What makes “The Mask” special is the complexity of the toolset used by the
attackers. This includes an extremely sophisticated malware, a rootkit, a bootkit, 32-
and 64-bit Windows versions, Mac OS X and Linux versions and possibly versions
for Android and iPad/iPhone (Apple iOS).