Up to 700,000 users claimed by hacker, out of 20 million total active users.
Substack, a popular platform for newsletters with over 20 million active monthly users, has disclosed a data breach. On February 3, 2026, the company discovered that an unauthorized third party had gained access to a database containing a range of user information. According to a letter from CEO Chris Best, the compromised data includes names, email addresses, phone numbers, user IDs, and Stripe IDs. The company has emphasized that more sensitive data, such as passwords and credit card numbers, were not part of the breach. The exposure may have begun as early as October 2025. In response, Substack has fixed the underlying vulnerability and is warning its users to be vigilant against potential phishing attacks. The disclosure comes as an unidentified threat actor claims to have stolen and posted data from 700,000 users on a dark web forum.
While the exact method of intrusion was not disclosed, it was due to a 'vulnerability' that the company has since fixed. An unconfirmed claim by a hacker on the dark web suggests a dataset of 700,000 users was stolen and is being circulated.
While Substack has not detailed the specific vulnerability, breaches of this nature in modern web applications often stem from a few common causes:
Given that passwords were not exposed, it is less likely that the primary user authentication database was fully compromised. The breach may have been limited to a secondary database or service used for user profiles and metadata.
The impact on Substack users, while not involving direct financial data, is still significant.
No specific Indicators of Compromise (IOCs) were provided in the source articles.
For users of Substack:
For Substack (as a company):
General best practices for web application security are key to preventing such breaches.
Update confirms 697,313 users affected in Substack breach, with stolen data now actively being sold on the 'Breachforums' hacking platform.
The Substack data breach, initially reported on February 6, 2026, has new confirmed details. The number of affected users is now precisely stated as 697,313, moving beyond the initial hacker's claim of '700,000 users'. Crucially, the stolen database, containing names, emails, and phone numbers, is actively being sold on the notorious 'Breachforums' hacking platform. This confirms the immediate availability of the data to other malicious actors, significantly increasing the risk of targeted phishing and social engineering attacks against Substack users. The long delay between the October 2025 breach and its February 2026 detection also highlights potential security monitoring gaps.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats