Substack Discloses Data Breach Exposing User Contact Information

Newsletter Platform Substack Confirms Data Breach Exposing User PII

MEDIUM
February 6, 2026
5m read
Data BreachPhishingCloud Security

Impact Scope

People Affected

Up to 700,000 users claimed by hacker, out of 20 million total active users.

Affected Companies

Substack

Industries Affected

TechnologyMedia and Entertainment

Related Entities

Other

Full Report

Executive Summary

Substack, a popular platform for newsletters with over 20 million active monthly users, has disclosed a data breach. On February 3, 2026, the company discovered that an unauthorized third party had gained access to a database containing a range of user information. According to a letter from CEO Chris Best, the compromised data includes names, email addresses, phone numbers, user IDs, and Stripe IDs. The company has emphasized that more sensitive data, such as passwords and credit card numbers, were not part of the breach. The exposure may have begun as early as October 2025. In response, Substack has fixed the underlying vulnerability and is warning its users to be vigilant against potential phishing attacks. The disclosure comes as an unidentified threat actor claims to have stolen and posted data from 700,000 users on a dark web forum.


Threat Overview

  • Victim: Substack, a digital publishing platform with millions of users.
  • Incident: An unauthorized third party gained access to a production database containing user information.
  • Timeline: The exposure may have started in October 2025 and was discovered by Substack on February 3, 2026.
  • Data Exposed: The compromised dataset includes:
    • Full Names
    • Email Addresses
    • Phone Numbers
    • User IDs
    • Stripe IDs (used for processing payments)
    • Profile Pictures and Bios
  • Data Not Exposed: Substack asserts that passwords, credit card numbers, and other financial details were not accessed.

While the exact method of intrusion was not disclosed, it was due to a 'vulnerability' that the company has since fixed. An unconfirmed claim by a hacker on the dark web suggests a dataset of 700,000 users was stolen and is being circulated.


Technical Analysis

While Substack has not detailed the specific vulnerability, breaches of this nature in modern web applications often stem from a few common causes:

  1. Insecure Direct Object References (IDOR): An API endpoint may have allowed access to user data without properly checking if the person making the request was authorized to view it.
  2. SQL Injection: A vulnerability in a web form or API could have allowed an attacker to execute arbitrary database queries to dump user information.
  3. Leaked Credentials/API Keys: A developer may have accidentally exposed a database credential or API key in a public code repository (e.g., on GitHub), which attackers could then use to access the database directly.
  4. Server Misconfiguration: Similar to other recent breaches, a database server may have been misconfigured and left exposed to the internet without proper authentication.

Given that passwords were not exposed, it is less likely that the primary user authentication database was fully compromised. The breach may have been limited to a secondary database or service used for user profiles and metadata.


Impact Assessment

The impact on Substack users, while not involving direct financial data, is still significant.

  • Increased Phishing and Smishing: The primary risk is that attackers will use the stolen names, emails, and phone numbers to launch highly targeted phishing (email) and smishing (SMS) campaigns. These messages could impersonate Substack or other services to trick users into revealing passwords or financial information.
  • Identity Correlation: Attackers can correlate the breached data with information from other leaks to build more complete profiles of individuals for identity theft or social engineering.
  • Privacy Violation: The exposure of user information, including what newsletters they subscribe to (if that data was included), is a significant violation of privacy.
  • Reputational Damage: For a platform built on the trust between writers and readers, a data breach can cause significant reputational harm and may lead to users and writers leaving the platform.

IOCs

No specific Indicators of Compromise (IOCs) were provided in the source articles.


Detection & Response

For users of Substack:

  • Be Vigilant: Treat any unsolicited email or text message claiming to be from Substack with extreme caution. Do not click on links or provide any personal information.
  • Enable MFA: Ensure that multi-factor authentication is enabled on your Substack account and any other online account, especially your email.

For Substack (as a company):

  • Forensic Investigation: The company has correctly launched a full investigation to determine the root cause and full scope of the breach.
  • Vulnerability Remediation: The responsible vulnerability has reportedly been fixed.
  • User Notification: Substack has begun notifying affected users, which is a critical step in responsible disclosure.

Mitigation

General best practices for web application security are key to preventing such breaches.

  • Secure Coding Practices: Implement secure coding training for developers and use static (SAST) and dynamic (DAST) application security testing tools to identify vulnerabilities like SQL injection and IDOR before code is deployed.
  • Credential and Secret Management: Use a secure vault to manage all database credentials, API keys, and other secrets. Never hardcode them in source code. Regularly scan public code repositories for accidental leaks.
  • Regular Security Audits: Conduct regular third-party penetration tests and security audits of all applications and infrastructure.
  • Principle of Least Privilege: Ensure that application service accounts have the minimum necessary permissions on the database. For example, a service that only displays user profiles should only have read-only access to the relevant tables, not write access to the entire database.

Timeline of Events

1
October 1, 2025
The data exposure may have begun as early as October 2025.
2
February 3, 2026
Substack discovers that an unauthorized third party had gained access to a user database.
3
February 6, 2026
This article was published

MITRE ATT&CK Mitigations

Implement secure coding practices and conduct regular security audits to find and fix vulnerabilities before they are exploited.

Mapped D3FEND Techniques:

Use secure vaults for managing database credentials and API keys, and scan code repositories for accidental leaks.

For affected users, training on how to spot phishing and smishing attempts is the primary mitigation against further harm.

D3FEND Defensive Countermeasures

To prevent breaches like the one at Substack, organizations must proactively find and fix vulnerabilities in their live applications. Dynamic Application Security Testing (DAST) is a key technique for this. DAST tools, or 'scanners', interact with a running web application from the outside, just as an attacker would. They automatically test for common vulnerabilities like SQL injection, cross-site scripting (XSS), and Insecure Direct Object References (IDOR) by sending malicious payloads to input fields and API endpoints. By integrating DAST into the CI/CD pipeline, Substack could have automatically scanned their application for such flaws before deploying new code to production, potentially identifying and fixing the vulnerability that led to this breach.

While not a preventative measure for the breach itself, Identifier Anonymization can drastically reduce the impact of a data leak. For a platform like Substack, this means that in databases used for analytics or non-critical functions, real user PII (name, email) should be replaced with pseudonymous tokens. The link between the token and the real user identity would be stored in a separate, more secure database. In this incident, if the compromised database had contained only anonymized identifiers instead of real names and contact info, the stolen data would have been far less useful to attackers for launching phishing campaigns, thus minimizing the harm to users.

Sources & References

Major Data Breaches Expose Millions Across Multiple Sectors
Evrim Ağacı (evrimagaci.org) February 6, 2026

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

Substackdata breachPIIphishingprivacy

📢 Share This Article

Help others stay informed about cybersecurity threats

Continue Reading