Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

429+ Articles
114+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. News
  3. Substack Discloses Data Breach After 100-Day Undetected
Substack Discloses Data Breach After 100-Day Undetected
NEWS

Substack Discloses Data Breach After 100-Day Undetected

Substack CEO Chris Best disclosed a data breach on February 5 affecting approximately 700,000 users, after an unauthorized party accessed the platform...

Dylan H.

News Desk

February 5, 2026
5 min read

100 Days Undetected

Substack CEO Chris Best disclosed on February 5, 2026 that an unauthorized party accessed data belonging to approximately 700,000 users of the newsletter publishing platform. The breach is notable not only for its scale but for its stealth — the intrusion began in October 2025 and went undetected for approximately 100 days until Substack's security team identified the unauthorized access on February 3, 2026.


Breach Timeline

October 2025       — Unauthorized party gains access to Substack user data
Oct 2025 - Feb 2026 — Intrusion goes undetected for approximately 100 days
February 3, 2026   — Substack security team detects unauthorized access
February 4, 2026   — Access revoked; forensic investigation launched
February 5, 2026   — CEO Chris Best publicly discloses the breach

The nearly three-month dwell time raises serious questions about Substack's detection capabilities. Industry benchmarks from IBM's Cost of a Data Breach Report place the average breach detection time at 194 days, meaning Substack's 100-day discovery — while concerning — is actually faster than average. Still, the gap allowed ample time for data exfiltration.


Data Exposed vs. Not Exposed

Data TypeStatusRisk Level
Email addressesExposedHigh
Phone numbersExposedHigh
Stripe payment system IDsExposedMedium
PasswordsNOT exposed—
Credit card numbersNOT exposed—
Full financial informationNOT exposed—
Newsletter content / draftsNOT exposed—

The exposure of Stripe payment system IDs is an unusual data point. While these IDs alone cannot be used to initiate transactions, they could potentially be leveraged in combination with other data to map user payment histories or facilitate targeted social engineering against Stripe's systems.


How the Breach Occurred

The threat actor described their method as "scraping" and characterized the technique as "noisy" — suggesting they used automated tools to systematically extract user data from Substack's systems. This description implies the attacker was surprised the activity went undetected for so long, given that scraping typically generates abnormal traffic patterns that should trigger monitoring alerts.

Why "Noisy" Scraping Went Unnoticed

Several factors could explain the detection failure:

  • Insufficient rate limiting — Automated requests were not throttled or flagged
  • Lack of anomaly detection — Traffic patterns from scraping were not distinguished from legitimate API usage
  • Inadequate logging — Access logs may not have been reviewed with sufficient frequency or granularity
  • Blending with normal traffic — The attacker may have distributed requests to mimic legitimate user behavior despite the overall volume being anomalous

Impact Assessment

For Substack Users

The 700,000 affected users face increased risk of:

  • Targeted phishing campaigns — Attackers know these users are active on Substack and can craft convincing emails
  • Credential stuffing — Exposed email addresses will be tested against other platforms
  • SMS-based attacks — Phone number exposure enables smishing (SMS phishing) and SIM swapping attempts
  • Social engineering — Knowledge of a user's Substack presence can be leveraged in pretexting scenarios

For Substack Writers and Publishers

Newsletter creators face additional risks:

  • Subscriber list exposure — If writer-subscriber relationships can be inferred from the stolen data
  • Reputation damage — Subscribers may lose trust in the platform's ability to protect their data
  • Business impact — Paid newsletter operators could see subscriber churn

For the Broader Platform

Substack's position as a trusted platform for independent journalism and paid newsletters means this breach has implications beyond raw user counts. Writers who depend on Substack for their livelihood must now weigh platform security against the convenience of its publishing tools.


Recommendations for Affected Users

  1. Change your Substack password — Even though passwords were not exposed, this is a precautionary best practice
  2. Enable two-factor authentication — On Substack and any accounts using the same email address
  3. Watch for phishing emails — Be skeptical of any Substack-themed communications asking you to click links or verify information
  4. Monitor for SIM swapping — If your phone number was exposed, contact your carrier to add a PIN or port protection
  5. Review connected accounts — Check if your Substack account is linked to other services and secure those as well
  6. Check breach databases — Use Have I Been Pwned to monitor for your data in future dumps

Sources

  • TechCrunch — Substack Discloses Data Breach Affecting 700,000 Users
  • SecurityWeek — Substack Breach Went Undetected for 100 Days
  • Infosecurity Magazine — Substack CEO Confirms 700K User Data Breach

Related Reading

  • IDMerit KYC Data Breach Exposes 1 Billion Records Across 26
  • AI Chat App Exposes 300 Million Private Messages from 25
  • Louis Vuitton, Dior, and Tiffany Fined $25 Million Over
#Data Breach#Substack#Media#Privacy#Scraping

Related Articles

Cegedim Santé Breach Exposes 15.8 Million French Healthcare Records Including HIV Status

A cyberattack on French healthcare software vendor Cegedim Santé exposed 15.8 million patient records from 3,800 doctors, with leaked data including...

4 min read

IDMerit KYC Data Breach Exposes 1 Billion Records Across 26

An unprotected MongoDB instance belonging to identity verification firm IDMerit left over 1 billion personal records — including SSNs, passport numbers,...

4 min read

AI Chat App Exposes 300 Million Private Messages from 25

A misconfigured Google Firebase backend in the Chat & Ask AI app exposed 300 million private chatbot conversations from 25 million users, including...

4 min read
Back to all News