Unfortunately, there is no place to discuss these things right now. Around 3 months ago I made a
request for a cybersecurity and privacy board, where discussion can at least go well-documented and all discussion added to that board would serve as a good knowledge resource, however it has not yet been addressed. For now people are just having their questions answered when asked or people are adding to topics after it's already too late
I would also love to see that happen. My post would be kind of similar to what julerz wrote but there really should be board properly dedicated to this.
Your guest OS is only as secure as your host OS. It's better to do it the other way around: on a trusted OS, use a VM to run untrusted software without risking your host OS.
Yeah good point [+1]. I will set up a VM like this and work accordingly. Thanks really for pointing it out.
I assume you have the Premium version? Even then, you cannot be sure that it will detect every malicious software or attempt to compromise your operating system. When you look at the fact that hackers break into highly sophisticated systems and steal information, it should not be surprising that they bypass some trivial protections compared to such systems.
It's a shame that you stopped using the device that would have most likely protected you from what happened to you, but people learn best from their own mistakes. Surely you know that you can have multiple wallets on HW and protect each of them individually with a passphrase, so you can separate something that you keep long-term from what you will use in some way as a hot wallet.
Yeah lessons learned with some price but now I need to see what would be the best way to setup my system and my way of working around these things. I now really wished that I would have come down to my senses for once and would have used my hardware wallet but being casual along the way you just start to follow things like you have been doing and only come down to sense once the harm has been done.
In addition, if I understand correctly, on April 30, the hacker stole not only the OP but several other transfers worth more than $2,000. Please correct me.
It could be anything: It could be like as you said or if the hacker swept the wallet directly to exchange then its exchange sweeping the deposit address to another address of their own.
About the VanitySearch, I don't think its the reason but I am not gonna use it anymore. I have generated bc1qwerty address years ago and have been using it for long time. What @BenCodie said is also right , and @NotTether is also right but that will make it a different case as I was the one careless in the end for getting my device infected with malware.