Substack warns customers of data breach following hacker’s dark web claims

Customers of the newsletter platform Substack were warned on Wednesday that their email addresses, phone numbers and other metadata were leaked in a recently discovered data breach.

Substack CEO Chris Best sent a letter to customers confirming reports he company had been breached by cybercriminals. 

 The publishing platform said it discovered a problem with its systems on February 3 that “allowed an unauthorized third party to access limited user data without permission.” The stolen data dates back to October 2025, according to Best. 

Credit card numbers, passwords and other financial data were not leaked. Substack did not respond to requests for comment about the size of the breach and has not published a public statement about the security incident.  

“We have fixed the problem with our system that allowed this to happen. We are conducting a full investigation and are taking steps to improve our systems and processes to prevent this type of issue from happening in the future,” Best said. 

The company warned that customers should be cautious about any texts or email messages they may get. 

The statement follows an unidentified hacker claiming to have stolen the personal information of about 700,000 users. The data tranche allegedly included emails, phone numbers, names, user IDs, Stripe IDs, profile pictures, bios and more. It is unclear if the claims about the size and scope of the breach are genuine.

Substack has grown into a significant alternative to the contracting newspaper industry since emerging in 2017, and now boasts more than $5 million paid subscribers and about 20 million active monthly users. About 17,000 writers earn money from the platform.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Jonathan Greig

Jonathan Greig

is a Breaking News Reporter at Recorded Future News. Jonathan has worked across the globe as a journalist since 2014. Before moving back to New York City, he worked for news outlets in South Africa, Jordan and Cambodia. He previously covered cybersecurity at ZDNet and TechRepublic.

 

Total
0
Shares
Previous Post

ThreatsDay Bulletin: Codespaces RCE, AsyncRAT C2, BYOVD Abuse, AI Cloud Intrusions & 15+ Stories

Next Post

Researchers uncover vast cyberespionage operation targeting dozens of governments worldwide

Related Posts

Orchid Security Introduces Continuous Identity Observability for Enterprise Applications

An innovative approach to discovering, analyzing, and governing identity usage beyond traditional IAM controls. The Challenge: Identity Lives Outside the Identity Stack Identity and access management tools were built to govern users and directories. Modern enterprises run on applications. Over time, identity logic has moved into application code, APIs, service accounts, and custom authentication
Read More

Keenadu Firmware Backdoor Infects Android Tablets via Signed OTA Updates

A new Android backdoor that's embedded deep into the device firmware can silently harvest data and remotely control its behavior, according to new findings from Kaspersky. The Russian cybersecurity vendor said it discovered the backdoor, dubbed Keenadu, in the firmware of devices associated with various brands, including Alldocube, with the compromise occurring during the firmware build phase.
Read More

Over 60 Software Vendors Issue Security Fixes Across OS, Cloud, and Network Platforms

It's Patch Tuesday, which means a number of software vendors have released patches for various security vulnerabilities impacting their products and services. Microsoft issued fixes for 59 flaws, including six actively exploited zero-days in various Windows components that could be abused to bypass security features, escalate privileges, and trigger a denial-of-service (DoS) condition. Elsewhere
Read More