I Bought some cheap no-name USB to ethernet adapters, and they appeared to have modified firmware running the USB controller that scanned for and collected LANMAN / NTLMv2 hashes off of one's network to send to China servers on the internet connection for offline cracking, to use for future spying events. CHINA'S hacking infosec architecture is relentless.
Don' know about that. The only possibility that I can think of is when you run the driver installation utility, either manually or automatically and the driver comes with virus (intentionally or unintentionally ). I bought one (ethernet+3 usb ports combo) a few years back and it always malfunctioned and sometime will presented as a small USB drive with Realtek driver on it (with that blue crab icon of course), reinstall the driver multiple times did not fix the problem and I finally throw it away.
Later I bought the 1Gbe USB ethernet adapter from TP-Link with ASIX chip and never have any issue.
==
I think there is no way those Chinese companies/sellers build a custom chip just for hacking purpose, that will be too costly for no name vendors.
Small/no name OEM brand companies or personal sellers just don't have the resources to do things right.