How could your device become infected by a keylogger or some other malware? In many cases the user downloads executable files from shady or less trustworthy sources and runs the file without thorough checking (own antivirus may not help if the malware is very new and sophisticatedly crafted to avoid detection, although this might be an unlikely scenario as it seems very specifically targeted; upload to virustotal.com to interpret results from many antivirus engines).
Why do you need questionable software anyway? On your device where you do crypto stuff, seriously??
Some reasonable steps for better security are rather simple:
- Do not use your daily computer with which you do all your internet shit for crypto wallets. Same applies for your mobile, see below.
- Do not download and execute every piece of software shit that comes under your mouse pointer.
- Use trustworthy software and verify that it's genuine.
- Avoid warez, keygens, cracking software, cracked software and whatnot. You have no idea, what "funny shit" you execute. If you do, don't cry later, you got infected.
- Use a hardware wallet properly (avoid the Ledger crap).
- Avoid using and re-using weak and/or bad passwords. Use a good password manager and unique and different passwords at avery place. Use 2FA properly where possible or where it's worth the hassle with a separate device (your old mobile phone is just fine for that and only that! Single purpose use, get it!).
- Get a cheap refurbished computer or laptop, install a minimal Linux on it, no fancy extra software and use it to handle your crypto wallets. Do nothing more with this device, devote it solely to use your wallet software, avoid browsing the internet and using it for emails. Linux is less common than Windows and maybe MacOS, so it's not the primary target for malware.
- Educate yourself about computer security, it's no rocket science.
- Keep your system updated. I know it's sometimes shitty, but you don't gain an edge, if your software remains old and unpatched with tons of bugs and vulnerabilites. You only make it easier that some old bugs get exploited and your system compromised.
This list is not exhaustive, I surely missed something. I hope you get the gist. Avoid using your mobile for crypto when you do all your daily internet and social media shit with it, when you install all sorts of games and apps without sanity, when ...
A keylogger or root kit usually doesn't come on its own to your device! Usually you install it as payload to something else you downloaded and executed on your device. You neglected basic security principles before. Educate yourself what to avoid to stay safe. It pays off for all the future where you use computers.
Don't stop, it's life-long learning, as malware and cyber criminals also evolve and become more sophisticated.