SOU lost $1.9M
to a fake contractor.
An attacker impersonated Andersen Construction, redirected a wire payment, and disappeared. The real contractor called three days later asking where their money was. The suss. API scores this exact attack at 89% risk.
Capital projects. Long vendor relationships. Public procurement records. Universities are uniquely exposed to this playbook. Here is what the engine sees.
The attack.
Contractor impersonation email
An attacker posed as Andersen Construction, the contractor building McNeal Pavilion, and sent an email requesting a banking change for upcoming payments.
$1.9 million wire transfer
The accounts payable team processed the payment to the fraudulent bank account. The real contractor called three days later asking about their missing payment.
3-day discovery delay
The fraud was only discovered when the real Andersen Construction contacted SOU about non-payment. By then, the funds had been moved through multiple accounts.
What suss.
would have seen.
We ran a reconstructed version of this attack through the production API. Here's what fired.
- 01Do not process this payment.
- 02Call the vendor at a known phone number, not one from this email.
- 03Verify the banking change through your vendor management system.
- 04Forward to IT security for investigation.
- 05If payment was sent, contact your bank immediately to initiate a recall.
The cost.
Why universities keep losing to this.
Capital construction projects
Multi-million dollar building projects involve large wire transfers to contractors. Perfect targets for payment redirection.
Long vendor relationships
AP teams trust established vendors. A single email claiming new banking details bypasses skepticism built on years of legitimate invoices.
Decentralized payment approval
Different departments handle their own vendor payments, creating inconsistent verification procedures across the institution.
Public procurement records
Construction contracts, vendor awards, and project timelines are public record. Attackers get everything they need to craft convincing impersonations.
Two timelines.
Two outcomes.
- 01Contractor banking change email arrives.
- 02AP team trusts the established vendor relationship.
- 03$1.9M wired to a fraudulent account.
- 04Real contractor calls 3 days later.
- 05Funds already moved through multiple accounts.
- 06$1.9M lost. Construction project delayed.
- 01Banking change email arrives. Staff forwards to suss.
- 02API detects 4 BEC indicators in seconds.
- 0389% HIGH RISK verdict returned.
- 04Staff calls Andersen Construction directly. Fraud confirmed.
- 05Payment blocked before it leaves.
- 06$1.9M saved. Project stays on schedule.
Don't be the
next case study.
Book a 15-minute pilot conversation. We'll show you the threats targeting your institution right now and walk through deployment.
Free 30-day pilot for qualified institutions. No IT integration required.