Up to 700,000 users claimed by hacker, out of 20 million total active users.
Substack, a popular platform for newsletters with over 20 million active monthly users, has disclosed a data breach. On February 3, 2026, the company discovered that an unauthorized third party had gained access to a database containing a range of user information. According to a letter from CEO Chris Best, the compromised data includes names, email addresses, phone numbers, user IDs, and Stripe IDs. The company has emphasized that more sensitive data, such as passwords and credit card numbers, were not part of the breach. The exposure may have begun as early as October 2025. In response, Substack has fixed the underlying vulnerability and is warning its users to be vigilant against potential phishing attacks. The disclosure comes as an unidentified threat actor claims to have stolen and posted data from 700,000 users on a dark web forum.
While the exact method of intrusion was not disclosed, it was due to a 'vulnerability' that the company has since fixed. An unconfirmed claim by a hacker on the dark web suggests a dataset of 700,000 users was stolen and is being circulated.
While Substack has not detailed the specific vulnerability, breaches of this nature in modern web applications often stem from a few common causes:
Given that passwords were not exposed, it is less likely that the primary user authentication database was fully compromised. The breach may have been limited to a secondary database or service used for user profiles and metadata.
The impact on Substack users, while not involving direct financial data, is still significant.
No specific Indicators of Compromise (IOCs) were provided in the source articles.
For users of Substack:
For Substack (as a company):
General best practices for web application security are key to preventing such breaches.
Implement secure coding practices and conduct regular security audits to find and fix vulnerabilities before they are exploited.
Mapped D3FEND Techniques:
Use secure vaults for managing database credentials and API keys, and scan code repositories for accidental leaks.
For affected users, training on how to spot phishing and smishing attempts is the primary mitigation against further harm.
To prevent breaches like the one at Substack, organizations must proactively find and fix vulnerabilities in their live applications. Dynamic Application Security Testing (DAST) is a key technique for this. DAST tools, or 'scanners', interact with a running web application from the outside, just as an attacker would. They automatically test for common vulnerabilities like SQL injection, cross-site scripting (XSS), and Insecure Direct Object References (IDOR) by sending malicious payloads to input fields and API endpoints. By integrating DAST into the CI/CD pipeline, Substack could have automatically scanned their application for such flaws before deploying new code to production, potentially identifying and fixing the vulnerability that led to this breach.
While not a preventative measure for the breach itself, Identifier Anonymization can drastically reduce the impact of a data leak. For a platform like Substack, this means that in databases used for analytics or non-critical functions, real user PII (name, email) should be replaced with pseudonymous tokens. The link between the token and the real user identity would be stored in a separate, more secure database. In this incident, if the compromised database had contained only anonymized identifiers instead of real names and contact info, the stolen data would have been far less useful to attackers for launching phishing campaigns, thus minimizing the harm to users.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats