Substack Breach: 663K Accounts Exposed
In October 2025, the publishing platform Substack suffered a data breach that was subsequently circulated more widely in February 2026. The breach exposed 663k account holder records containing email addresses along with publicly visible profile information from Substack accounts, such as publicatio...
Overview
In October 2025, the popular newsletter platform Substack experienced a significant data breach. The compromised information was later distributed more widely in February 2026, increasing the risk to affected users. This incident impacted over 663,000 account holders. While Substack is designed for public writing, the breach extracted and concentrated personal account details, moving them from a controlled platform into the hands of cybercriminals. This matters because your exposed data can now be used for targeted scams and identity theft attempts.
What Was Exposed
The breach exposed a core set of personal information linked to Substack accounts. Every affected record included the user’s email address and name. Additionally, the data contained publicly visible profile information, such as the names of publications you run or follow and your profile biography. Most concerningly, for a subset of users, phone numbers were also included in the leaked data. This combination creates a detailed profile that can be used against you.
Potential Impact
The severity of this breach is HIGH due to the nature of the combined data. With your email, name, and knowledge of your Substack interests, attackers can craft highly convincing phishing emails and smishing (SMS phishing) texts. These messages may appear to come from Substack itself or other services you use, tricking you into revealing passwords or financial information. The inclusion of phone numbers for some users significantly increases the risk of harassment, targeted scams, and account takeover attempts via SIM-swapping. Furthermore, this data can be cross-referenced with other breaches, building a more complete picture for identity theft.
Recommendations
Take these steps immediately to protect yourself:
- Change Your Substack Password: Immediately update your Substack password to a new, strong, and unique one. Do not reuse this password on any other website.
- Enable Multi-Factor Authentication (MFA): If Substack offers MFA (sometimes called two-factor authentication), enable it now. This adds a critical layer of security beyond just a password.
- Beware of Targeted Phishing: Be extremely cautious of emails or text messages that reference Substack, your publication, or seem to know your interests. Do not click on links or provide login details. Always navigate to websites directly by typing the URL.
- Monitor for SMS Scams: If your phone number was exposed, be skeptical of unsolicited texts, even if they appear to come from legitimate organizations.
- Consider a Password Manager: Using a password manager helps you create and store a unique, strong password for every online account, preventing a breach on one site from compromising others.
How to Check If You’re Affected
The breach has been reported to the free service Have I Been Pwned. To check if your data was compromised:
- Visit https://haveibeenpwned.com
- Enter your primary email address into the search bar.
- The service will show if your email appears in the Substack breach and others. You can also directly view the breach notification at: https://haveibeenpwned.com/Breach/Substack. If you are notified that you were affected, please follow the recommendations above.
Investigate Breaches Safely with NordVPN
Researching exposed data, paste sites, or threat actor infrastructure? Route your OSINT traffic through a VPN to avoid attribution and keep your investigation IP separate from your corporate network.
Get NordVPN for ResearchAffiliate link — we may earn a commission at no extra cost to you.
Never miss a data breach report
Get real-time security alerts delivered to your preferred platform.
Related Breach Reports
In April 2026, the hacking group ShinyHunters claimed they had breached Amtrak . The group typically compromises organisations' Salesforce instances before demanding a ransom and later, if not paid, dumping the data publicly. They subsequently published the alleged data which contained over 2M uniqu...
In March 2026, Hallmark suffered an alleged breach and subsequent extortion after attackers gained access to data stored within Salesforce. The data was later published after the extortion deadline passed, exposing 1.7M unique email addresses across both Hallmark and the Hallmark+ streaming service,...
In March 2026, the anime streaming service Crunchyroll suffered a data breach alleged to have impacted 6.8M users . The exposed data is reported to have originated from the company's Zendesk support system where "name, login name, email address, IP address, general geographic location and the conten...
In February, the AI-powered comic generation platform KomikoAI suffered a data breach . The incident exposed 1M unique email addresses along with names, user posts and the AI prompts used to generate content. The exposed data enables the mapping of individual AI prompts to specific email addresses.