Found this device outside an elementary school, trying to identify and return to owner.
When it is plugged into a Mac (because I'm straight crazy) it prompts a new unknown keyboard dialogue.
Item is plastic, blue in color, and roughly key-shaped. The narrow end of it is a small USB dongle that has an orange 'tongue' inside. I am not sure what orange color designates on USB.
Text on the sides of the metal:
Back side:
- CAN ICES-3(B)/NMB-3(B)
- AMAZON EU L-1855
- LUXEMBOURG
- D33724 RoHS
Left Side:
- G3Q0W907
- 93120H1K
Right Side:
- MODEL NO. U05U83
- ASSEMBLED IN USA
4 Answers
It’s an Amazon security token:
Company: Amazon Fulfillment Service Inc.
Device Name: Security Doken
Model: U05U83
So mail it to Amazon. A delivery driver probably lost it.
8According to this page it is a Zukey which is security key.
0“Security keys help keep Amazon’s data safe. You’ll use your security key to connect to internal services and the Amazon virtual private network (VPN). There are several types of security keys at Amazon, but they all have the same features.”
NEVER plugin a USB you found laying somewhere into a computer that is important. USBs could have malicious firmware that infects your computer the moment you plug it in. This is equally accurate for USB cables. Anything with a USB interface is susceptible.
On another note, the colour. You may be familiar with black and blue plugs and wonder what orange means? It is up to the manufacturer to decide because USB port and connector colours are not enforced in the USB specification and manufacturers can color them as they wish.
It appears they decided to colour all their Zukey's orange.
1Two options:
- it's either a Zukey (mentioned in the other answers; it will act as a keyboard and "type" a one-time password/passphrase for the user)
or
- it's more like a USB Rubber Ducky, disguised as a Zukey. Such devices will also act like a USB keyboard and send useful keystrokes and/or mouse movements to the computer. More advanced devices can be remotely controlled.
"Useful keystrokes" (which can be sent a few seconds, minutes, hors after the device has been plugged in) can be commands to take over the machine, open an SSH tunnel or other remote network control connection, download or even type in malware, do funny things to annoy you - or just jiggle the mouse pointer so the machine will never activate the screen saver/screen lock.
One of the most popular ways to deliver such a "trojan horse" into some company's computer's USB port is by dropping them on the parking lot. Or, if you are a visitor or HVAP maintenance person who is allowed temporary access to a data center, you can plug it in yourself when your guard is distracted.
These things can also be used for non-malicious activities, like performing repetitive work which cannot be otherwise automated.
However, the stuff inside your device does not looks one of these "Rubber Ducky" or Arduino Leonardo-based devices.
1