Yesterday we reported that OpenX had abruptly shut down its OnRamp ad server after a major malware attack. At the time the company did not say when, or if, the open source ad server would be back online. In an update this morning, OpenX makes clear that OnRamp will never serve another ad.
OpenX attempted to frame its decision in the context of a widespread increase in hacking activity "directed against technology companies of all types." More on that below.
Meanwhile here's the (run-on) money quote:
"After further review of the intrusion, other recent attacks on the service, the effect on our publishers and advertisers, the recent increased frequency of malicious hacking activity directed against technology companies of all types, the possibility of future intrusions through this open source service which could continue to jeopardize OnRamp customers, the virtual impossibility of ensuring the continued security of OnRamp in an environment of increasingly sophisticated and powerful intrusions that exploit open source software, and the resources we would be required to expend to maintain the security of the service, we have decided that we will no longer host and operate the OnRamp service."
The good news: OnRamp users will be granted access to the reporting interface again, beginning today at 5pm PST and lasting until March 22. This will undoubtedly come as a relief to publishers who were left scrambling Sunday and Monday to comb through email archives and Dropbox accounts for ad creatives and insertion orders. Yes, there's been a great deal of anger.
But while the shuttering of OnRamp is clearly a painful surprise for the legions of publishers that have come to rely on it, it's certainly a positive from a browser security standpoint, since by many accounts OpenX has been a growing source of malicious advertising activity.
But it also acknowledges implicitly that correcting the vulnerability would be possible, given adequate resources. The fact that OpenX has deemed it lacks those resources begs the question of whether open source technology can be stewarded by for-profit businesses -- or if there's a place for open source in advertising at all.
In the case of OpenX, the company's own actions may have created preventable security holes. A recent ITWorld article describes a method by which malware has been easily spread through an “append” attack. Hackers are able to use the plugin for the OpenXMarket exchange product to inject malicious code into ads on websites that use the OnRamp ad server. This plugin is installed by default. Without this monetization lever implemented by OpenX, which ITWorld calls "poorly thought out," it seems clear the risk to OnRamp users and their website visitors would have been considerably less.
On the other hand, OpenX deserves credit for acting on what had clearly become a significant Internet security issue. Publishers still haven't been given details on the specifics of this particular attack. Was it one malvertiser or many? Was the onslaught very much larger than other recent incidents reported over the last several months? These details would be nice to have. But, regardless of the answers, OpenX probably did the right thing.