Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

How To Protect Yourself Against Mydoom: Page 2 of 2

"Enterprises should block .zip attachments at the gateway," said Huger, "unless these types of files have a legitimate business purpose."

Additionally, Mydoom contains a backdoor that listens to commands on a series of TCP ports, said Huger. One function of this backdoor is an entry by hackers into infected systems -- attackers can use it to send and run other malicious code on the compromised machine -- but another purpose is to relay network connections, in effect adding the system to a collection of proxies for later spam and/or worm transmission.

To slam shut this backdoor, Huger advised organizations and users to block inbound TCP traffic on ports 3127 through 4000.

While many anti-virus firms have updated their software to account for Mydoom -- including Huger's Symantec -- so that the worm is automatically detected and destroyed, there are some tools available on the Internet for cleaning infected machines.

Sophos, for instance, has posted an automated removal tool on its Web site, while F-Secure also has a similar tool available.