CyberIntel ⬡ News
★ Saved ◆ Cyber Reads
← Back ◐ Insider Threat & DLP Mar 17, 2026

Data Leak – Substack Confirms Security Incident

Gurucul Archived Mar 17, 2026 ✓ Full text saved

Executive Summary Substack, a subscription-based publishing platform, suffered a data breach that occurred in October 2025 and was discovered on February 3, 2026, during which an unauthorized party accessed and later leaked user account data affecting overall 697,298 users; the exposed information included email addresses, phone numbers, usernames, profile names, bios, and internal account metadata, […]

Full text archived locally
✦ AI Summary · Claude Sonnet


    BLOG FEBRUARY 27, 2026 Threat Intelligence DATA LEAK – SUBSTACK CONFIRMS SECURITY INCIDENT IN THIS ARTICLE Executive Summary Victim Overview About the Data Breach What Happened? Confirmation from CEO of Substack Leaked Data Samples Key Recommendations Immediate Actions Detection Improvements Structural Controls Overall Assessment Executive Summary Substack, a subscription-based publishing platform, suffered a data breach that occurred in October 2025 and was discovered on February 3, 2026, during which an unauthorized party accessed and later leaked user account data affecting overall 697,298 users; the exposed information included email addresses, phone numbers, usernames, profile names, bios, and internal account metadata, and the dataset was subsequently posted on cybercrime forums, increasing risks of phishing, spam, and social engineering, while the company confirmed that no passwords, credit card details, or financial information were compromised and reported that it fixed the vulnerability, launched an investigation, and strengthened security controls following disclosure. Victim Overview Organization: Substack Sector: Digital Media / Publishing Technology / Creator Economy Location: San Francisco, California, United States Operational Significance: Provides a platform for writers and publishers to create and distribute email newsletters Enables monetization through paid subscriptions and integrated payment processing Hosts hundreds of thousands of creators with a global subscriber base Supports direct audience engagement without reliance on traditional media channels Plays a significant role in the independent publishing ecosystem and creator economy About the Data Breach Substack suffered a security breach that initially occurred in October 2025, but the company only discovered it on February 3, 2026. That’s a four-month detection gap — and in cybersecurity, four months is an eternity. What Happened? An unauthorized third party accessed limited user account data. The exposed information included: Email addresses Phone numbers Usernames Profile names Bios Internal account metadata On February 7, 2026, a threat actor posted the leaked Substack data on darknet forums, referencing a ZIP archive containing the full dataset. The below screenshot circulating on Telegram shows users sharing a file named “substack.csv,” described as part of a series of leaks, along with references to hundreds of thousands of rows containing fields such as names, emails, phone numbers, usernames, and account metadata, indicating that the leaked Substack dataset was being distributed and discussed within messaging channels. Confirmation from CEO of Substack People reported on Twitter that Chris Best confirmed the incident publicly. Key statements from Substack leadership: Unauthorized access occurred in October 2025 Discovered on February 3, 2026 No passwords were accessed No credit card or financial information was exposed Substack stated it has: Fixed the vulnerability Launched an internal investigation Strengthened security controls Found no confirmed evidence of data misuse (as of disclosure) Leaked Data Samples The below screenshot contains the samples of the User’s personal information. The below screenshot refers to a data breach involving Substack data breach that occurred in October 2025 and became widely known in February 2026, affecting 663,000 account holders. Exposed data includes email addresses, publicly available profile information, and in some cases, phone numbers. Key Recommendations Immediate Actions Notify affected users with phishing awareness guidance Monitor for secondary dataset redistribution Review historical access logs for additional anomalies Detection Improvements Implement continuous monitoring for abnormal database queries and bulk exports Establish automated alerts for large dataset extraction events Reduce mean time to detect (MTTD) through enhanced logging visibility Structural Controls Enforce strict least-privilege access controls Periodically audit internal account metadata access Strengthen anomaly detection around administrative activity Conduct regular third-party security assessments Overall Assessment The Substack incident represents a Moderate-severity SaaS data exposure involving large-scale contact information but no credential or financial compromise. The primary risk lies in downstream phishing and social engineering campaigns rather than direct account takeover. Over 663,000 Accounts Impacted: Approximately 663,000–697,000 Substack user accounts were affected by the breach. User Contact & Profile Data Exposed: The leaked information included email addresses, phone numbers, usernames, bios, and other profile-related details. No Financial or Password Data Compromised: Passwords, credit card numbers, and financial information were not accessed. Data Shared on Cybercrime Forums: The exposed dataset was posted on underground forums, increasing the likelihood of misuse. Elevated Risk of Phishing & Social Engineering: Affected users may face phishing emails, smishing attacks, spam, and targeted social engineering attempts.
    💬 Team Notes
    Article Info
    Source
    Gurucul
    Category
    ◐ Insider Threat & DLP
    Published
    Mar 17, 2026
    Archived
    Mar 17, 2026
    Full Text
    ✓ Saved locally
    Open Original ↗