Substack warns customers of data breach following hacker’s dark web claims

Customers of the newsletter platform Substack were warned on Wednesday that their email addresses, phone numbers and other metadata were leaked in a recently discovered data breach.

Substack CEO Chris Best sent a letter to customers confirming reports he company had been breached by cybercriminals. 

 The publishing platform said it discovered a problem with its systems on February 3 that “allowed an unauthorized third party to access limited user data without permission.” The stolen data dates back to October 2025, according to Best. 

Credit card numbers, passwords and other financial data were not leaked. Substack did not respond to requests for comment about the size of the breach and has not published a public statement about the security incident.  

“We have fixed the problem with our system that allowed this to happen. We are conducting a full investigation and are taking steps to improve our systems and processes to prevent this type of issue from happening in the future,” Best said. 

The company warned that customers should be cautious about any texts or email messages they may get. 

The statement follows an unidentified hacker claiming to have stolen the personal information of about 700,000 users. The data tranche allegedly included emails, phone numbers, names, user IDs, Stripe IDs, profile pictures, bios and more. It is unclear if the claims about the size and scope of the breach are genuine.

Substack has grown into a significant alternative to the contracting newspaper industry since emerging in 2017, and now boasts more than $5 million paid subscribers and about 20 million active monthly users. About 17,000 writers earn money from the platform.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Jonathan Greig

Jonathan Greig

is a Breaking News Reporter at Recorded Future News. Jonathan has worked across the globe as a journalist since 2014. Before moving back to New York City, he worked for news outlets in South Africa, Jordan and Cambodia. He previously covered cybersecurity at ZDNet and TechRepublic.

 

Total
0
Shares
Previous Post

ThreatsDay Bulletin: Codespaces RCE, AsyncRAT C2, BYOVD Abuse, AI Cloud Intrusions & 15+ Stories

Next Post

Researchers uncover vast cyberespionage operation targeting dozens of governments worldwide

Related Posts

JPCERT Confirms Active Command Injection Attacks on Array AG Gateways

A command injection vulnerability in Array Networks AG Series secure access gateways has been exploited in the wild since August 2025, according to an alert issued by JPCERT/CC this week. The vulnerability, which does not have a CVE identifier, was addressed by the company on May 11, 2025. It's rooted in Array's DesktopDirect, a remote desktop access solution that allows users to securely access
Read More