
Summary
This rule targets inbound messages that impersonate Elastic Alerts by using the sender noreply@alerts.elastic.co and contain extortion-related content detectable via natural language processing (NLP). When an inbound message is observed, the rule extracts the thread text (body.current_thread.text) and runs an ML-based NLP classifier (ml.nlu_classifier). If the classifier produces an intent named "extortion" with a confidence level above the defined threshold (i.e., not "low"), the rule raises an alert with medium severity. The detection combines two signals: (1) sender analysis to identify potential spoofing of the Elastic Alerts address, and (2) NLP-based intent classification to identify extortion-related content. The rule is categorized under attack type Extortion and maps to tactics such as Impersonation: Brand and Social engineering, with detection methods including Natural Language Understanding and Sender analysis. The rule is identified by the UUID c8d9c249-0894-5c17-8089-a4db7a02d9d9 and is stored at the specified file path. Considerations for applicability include reliance on the accuracy of the NLP classifier and the integrity of the sender metadata; legitimate alerts or benign messages containing extortion-like language may produce false positives, while sophisticated adversaries may attempt to evade NLP cues or spoofers. Operationally, this rule should be complemented with sender authentication checks (DKIM/ SPF/DMARC), rate limiting, and human review for high-risk cases. Potential improvements include multi-language support for NLP, contextual risk scoring (content, sender reputation, and message context), and correlation with other security signals (reported phishing, user reports, and historical sender behavior).
Categories
- Endpoint
- Web
- Application
Data Sources
- Application Log
- Process
- File
Created: 2026-05-22