A wireless device resembling an Apple USB-Lightning cable that can exploit any system via keyboard interface highlights risks associated with hardware Trojans and insecure supply chains.

https://responsible-cyber.com/2019/02/15/from-o-mg-to-nsa-what-hardware-implants-mean-for-security/