Microsoft will not be held liable for things they designed to ensure happen yet again.
It is total insanity to have an email account use the same login to thing unrelated to email and then train the used to need to login to that account 5 times a day, with login regularly failing too.
The result is that when the used receives an email about a "secure document" from a trusted customer (that is used by Microsoft and thus had their email hijacked a day or so before) and they see another microsoft login prompt, they automatically enter the stupid account details and then "document access" proceeds to "fail", as it regularly does, they don't think twice about it beyond sending an email back about not being able to access the file and carry on.
The process continues with all the customers of that business - many of the customers that are businesses that are used by Microsoft then have their email hijacked as well.
The only hope such businesses have is that the attackers are mostly incompetent and are doing everything via LLM prompt and seem to only have the goal of continued hijacking and sending out invoices with their bank details for profit - thus revoking all the login tokens and setting a new password ends the attack (although much worse things can be done if a prompt to save all the emails to disk is worked out, as a lot of passwords to bank accounts etc do get sent via email).
Businesses that aren't totally incompetent and don't use outlook or other Microsoft software and instead have normal email and have a SMTP+IMAP username/password that is inserted into the email client by the admin (which will never be logged out or reset unless the device is compromised, as there is no reason to reset the password otherwise), will never have that problem by design.