OAuth 2.0 tokens are supposed to be revoked upon password change, which you can do with GAM or CSV upload in admin console.
I have seen Drive for Desktop continue to work after an account password was reset, and sign-in cookies were reset, in which case you can use GAM to manually delete the tokens from the users' accounts.
# Get all users' tokens
gam config auto_batch_min 1 redirect csv ./tokens.csv multiprocess all users print tokens
# Delete all the tokens in the CSV
gam csv ./tokens.csv gam user "~user" del tokens clientid "~clientId"
If you are not enforcing 2SV, you should. If you have allowed passwordless sign-in and attackers set up passkeys, you should disable passkeys for now. If you are worried that the attacker may have registered their security key/authenticator apps, you can also use GAM to turn off 2SV as well.