From:
https://www.zdnet.com/article/7-hacking-tools-that-look-harmless-but-can-do-real-damage/If you use your computer to store any amount of crypto, or even if you use a hardware wallet, you should avoid plugging random stuff into your computer that you don't know about, because it is very easy to disguise a cable or a USB flash drive as a malware that logs your keystrokes and copies wallet files.
The following is a list of gadgets you should be particularly concerned of. If you see them anywhere in sight, get your computer away.
Especially do not leave your PC unattended in some strange, unfamiliar place.
Flipper Zero:It has a USB port for connecting to devices and sending keystrokes to execute any command like running a keylogger. It also has a WiFi controller for remote-control and file upload/download. This can be used to upload a malicious copy of a wallet software or download wallet files. It is more capable of doing Denial-of-Service damage than theft, however.
O.MG cables:It has a USB port for connecting to devices and sending keystrokes to execute any command like running a keylogger. It also has a WiFi controller for remote-control and file upload/download. Very similar to the Flipper Zero except it is more disguised and can be camouflaged with your other cables.
USB Nugget:Like the Flipper Zero and is also easy to detect in a room.
USB Rubber Ducky:More dangerous kind of hacking tool that looks exactly like a regular USB flash drive (someone can just draw with black sharpie or permanent marker over the logo). Can send keystrokes to execute any command like running a keylogger. No WiFi controller.
WiFi PineappleA router capable of performing man-in-the-middle attacks such as changing DNS queries and spoofing TCP/IP packets, and also reading all data that goes through the network except for TLS-encrypted data.
LAN TurtleA router capable of performing man-in-the-middle attacks such as changing DNS queries and spoofing TCP/IP packets, and also reading all data that goes through the network except for TLS-encrypted data.
Of these devices, only the first four are especially dangerous. As any "virtual keyboard" is capable of opening a terminal to install a keylogger which can record everything you type including seed phrases and wallet passwords, which can be ex-filtrated before the keylogger is even installed.
Ideally, you would make sure that access to your computer area is controlled and that only devices you recognize are present around it.