Update, 9 October 2018: The remediation section of the white paper contained inaccurate information. Secure Boot doesn’t protect against the UEFI rootkit described in this research. We advise that you keep your UEFI firmware up-to-date and, if possible, have a processor with a hardware root of trust as is the case with Intel processors supporting Intel Boot Guard (from the Haswell family of Intel processors onwards).
ESET researchers have discovered the first in-the-wild UEFI rootkit. Dubbed LoJax, the research team has shown that the Sednit operators used different components of the LoJax malware to target a few government organizations in the Balkans as well as in Central and Eastern Europe.
www.welivesecurity.com
(welivesecurity is a current activity of ESET RESEARCH)
Doesn't affect me either, just wondering. Black Hat had some info on that, too. LoJack was the Lenovo theft protection "feature", and that went sideways, but nothing I can see on that subject since about 2017, or so.
Methinks if the rotten thing had any 'legs' at all, it would be spread worldwide by now.
The fact that it is not is fair indication that it has either been died a natural death or has been shoved into the background by updates via all OS's registry systems/bios etc etc etc
Firmware is software. When it is broken, or attacked it can be repaired. So, yes, it has likely been overcome by now. There will likely be others, but for now ... move on to other subjects
As a Linux user I find it easiest to just not run any anti-virus, anti-malware, or anti-rootkit programs.
What I don't know can't worry me and make me lose sleep!