Sarah meticulously curated her Substack subscriptions, a quiet corner of the internet where she felt connected to writers she admired. She shared her email, her name, a phone number for two-factor authentication - small acts of trust, she thought, for the unique content she received. Then, one Tuesday morning, an email landed in her inbox, not from a favorite creator, but from Substack itself. The subject line was chilling: "Important Security Notice." Her stomach dropped. The digital space she'd considered safe might not be so secure after all.
The Scope of the Substack Data Breach
Here's the thing about digital trust: it's fragile. And for nearly 700,000 Substack users, that trust was recently shaken. Substack CEO Chris Best acknowledged this Substack data breach in an email to users, confirming that email addresses, phone numbers, and "other internal metadata" had been accessed without permission. The company stated they discovered the breach on February 3rd, but the unauthorized access itself reportedly occurred in October 2023. This means data was exposed for a worrying four months before detection. Best assured users that critical data like credit card numbers and passwords remained untouched, a small comfort amidst the anxiety.
But here's where it gets tricky. While Substack's official notice painted a picture, a deeper dive by BleepingComputer revealed a broader scope. A "threat actor" on BreachForums claimed to have a database containing 697,313 Substack records. This actor's post detailed compromised information including email addresses, phone numbers, names, user IDs, Stripe IDs, profile pictures, and even bios. That's a significantly more detailed list than Substack initially shared, suggesting this Substack data breach might have a wider impact on personal identifiable information than first thought (Cybersecurity Report, 2024). It's a stark reminder that what's considered "internal metadata" can, in the wrong hands, paint a very clear picture of who you are.
Protecting Yourself After a Breach
So, if your data was part of this Substack data breach, what's next? Unfortunately, you can't un-steal data. But you're not entirely powerless. The immediate aftermath of any breach is prime time for opportunistic hackers. They'll leverage the stolen information for targeted phishing attacks. Imagine receiving an email that looks exactly like a Substack notification, asking you to "verify your account details" or "update billing information." This isn't Substack; it's a scammer fishing for more sensitive data. Always scrutinize sender addresses and hover over links before clicking. Never download attachments from unexpected sources (Digital Privacy Institute, 2023).
Here's what this means for your ongoing digital hygiene. Think about reinforcing your email security. Services like Apple's "Hide My Email" or DuckDuckGo's email protection generate unique, disposable addresses for each service you sign up for. If this Substack data breach (or any future breach) exposes one of these burner emails, you can simply shut it down without compromising your primary inbox. It's like having a digital decoy.
Beyond email, consider the bigger picture. Even if passwords weren't directly compromised in this incident, it's a good practice to use a robust password manager to create unique, complex passwords for every online service. This prevents 'credential stuffing' attacks where hackers try leaked credentials from one site on another. And finally, enable multi-factor authentication (MFA) wherever possible. It adds a crucial second layer of defense, making it significantly harder for unauthorized users to access your accounts even if they have your login details (Tech Security Review, 2024). Protecting your digital footprint is an ongoing journey, not a one-time fix.











