This type of program is used to intercept and change the API calls of a particular operating system in a process that effectively hides the malware altogether. Rootkits often live at an operating system’s kernel level or even lower and they include system firmware, master boot record, and hypervisor. They can also hide other drivers, system components, services, network connections, files, and programs. Rootkits are a common occurrence in different operating systems like MAC OS X, Linux, and even Windows.