In theory, a threat actor could impersonate someone, invite the victim for a Teams chat, and have them open a phishing link, ...