Skip to content

Commit b9a4329

Browse files
committed
acrolinx fixes
1 parent a6e6419 commit b9a4329

File tree

1 file changed

+5
-5
lines changed

1 file changed

+5
-5
lines changed

articles/active-directory/authentication/concept-mfa-regional-opt-in.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -17,21 +17,21 @@ ms.collection: M365-identity-device-management
1717
---
1818
# Regions that need to opt in for MFA telephony verification
1919

20-
As a protection for our customers, Microsoft does not automatically support telephony verification for certain region codes. If you want to receive traffic from phone numbers with these region codes, your administrator must submit a support ticket and request to opt in.
20+
As a protection for our customers, Microsoft doesn't automatically support telephony verification for certain region codes. If you want to receive traffic from phone numbers with these region codes, your administrator must submit a support ticket and request to opt in.
2121

2222
## Why this protection is needed
2323

24-
In today’s digital world, telecommunication services have become ingrained into our lives. With advancements comes the risk of fraudulent activities. International Revenue Share Fraud (IRSF) is a threat that can have severe financial implications, while also making it difficult for customers to use cloud-based services. Let's look at IRSF fraud more in-depth.
24+
In today’s digital world, telecommunication services have become ingrained into our lives. But advancements come with a risk of fraudulent activities. International Revenue Share Fraud (IRSF) is a threat with severe financial implications that also makes using services more difucult. Let's look at IRSF fraud more in-depth.
2525

2626
IRSF is a type of telephony fraud where criminals exploit the billing system of telecommunication services providers to make profit for themselves. Bad actors gain unauthorized access to a telecommunication network and divert traffic to those networks to skim profit for every transaction that is sent to that network. To divert traffic, bad actors steal existing usernames and passwords, create new usernames and passwords, or try a host of other things to send SMS messages and voice calls through their telecommunication network. Bad actors do this by taking advantage of multifactor authentication screens, which require an SMS or voice call before a user can access their account. This activity causes exorbitant charges and makes services unreliable for our customers, causing downtime, and system errors.
2727

28-
Here is how an IRSF attack may happen:
28+
Here's how an IRSF attack may happen:
2929

3030
1. A bad actor first gets premium rate phone numbers and registers them.
3131
1. A bad actor uses automated scripts to request voice calls or SMS messages. The bad actor is colluding with number providers and the telecommunication network to drive more traffic to those services and will skim some of the profits of the increased traffic.
3232
1. A bad actor will hop around different region codes to continue to drive traffic and make it hard for them to get caught.
3333

34-
The most common way to conduct an IRSF attack is through some end-user experience that requires a two-factor authentication code. Bad actors add those premium rate phone numbers and pump traffic to them by requesting two-factor authentication codes. This results in revenue-skimming, and over the years has led to $10 billion dollars of loss.
34+
The most common way to conduct an IRSF attack is through some end-user experience that requires a two-factor authentication code. Bad actors add those premium rate phone numbers and pump traffic to them by requesting two-factor authentication codes. This results in revenue-skimming, and has led to a $10-billion dollar loss.
3535

3636
IRSF fraud poses a significant threat to online businesses and can result in substantial financial losses and reputational damage. By understanding IRSF, one becomes more aware of the problem and can engage in implementing preventive measures such as regional restrictions, rate limiting, and phone number verification.
3737

@@ -44,7 +44,7 @@ For SMS verification, the following region codes require an opt-in.
4444
| 222 | Mauritania |
4545
| 998 | Uzbek |
4646

47-
### Voice verifcation
47+
### Voice verification
4848
For Voice verification, the following region codes require an opt-in.
4949

5050
| Region Code | Region Name |

0 commit comments

Comments
 (0)