Differences between EntraID User Phone and MFA auth. number

how easy

How easy is to identify a «malicious» phone of an attacker configured as MFA on user authentication?
I have seen multiple queries that can help such as identify by country code, suspicious format-number and others.

Although are good ones, I have not seen these option as a final one due to the amount of false positives. Therefore, with my fresh head after holidays, I decided to create a query to detect differences between the phone provider in the EntraID user profile and the phone used to authenticate via MFA.

Of course, it has an important requirement which is have your EntraID updated with the Phone field filled. However, the result of that effort, I think make sense not just for the security aspect, if not also to detect cases where the EntraID User profile is not updated with it current Phone number.