Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Notepad++ Official Update Mechanism Hijacked to Deliver Malware to Select Users

February 8, 2026

eScan Antivirus Update Servers Compromised to Deliver Multi-Stage Malware

February 8, 2026

Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm

February 8, 2026
Facebook X (Twitter) Instagram
Sunday, February 8
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Substack Confirms Data Breach, “Limited User Data” Compromised
News

Substack Confirms Data Breach, “Limited User Data” Compromised

Team-CWDBy Team-CWDFebruary 6, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


Newsletter platform Substack has confirmed it suffered a security incident, leading to the compromise of users’ email addresses and phone numbers.

Chris Best, the CEO of Substack, notified users of the data breach in an email sent to some users on February 5.

The CEO said his security team detected the incident on February 3, noticing “evidence of a problem with our systems that allowed an unauthorized third party to access limited user data without permission, including email addresses, phone numbers and other internal metadata.”

He also added that no financial information, including credit card numbers, or passwords were accessed.

Best further explained that the data collection occurred in October 2025 and claimed that the Substack security team has now “fixed the problem with our system that allowed this to happen.” No further information on the incident was provided.

Substack is now conducting a full investigation and is taking steps to improve our systems and processes to prevent this type of issue from happening in the future.

Speaking to Infosecurity, a Substack spokesperson said an unauthorized party was able to access limited account information “during a short window.”

“Once we became aware, the issue was addressed and additional safeguards were put in place. We cannot share specifics about our security systems and processes, but we can confirm that the issue has been resolved,” they added.

No further information on the incident was provided and the Substack CEO did not specify the number of affected users or clarify why the breach was only detected four months after it happened.

Substack reported having over 50 million active subscriptions, including five million paid, as of March 2025.

Javvad Malik, a lead security awareness advocate at KnowBe4 said that while transparent breach notifications “should always be commended,” this one is “a bit light on the details which does not help people accurately judge the risk and take concrete action.”

“The phrase ‘limited user data’ is particularly vague. Email addresses and phone numbers are enough for targeted phishing, SIM-swap attempts, or doxxing. Even if passwords weren’t accessed, attackers don’t need passwords if they can socially engineer users,” Malik said.

“The timeline is significant. If the data was accessed in October 2025, but only just disclosed, it’s a significant dwell time. That isn’t to say there’s negligence on part of Substack because detection can be difficult,” Malik commented. “But impacted users deserve a clearer explanation of how the breach was identified and which monitoring controls failed to detect it initially, and most importantly, what’s changing as a result.”

Chris Hauk, a consumer privacy advocate at Pixel Privacy, urged Substack users to “practice extra care” when dealing with unexpected messages, emails or calls, while Paul Bischoff, also a consumer privacy advocate at Comparitech emphasized that they should be “on the lookout for targeted phishing emails and scams.”

Image credits: Azulblue / Shutterstock



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleSmarterMail Fixes Critical Unauthenticated RCE Flaw with CVSS 9.3 Score
Next Article Ex-Google Engineer Convicted for Stealing AI Secrets for China Startup
Team-CWD
  • Website

Related Posts

News

Notepad++ Official Update Mechanism Hijacked to Deliver Malware to Select Users

February 8, 2026
News

eScan Antivirus Update Servers Compromised to Deliver Multi-Stage Malware

February 8, 2026
News

Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm

February 8, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

Watch out for SVG files booby-trapped with malware

September 22, 2025

Can password managers get hacked? Here’s what to know

November 14, 2025

Your information is on the dark web. What happens next?

January 13, 2026

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.