{"id":19023,"date":"2026-02-06T16:00:38","date_gmt":"2026-02-06T16:00:38","guid":{"rendered":"https:\/\/lite14.net\/blog\/?p=19023"},"modified":"2026-02-06T16:00:38","modified_gmt":"2026-02-06T16:00:38","slug":"substack-confirms-data-breach-exposing-user-email-addresses-and-phone-numbers","status":"publish","type":"post","link":"https:\/\/lite14.net\/blog\/2026\/02\/06\/substack-confirms-data-breach-exposing-user-email-addresses-and-phone-numbers\/","title":{"rendered":"Substack Confirms Data Breach Exposing User Email Addresses and Phone Numbers"},"content":{"rendered":"<ul>\n<li><\/li>\n<\/ul>\n<hr \/>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_76 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><ul class='ez-toc-list-level-2' ><li class='ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/lite14.net\/blog\/2026\/02\/06\/substack-confirms-data-breach-exposing-user-email-addresses-and-phone-numbers\/#_What_Happened\" >\u00a0What Happened<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/lite14.net\/blog\/2026\/02\/06\/substack-confirms-data-breach-exposing-user-email-addresses-and-phone-numbers\/#_What_Data_Was_Exposed\" >\u00a0What Data Was Exposed<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/lite14.net\/blog\/2026\/02\/06\/substack-confirms-data-breach-exposing-user-email-addresses-and-phone-numbers\/#_Timeline_Detection\" >\u00a0Timeline &amp; Detection<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/lite14.net\/blog\/2026\/02\/06\/substack-confirms-data-breach-exposing-user-email-addresses-and-phone-numbers\/#_Risks_for_Users\" >\u00a0Risks for Users<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/lite14.net\/blog\/2026\/02\/06\/substack-confirms-data-breach-exposing-user-email-addresses-and-phone-numbers\/#Phishing_Scam_Attempts\" >Phishing &amp; Scam Attempts<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/lite14.net\/blog\/2026\/02\/06\/substack-confirms-data-breach-exposing-user-email-addresses-and-phone-numbers\/#Personal_Contact_Information_Exposure\" >Personal Contact Information Exposure<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/lite14.net\/blog\/2026\/02\/06\/substack-confirms-data-breach-exposing-user-email-addresses-and-phone-numbers\/#_What_Substack_Is_Doing\" >\u00a0What Substack Is Doing<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/lite14.net\/blog\/2026\/02\/06\/substack-confirms-data-breach-exposing-user-email-addresses-and-phone-numbers\/#_Expert_Commentary_Broader_Context\" >\u00a0Expert Commentary &amp; Broader Context<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/lite14.net\/blog\/2026\/02\/06\/substack-confirms-data-breach-exposing-user-email-addresses-and-phone-numbers\/#_Detection_Delay_Is_a_Concern\" >\u00a0Detection Delay Is a Concern<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/lite14.net\/blog\/2026\/02\/06\/substack-confirms-data-breach-exposing-user-email-addresses-and-phone-numbers\/#_Even_%E2%80%9CLimited%E2%80%9D_Data_Is_Valuable\" >\u00a0Even \u201cLimited\u201d Data Is Valuable<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/lite14.net\/blog\/2026\/02\/06\/substack-confirms-data-breach-exposing-user-email-addresses-and-phone-numbers\/#_Creator_Platforms_Are_Attractive_Targets\" >\u00a0Creator Platforms Are Attractive Targets<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-12\" href=\"https:\/\/lite14.net\/blog\/2026\/02\/06\/substack-confirms-data-breach-exposing-user-email-addresses-and-phone-numbers\/#_What_Users_Should_Do_Next\" >\u00a0What Users Should Do Next<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-13\" href=\"https:\/\/lite14.net\/blog\/2026\/02\/06\/substack-confirms-data-breach-exposing-user-email-addresses-and-phone-numbers\/#_Bottom_Line\" >\u00a0Bottom