Hm... I figure the risk isn't all that high unless someone either detects your bitcoin address format or knows you have enough coins to be worth stealing and manually targets you. I'd say just stay up2date about your printer's firmware and possible news concerning it.
But I'm really not well-informed about this, just thought I might bring up the topic. Most likely, the chaotic nature of everything will prevent hacks from causing much harm in most cases, since viruses don't really know what to look for.
Anyways, bottom line: check that printer firmware is up to date, especially on HP network printers, very especially if it has not been patched since the hacking party began in November or whenever it was.
What I'd expect to see long before then, is a browser "helper" object that looks for well-formed bitcoin addresses in web pages, and replaces them from a list of addresses belonging to an attacker. That's a path of far less resistance for an attacker that would yield the same thing (and then far more) for an attacker versus hacking printers. If I think of why one would hack a printer, stealing print jobs is one consideration, but using that printer to run something like OpenVPN and being a launch point for other attacks on that network seems more what a printer hack would be valued for by a hacker.
And printers that connect strictly via USB are going to be immune...
I'd not be so certain about that. We know they can be infected using a rigged document, so outputting the data from the infected printer would be the problem. But USB-device-to-computer hasn't exactly been mankind's safest channel in the past, I think on WinXP one can still claim to be/have a HDD on USB and then insert malware via some rigged Autorun, unless that has been properly disabled. A rigged printer can claim to be an USB hub and emulate whatever insane structure of devices!
Hardware that executes arbitrary low-level assemblies is evil. Patch the printers, stop that from happening, or else people
will find ways to abuse it eventually.
Let me put it another way: a USB printer is immune to stealing keys off a paper wallet because it lacks a way to send them to an attacker. Before someone goes to the effort of rooting a USB printer and making it claim to be a hard drive (which would clearly get noticed), I would expect numerous other viable attacks to be lower hanging fruit - like, for one, attempts to root the computer that's sending the print jobs there, and just stealing them on their way out.
I have never read about regular PC malware that steals print jobs, probably because it's not usually necessary - once malware gives remote control to an attacker, whatever the user is trying to print is probably readable straight off the file system in a native format that's easier to work with, without any need to go after a print queue.