All reports

False positive CSAM alert involving test data and external IP reference

WAYSCLOUD-TR-2026-0001Government / Authority ContacthighResolved
Published: 2026-03-12 00:00:00 UTC Updated: 2026-03-20 00:00:00 UTC
Event: Nov 29, 2025 — Mar 20, 2026

Summary

A CSAM (child sexual abuse material) alert was generated in WAYSCloud's internal monitoring system and subsequently reviewed.

The alert was determined to be a false positive caused by test data in a production environment. One of the test entries included a real external IP address, which increased the seriousness of the situation and required formal review.

What Happened

During development and testing of a monitoring system for detecting potentially illegal image content, test entries were manually inserted into a production database.

These entries were intended to simulate detection scenarios and validate system behavior. However, they were not clearly marked as test data and were not removed after testing.

At a later point, one of these entries triggered a high-severity alert through an external detection service. The alert appeared as a confirmed match and was therefore treated as a real incident.

The alert contained inconsistencies compared to expected detection patterns, which led to further internal investigation.

Unlike other test entries, this specific entry contained a real external IP address associated with a Norwegian network, rather than a reserved or private test address.

WAYSCloud initiated internal investigation procedures following contact from relevant Norwegian authorities, including Kripos, to clarify the situation and ensure appropriate handling.

Impact

The alert did not correspond to any real file, upload, or user activity within WAYSCloud services.

No illegal material was stored, processed, or distributed.

However, the presence of a real external IP address in a test entry created a potential risk that an unrelated third party could be incorrectly associated with serious criminal activity.

The situation was investigated immediately and clarified with authorities. No third party was contacted, investigated, or affected as a result of this event.

The issue was limited to internally generated test data retained in a production system.

Actions Taken

  • Conducted a full technical investigation across storage systems, logs, and monitoring data
  • Verified that no corresponding files, uploads, or user activity existed
  • Confirmed that the referenced IP address had no interaction with any WAYSCloud service
  • Performed cross-system validation to confirm that identifiers did not match real users or accounts
  • Identified the root cause as manually inserted test data in production
  • Established direct dialogue with relevant authorities to clarify the situation
  • Notified the Norwegian Data Protection Authority for assessment
  • Removed or reclassified all affected test entries

The situation was investigated and clarified within a short timeframe following initial notification.

Preventive Measures

  • Test data is no longer inserted into production systems without explicit marking and lifecycle controls
  • Improved separation between testing and production environments
  • Use of reserved test network ranges for all simulated data
  • Removal of the ability to insert arbitrary external IP addresses during testing
  • Additional validation to ensure alerts are based on actual detection events
  • Strengthened internal procedures for handling high-severity automated alerts

Affected Services

storagemonitoring

Timeline

Nov 29, 2025, 24:00 UTC
Informational
Test entries were created in a production database during system setup and testing.
Mar 12, 2026, 08:00 UTC
Investigating
A high-severity alert was generated and identified as inconsistent during internal review.
Mar 12, 2026, 10:00 UTC
Action Taken
WAYSCloud was contacted by relevant Norwegian authorities regarding the alert, which triggered immediate internal investigation and follow-up.
Mar 12, 2026, 14:00 UTC
Action Taken
The Norwegian Data Protection Authority was notified for assessment of the situation.
Mar 12, 2026, 15:00 UTC
Action Taken
Initial incident notification submitted to the Norwegian Data Protection Authority.
Mar 12, 2026, 16:00 UTC
Resolved
Internal investigation confirmed that no real activity, files, or users were associated with the alert.
Mar 13, 2026, 12:00 UTC
Resolved
The alert was confirmed to originate from test data with no underlying incident.
Mar 16, 2026, 14:00 UTC
Action Taken
Follow-up report submitted to the Norwegian Data Protection Authority with full investigation findings.
Mar 20, 2026, 10:00 UTC
Resolved
The Norwegian Data Protection Authority confirmed that the incident did not constitute a breach of personal data security under applicable regulations.
Mar 20, 2026, 12:00 UTC
Resolved
The matter was reviewed and closed following communication with authorities and regulatory clarification.

Attachments

Redacted supporting documentation from regulatory communication is available below.