FYI - The WatchGuard Firewall does not open the ZIP files and only checks the top layer attachment file type. Regretfully if you allow ZIP files then you run the risk of infected embedded attachments getting through. See part of WatchGuard's virus response email below. You can identify the machines infected by watching the port specified for traffic. Anyone with more info please share your thoughts to help GHG out.
-------------------------
Suggestions for Firebox II / III owners
MyDoom uses many attachment types. The Firebox II and III's SMTP Proxy blocks most of MyDoom's attachments by default. However, it doesn't block ZIP files by default. You can follow the steps below to block ZIP files either temporarily or permanantly. Since MyDoom uses different file names, blocking it requires you to block all ZIP files. Note that this procedure stops your users from receiving any ZIP file, whether malicious or not.
If you have an SMTP Proxy icon in the WatchGuard Policy Manager, double-click the icon, then go to Properties tab => Incoming => Content Types tab => check for "*.zip" in the box labeled "Deny attachments based on these file name patterns." If you see *.zip in the list, your Firebox is configured to block this virus. If you don't see .zip in the list, click the Add button and type *.zip.
If you don't have an SMTP Proxy icon in the WatchGuard Policy Manager, go to: Edit => Add Service => Proxies => SMTP => Add => OK. The newly enabled service blocks the worm by default.
When it successfully infects a machine, MyDoom seems to open a connection using TCP port 3127 in an attempt to allow the virus author access to your machine. We recommend blocking this port, both Incoming and Outgoing. To do this, click "Edit => Add Service => New." Name the service whatever you want (e.g., Block_MyDoom_Trojan) and click "Add." Choose TCP port 3127, and for "Client Port," choose Ignore from the drop-down menu, and click "OK" twice to add the service to the list of services. Now, double-click the new service to add it to your configuration. Change both Incoming and Outgoing to "Enabled and Denied" and press "OK." Make sure to save this change to your Firebox This change will not prevent the worm from infecting you, but it should prevent the virus' backdoor from reaching the author.