On October 20, 2012, LulzSecPeru released over 76,000 accounts containing emails and passwords hashed with unsalted SHA1 from Punto.pe. The leak was announced in a Twitter post at https://twitter.com/LulzSecPeru/status/259509141251424256. Punto.pe is the domain registrar for .pe domains and has served the role of Network Information Center (NIC) in Peru for 17 years. It is unclear how many .pe domains may be at risk as a result of this leak. However, in their release notes posted at http://pastebin.com/bjHVrr4n, LulzSecPeru stated the users from Punto.pe include banks of Peru, IT security companies, universities and government agencies. They described the leak as a proof of the lack of Peru's internet security which needs to be improved.
The original dump as released by LulzSecPeru contains over 200,000 accounts but a large number of them were either missing a valid email or password. As a result, we have found only about 76,000 unique valid accounts. The table below is the list of the valid accounts including some with duplicate emails as they were using different passwords and stored separately in the original dump. Regardless of the number of valid accounts found, we strongly urge owners of .pe domains who have previously registered with Punto.pe to promptly update their passwords that are currently in use on the site.
What should you do?
Use the search box below to find out if your email is in the list. If yes, you are advised to change your password immediately if it is still in use elsewhere. For your privacy, do not enter your complete email in the search box. Try using the first part of your email instead, e.g. example instead of email@example.com.
If you wish to have your entry removed from the list below, please send an empty email to firstname.lastname@example.org with subject "punto removal request". The removal is done automatically within 24 hours if you use the same email as the one appeared in the list. This page may be cached for up to 24 hours.
|ID||Email / Username||Password|
|A valid search term is required!|