored a reconstructed version of this attack at 90% risk with 6 threat indicators.
Hackers compromised the COO's email and silently redirected wire transfers for weeks. Traditional email security saw nothing wrong — the sender was real.
What happened
Sources: New Haven Independent, WTNH, StateScoop
The cost of no protection
Why this attack bypasses traditional email security
Every traditional email security tool says "this is safe." suss. looks at what the email is asking you to do — and that's where the fraud becomes visible.
How suss. catches it
We ran a reconstructed version of this attack through our production API. Here's what fired.
6 threat indicators fired
Why this works
suss. doesn't care who sent the email — it analyzes what the email is asking you to do. A legitimate COO would never embed wire routing numbers in an email body, pressure staff with a same-day deadline, and instruct them not to use known contact numbers. These behavioral patterns fire regardless of whether the sender is spoofed or compromised.
Recommended actions
- 1DO NOT process this wire transfer
- 2Call First Student at their verified number — not the one in this email thread
- 3Verify the bank account change through a separate, known communication channel
- 4Alert IT security — the COO's email account may be compromised
- 5If any payments were already sent, contact the bank immediately to initiate a wire recall
- 6Preserve all emails in this thread as evidence for law enforcement
Why school districts are prime targets
Purpose-built BEC detection
Account Takeover Patterns
Detects behavioral anomalies in compromised accounts: unusual payment requests, redirected conversations, and instructions that contradict established workflows.
Wire Transfer Fraud
Flags new beneficiaries, embedded routing numbers, bank account changes, and urgency pressure around high-value transfers.
Vendor Impersonation
Identifies fraudulent vendor communications including invoice manipulation, payment redirect requests, and forged approval chains.
Social Engineering Tactics
Recognizes manipulation patterns: artificial deadlines, authority invocation, isolation attempts, and instructions to bypass normal verification.
With suss. vs. without
Without suss.
- Hacker compromises COO email — no alert
- Weeks of monitoring vendor conversations
- Fraudulent wire instructions sent from real account
- SPF, DKIM, DMARC all pass — email looks legitimate
- Six transfers processed over weeks
- $6M stolen, $2.4M lost permanently
With suss.
- Wire request email forwarded to suss. for analysis
- AI detects 6 BEC indicators in under 1 second
- 90% HIGH RISK verdict returned instantly
- Staff calls First Student directly — confirms fraud
- First transfer blocked before funds leave
- $6M saved, IT investigates compromised account
How the pilot works
Start a free 30-day pilot
Zero IT integration. Forward suspicious emails, get instant AI verdicts. See exactly what threats are targeting your district.
If it happened in New Haven, it can happen in any district. 13,000+ U.S. school districts share the same attack surface.
Free for qualified school districts and government institutions