Virus-prone applications burrow into networks