These are normally used for targeted attacks. Unless someone is specifically after you such a device is usually safe.
Sometimes the USB ID can be used to figure out the vendor but that could also be fake.
You could determine something is odd by looking at what device comes up when it is connected. Does it come with drivers? A new network interface etc.
Or by comparing the inside/firmware of a known good one with the model you have.