A US reader of the Reddit forum, using the handle FruitLuck, reported finding dangerous malware linked to a Sexology vibrator. The alert drew attention to a story released by 404 Media.
FruitLuck explained that the Pussy Power vibrator was purchased at a popular Spencer’s store on Valentine’s Day. Shortly after, a user decided to charge the device by connecting it to a computer via USB. Immediately, a browser window opened on the computer and a file flagged as malicious by the antivirus software began to download.
After the vibrator was connected to the computer, FruitLuck uploaded the downloaded file to Reddit to accompany the post. Independent information security professionals expressed interest in the incident and began examining the file released by FruitLuck to assess its potential threat.
Vx-underground, a group focused on malware and security research, speculated that Luma might have gained access to FruitLuck’s PC through the vibrator connection, given the lack of other similar reports. At the same time, hundreds of user reviews of Sexology-branded devices appeared online. To form a clearer picture, vx-underground requested FruitLuck to provide the exact copy of the Pussy Power file for examination.
Newsrooms also looked into Sexology’s line of sex toys and purchased two devices from the brand at Spencer’s. Reporters connected the devices to both Macs and PCs multiple times, but the FruitLuck scenario did not recur consistently. In one instance, while one journalist connected Pussy Power to an iMac, a window displaying various symbols briefly opened and then closed. Editors at 404 Media were unable to reproduce the event in a controlled environment for deeper testing.
In a related note, a hacker collective known as SugarLocker had previously been liquidated in Russia, an event that some observers cited when discussing the evolving landscape of digital threats tied to consumer electronics. The broader takeaway emphasizes that individual reports, even when compelling, require rigorous verification across different setups before drawing firm conclusions about device risk.
Experts advise consumers to treat such reports with a measured approach. Periodic firmware updates, staying current with security patches, and using trusted software sources remain foundational steps to reduce exposure to potential threats. The case underscores the importance of reputable channels for sharing security findings and the value of independent verification when a narrative involves consumer devices connected to personal computers. Attribution for the original reporting should be noted to help readers assess the reliability of the information presented. Source attribution: 404 Media and participating security researchers