New Haven lost $6M.
The fraud was inside.
Hackers compromised the COO's email account and silently redirected six wire transfers. SPF, DKIM, DMARC all passed. Traditional email security saw nothing wrong. The sender was real. The suss. API scores the pattern, not the envelope, at 90% risk.
This is business email compromise at its most effective. There is no spoofed domain to detect. The attacker was reading every email in the COO's inbox.
The attack.
Hackers gain access to the COO's email account
Attackers compromise a legitimate internal email account, giving them full access to vendor conversations and payment workflows.
Weeks of silent monitoring
The attackers read vendor invoices, learn payment schedules, and study how the district communicates about wire transfers. They never send a single email during this period.
Six fraudulent wire transfers executed
Impersonating both the COO and vendors like First Student, the attackers redirect payments to accounts they control. The largest single transfer was $5.9M.
What suss.
would have seen.
We ran a reconstructed version of this attack through the production API. Here's what fired.
- 01Do not process this wire transfer.
- 02Call First Student at their verified number, not the one in this email thread.
- 03Verify the bank account change through a separate, known communication channel.
- 04Alert IT security. The COO's email account may be compromised.
- 05If any payments were already sent, contact the bank immediately to initiate a wire recall.
- 06Preserve all emails in this thread as evidence for law enforcement.
The cost.
Why K-12 districts are perfect BEC targets.
Large vendor payment flows
Transportation, food service, construction, and IT contracts involve millions in wire transfers that AP staff process routinely.
Underfunded IT security
School district IT budgets prioritize student systems and infrastructure. Dedicated email security teams are rare.
Predictable payment schedules
Bus contracts, cafeteria suppliers, and facility vendors follow seasonal cycles that attackers can study and exploit.
High trust, low verification
Small finance teams process payments from familiar vendors with minimal multi-party verification.
Two timelines.
Two outcomes.
- 01Hacker compromises COO email. No alert.
- 02Weeks of monitoring vendor conversations.
- 03Fraudulent wire instructions sent from the real account.
- 04SPF, DKIM, DMARC all pass. Email looks legitimate.
- 05Six transfers processed over weeks.
- 06$6M stolen. $2.4M lost permanently.
- 01Wire request email forwarded to suss. for analysis.
- 02API detects 6 BEC indicators in under 1 second.
- 0390% HIGH RISK verdict returned instantly.
- 04Staff calls First Student directly. Confirms fraud.
- 05First transfer blocked before funds leave.
- 06$6M saved. IT investigates the compromised account.
Don't be the
next case study.
Book a 15-minute pilot conversation. We'll show you the threats targeting your institution right now and walk through deployment.
Free 30-day pilot for qualified institutions. No IT integration required.