Max,
These issues at the moment are truly a 'numbers game', since the probability is actually quite low of hitting the correct match for any specific account, due to the differing random number generated for each that changes every 30 seconds, though I haven't done a deeper investigation to confirm the actual number of retries allowed for the Microsoft OTP, nor the other details mentioned in that thread, so I'm uncertain that it perfectly matches this situation.
However, since the methods being used are now typically spread across a large number of accounts, bots, etc., it's possible that some tiny percentage might actually match.
What I believe Microsoft is doing is targeting the future passwordless system using the passkeys developed by the FIDO Alliance, which since it requires both Biometric/PIN along with an authenticator app, is likely the reason for the Outlook email-based authenticator I've heard they're testing as well. However, since this app would require being already logged in to the device, it's more likely that it will be the Windows Hello Biometrics which are also FIDO 2 compliant and Windows 11 requires used to resolve this issue.
When I searched for the Microsoft OTP login, I kept getting documents that mentioned 2-Step verification, so if that's actually required, then there simply wouldn't be an issue. However, since I've never actually used the OTP as primary verification, I don't know the flow for these and thus the specific requirements. I did see a document that mentioned email verification could be used for either 2-Step or password change authorization though, so it does appear to be a potential risk.
As one of the articles I read (possibly the first one I referenced) about fatigue attacks indicated, the option for additional OTP characters has the negative of being more difficult to use, so since this would also likely require broad acceptance and possibly changes to the OTP standards, I don't expect that to occur unless significant numbers of successful attacks are detected by multiple organizations. Though that might theoretically be possible, I haven't heard of any such known issues to date.
Since most consumer accounts aren't under these sorts of attacks and instead those that are most commonly appear to have been popular gaming accounts like Minecraft, the most common advice here is to recommend 2-Step authentication with the Microsoft Authenticator if possible as well
I've personally only seen a single person indicate they'd had a Microsoft account with 2-Step authentication compromised, which since that person had multiple accounts each using the others as verification, I suspect that one compromised account led to another, and so on, though confirming that would be difficult.
Since any cross-account verification failure might lead to a cascade, I've personally enabled 2FA capabilities for every account used to verify both the Microsoft and Google accounts, as well as the wireless provider's account to avoid a potential smartphone takeover or cloning using the IMEI or other phone specific information contained in that account.
From what I've seen in threads here about lost accounts, virtually none have 2-Step verification enabled, nor are they using the authenticator. All of them appear to be surprised that Microsoft can do nothing to help once an account has its primary email changed, while it appears common enough to me that you'd think it might receive more discussion in forums that support Minecraft.