Threat Intelligence

Data Leak – Substack Confirms Security Incident

Data Leak-Substack Confirms Security Incident

Executive Summary

Substack, a subscription-based publishing platform, suffered a data breach that occurred in October 2025 and was discovered on February 3, 2026, during which an unauthorized party accessed and later leaked user account data affecting overall 697,298 users; the exposed information included email addresses, phone numbers, usernames, profile names, bios, and internal account metadata, and the dataset was subsequently posted on cybercrime forums, increasing risks of phishing, spam, and social engineering, while the company confirmed that no passwords, credit card details, or financial information were compromised and reported that it fixed the vulnerability, launched an investigation, and strengthened security controls following disclosure.

Data Leak-Substack Confirms Security Incident

Victim Overview

Organization: Substack

Sector: Digital Media / Publishing Technology / Creator Economy

Location: San Francisco, California, United States

Operational Significance:

  • Provides a platform for writers and publishers to create and distribute email newsletters
  • Enables monetization through paid subscriptions and integrated payment processing
  • Hosts hundreds of thousands of creators with a global subscriber base
  • Supports direct audience engagement without reliance on traditional media channels
  • Plays a significant role in the independent publishing ecosystem and creator economy

About the Data Breach

Substack suffered a security breach that initially occurred in October 2025, but the company only discovered it on February 3, 2026.

That’s a four-month detection gap — and in cybersecurity, four months is an eternity.

What Happened?

An unauthorized third party accessed limited user account data. The exposed information included:

  • Email addresses
  • Phone numbers
  • Usernames
  • Profile names
  • Bios
  • Internal account metadata

On February 7, 2026, a threat actor posted the leaked Substack data on darknet forums, referencing a ZIP archive containing the full dataset.

The below screenshot circulating on Telegram shows users sharing a file named “substack.csv,” described as part of a series of leaks, along with references to hundreds of thousands of rows containing fields such as names, emails, phone numbers, usernames, and account metadata, indicating that the leaked Substack dataset was being distributed and discussed within messaging channels.

Data Leak-Substack Confirms Security Incident

Confirmation from CEO of Substack

People reported on Twitter that Chris Best confirmed the incident publicly.

Key statements from Substack leadership:

  • Unauthorized access occurred in October 2025
  • Discovered on February 3, 2026
  • No passwords were accessed
  • No credit card or financial information was exposed

Substack stated it has:

  • Fixed the vulnerability
  • Launched an internal investigation
  • Strengthened security controls
  • Found no confirmed evidence of data misuse (as of disclosure)

Leaked Data Samples

The below screenshot contains the samples of the User’s personal information.

The below screenshot refers to a data breach involving Substack data breach that occurred in October 2025 and became widely known in February 2026, affecting 663,000 account holders. Exposed data includes email addresses, publicly available profile information, and in some cases, phone numbers.

Key Recommendations

Immediate Actions

  • Notify affected users with phishing awareness guidance
  • Monitor for secondary dataset redistribution
  • Review historical access logs for additional anomalies

Detection Improvements

  • Implement continuous monitoring for abnormal database queries and bulk exports
  • Establish automated alerts for large dataset extraction events
  • Reduce mean time to detect (MTTD) through enhanced logging visibility

Structural Controls

  • Enforce strict least-privilege access controls
  • Periodically audit internal account metadata access
  • Strengthen anomaly detection around administrative activity
  • Conduct regular third-party security assessments

Overall Assessment

The Substack incident represents a Moderate-severity SaaS data exposure involving large-scale contact information but no credential or financial compromise. The primary risk lies in downstream phishing and social engineering campaigns rather than direct account takeover.

  • Over 663,000 Accounts Impacted: Approximately 663,000–697,000 Substack user accounts were affected by the breach.
  • User Contact & Profile Data Exposed: The leaked information included email addresses, phone numbers, usernames, bios, and other profile-related details.
  • No Financial or Password Data Compromised: Passwords, credit card numbers, and financial information were not accessed.
  • Data Shared on Cybercrime Forums: The exposed dataset was posted on underground forums, increasing the likelihood of misuse.
  • Elevated Risk of Phishing & Social Engineering: Affected users may face phishing emails, smishing attacks, spam, and targeted social engineering attempts.

 

Advanced cyber security analytics platform visualizing real-time threat intelligence, network vulnerabilities, and data breach prevention metrics on an interactive dashboard for proactive risk management and incident response