Jose Rodriguez

System Administrator

Systems Engineer

Data scientist

Computer Engineer

Cyber Security

Jose Rodriguez

System Administrator

Systems Engineer

Data scientist

Computer Engineer

Cyber Security

Blog Post

Massive Personal Data Exposure on RENIEC’s Electoral Roll: The 2026 Peru Scandal and How to Protect Yourself

Massive Personal Data Exposure on RENIEC’s Electoral Roll: The 2026 Peru Scandal and How to Protect Yourself

In a country where digital identity powers everything—from banking to voting—a catastrophic security failure at Peru’s National Registry of Identification and Civil Status (RENIEC) has put millions of citizens at risk. The public portal https://sisbi.reniec.gob.pe/PLPI intended for consulting the Initial Electoral Roll (LPI) for the 2026 General Elections—allowed unrestricted access to highly sensitive data: full names, national IDs (DNI), home addresses, photos, signatures, and voting details. As of today, the site is offline, but the breach is irreversible. This isn’t just a glitch—it’s a national-scale data exposure that undermines trust in Peru’s electoral process.

As a cybersecurity expert who has conducted audits for Peruvian universities and corporations, I’ve seen how poor access controls lead to identity theft, fraud, and extortion. Drawing from recent journalistic reports, official statements, and technical analysis, this article breaks down what happened, why it matters, and—most importantly—what you must do now.


The Breach: What Went Wrong at RENIEC?

The LPI was published on October 27, 2025, to allow citizens to verify their voter registration until October 31. It includes over 27 million registered voters, with personal details such as:

  • Full name
  • DNI number
  • Home address (street, district, province)
  • Photo
  • Signature
  • Voting table and location

To query the system, users only needed to enter a DNI and its check digitno CAPTCHA, no OTP, no two-factor authentication.

Timeline of Events:

Date Event
Oct 27 LPI goes live on sisbi.reniec.gob.pe/PLPI
Oct 27–28 Social media erupts: users discover that entering one DNI reveals nearby records (family, neighbors) with full addresses and photos
Oct 28 Hundreds of complaints flood X (Twitter), Facebook, and TikTok
Oct 29 Site taken offline. RENIEC issues statement calling the exposure “legal and mandatory” under Election Law N° 26859
Oct 29 Defensoría del Pueblo demands urgent data protection measures

Critical flaw: The system lacked rate limiting and authentication, enabling automated scraping. A simple script could extract thousands of records per minute.


Why This Is a Disaster: Real-World Risks

This isn’t theoretical. In Peru, where cybercrime rose 30% year-over-year (PNP 2025 report), exposed data becomes weaponized:

Risk How It Works Real Impact
Identity Theft Criminals use DNI + photo + signature to forge documents Fake loans, tax filings, or government benefits
Doxing & Extortion Full home addresses enable physical threats “Pay or we visit your house” scams
Dark Web Sales Databases sold for S/50–200 per 1,000 records Used in phishing, ransomware, or SIM swapping
Electoral Manipulation Geolocated voter data targets swing districts Fake voter challenges or intimidation
Mass Phishing Personalized SMS/email attacks using real names & addresses 80% success rate in smishing campaigns

Precedent: After the 2023 MEF data leak, over 5,000 fraud cases were reported in 6 months. This RENIEC breach is 5x larger.


RENIEC’s Response: Transparency or Negligence?

RENIEC defends the publication as legally required for electoral transparency. But critics—including the Defensoría del Pueblo and digital rights expert Erick Iriarte—argue:

  • Legal obligation ≠ zero security The Organic Election Law mandates public access, not unprotected exposure.
  • No anonymization: Addresses and photos could have been masked or require in-person verification.
  • No breach notification: Millions affected, zero official alerts.

Legal consequences: Possible fines up to 100 UIT (S/515,000) under Peru’s Data Protection Law (N° 29733). Political calls for the resignation of RENIEC President Carmen Velarde Koechlin.


Technical Breakdown: How the System Failed

From a sysadmin’s view, this was preventable:

http
GET /PLPI/consulta?dni=12345678&dv=9 HTTP/1.1
Host: sisbi.reniec.gob.pe
→ Returns JSON with full record + related entries

Vulnerabilities:

  • No rate limiting → bots could query 1,000+ DNIs/min
  • No authentication → public endpoint
  • No data minimization → full PII exposed
  • No logging/monitoring → no trace of mass scraping

This is a classic Insecure Direct Object Reference (IDOR) + Missing Access Controls flaw (OWASP Top 10).


Protect Yourself NOW: 5-Step Emergency Plan

Don’t wait for RENIEC. Act today:

1. Freeze Your Credit & Alert Banks

  • Contact SBS (www.sbs.gob.pe) to flag your DNI
  • Set daily limits on Yape, Plin, and bank apps

2. Change All Sensitive Passwords

bash
# Generate strong passwords
openssl rand -base64 32

Update:

  • Online banking
  • RENIEC virtual PIN
  • SUNAT, ONPE, Essalud

3. Monitor for Identity Theft

  • Add your email/DNI to Have I Been Pwned? (haveibeenpwned.com)
  • Set Google Alerts for your full name + DNI
  • Use credit monitoring (if available via your bank)

4. File Complaints

  • Indecopi: www.indecopi.gob.pe → Data protection violation
  • Autoridad Nacional de Protección de Datos Personales (ANPD)
  • Join class-action efforts (lawyers already organizing)

5. Secure Your Devices

Tool Purpose
Bitwarden Password manager with breach alerts
Malwarebytes Mobile Scan for phishing apps
ExpressVPN / NordVPN Hide IP on public Wi-Fi

Lessons for Peru’s Digital Future

This breach exposes a systemic failure in public-sector cybersecurity:

RENIEC must implement:

  • Biometric login for sensitive queries
  • Anonymized public views (hide addresses/photos)
  • Annual third-party audits (e.g., Deloitte, PwC Perú)
  • Real-time scraping detection

With elections in 2026, trust is fragile. One more breach could delegitimize the entire process.

“Transparency without security is recklessness.” — A Peruvian cybersecurity wake-up call.


Was your data exposed? Need a security audit? I offer data breach assessments, secure API design, and employee training (in English/Spanish). Based in Piura, available nationwide.

Contact: joselinkin@gmail.com | +51 991 974 415

Your identity is your most valuable asset. Protect it.


Jose Rodríguez is a Systems Engineer and Cybersecurity Specialist with a Master’s in Information Security (Universidad de La Rioja). He secures digital platforms at Universidad de Piura and consults on data protection across Peru. Read more at joseramiro.lat.

Tags:
Write a comment

For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.