Line<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-14\" href=\"https:\/\/lite14.net\/blog\/2026\/02\/06\/substack-confirms-data-breach-exposing-user-email-addresses-and-phone-numbers\/#Substack_Confirms_Data_Breach_Exposing_User_Email_Addresses_and_Phone_Numbers_%E2%80%94_Case_Studies_Expert_Commentary\" >Substack Confirms Data Breach Exposing User Email Addresses and Phone Numbers \u2014 Case Studies &amp; Expert Commentary<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-1'><a class=\"ez-toc-link ez-toc-heading-15\" href=\"https:\/\/lite14.net\/blog\/2026\/02\/06\/substack-confirms-data-breach-exposing-user-email-addresses-and-phone-numbers\/#_Case_Study_1_%E2%80%94_Phishing_Targeting_Creators\" >\u00a0Case Study 1 \u2014 Phishing Targeting Creators<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-1'><a class=\"ez-toc-link ez-toc-heading-16\" href=\"https:\/\/lite14.net\/blog\/2026\/02\/06\/substack-confirms-data-breach-exposing-user-email-addresses-and-phone-numbers\/#_Case_Study_2_%E2%80%94_SMS_Scams_After_Phone_Data_Exposure\" >\u00a0Case Study 2 \u2014 SMS Scams After Phone Data Exposure<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-1'><a class=\"ez-toc-link ez-toc-heading-17\" href=\"https:\/\/lite14.net\/blog\/2026\/02\/06\/substack-confirms-data-breach-exposing-user-email-addresses-and-phone-numbers\/#_Case_Study_3_%E2%80%94_Credential_Reuse_Exploited_Elsewhere\" >\u00a0Case Study 3 \u2014 Credential Reuse Exploited Elsewhere<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-1'><a class=\"ez-toc-link ez-toc-heading-18\" href=\"https:\/\/lite14.net\/blog\/2026\/02\/06\/substack-confirms-data-breach-exposing-user-email-addresses-and-phone-numbers\/#_Strategic_Commentary\" >\u00a0Strategic Commentary<\/a><ul class='ez-toc-list-level-2' ><li class='ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-19\" href=\"https:\/\/lite14.net\/blog\/2026\/02\/06\/substack-confirms-data-breach-exposing-user-email-addresses-and-phone-numbers\/#_1_Contact_Data_Is_Valuable_%E2%80%94_Even_Without_Passwords\" >\u00a01. Contact Data Is Valuable \u2014 Even Without Passwords<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-20\" href=\"https:\/\/lite14.net\/blog\/2026\/02\/06\/substack-confirms-data-breach-exposing-user-email-addresses-and-phone-numbers\/#_2_Detection_Delays_Raise_Security_Questions\" >\u00a02. Detection Delays Raise Security Questions<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-21\" href=\"https:\/\/lite14.net\/blog\/2026\/02\/06\/substack-confirms-data-breach-exposing-user-email-addresses-and-phone-numbers\/#_3_Phishing_and_Social_Engineering_Risk_Is_High_After_Exposure\" >\u00a03. Phishing and Social Engineering Risk Is High After Exposure<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-22\" href=\"https:\/\/lite14.net\/blog\/2026\/02\/06\/substack-confirms-data-breach-exposing-user-email-addresses-and-phone-numbers\/#_4_Shared_Data_Across_Platforms_Increases_Exposure\" >\u00a04. Shared Data Across Platforms Increases Exposure<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-23\" href=\"https:\/\/lite14.net\/blog\/2026\/02\/06\/substack-confirms-data-breach-exposing-user-email-addresses-and-phone-numbers\/#_5_Platforms_with_Large_Active_Communities_Are_Attractive_Targets\" >\u00a05. Platforms with Large Active Communities Are Attractive Targets<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-1'><a class=\"ez-toc-link ez-toc-heading-24\" href=\"https:\/\/lite14.net\/blog\/2026\/02\/06\/substack-confirms-data-breach-exposing-user-email-addresses-and-phone-numbers\/#_What_Users_Should_Do_Now\" >\u00a0What Users Should Do Now<\/a><ul class='ez-toc-list-level-2' ><li class='ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-25\" href=\"https:\/\/lite14.net\/blog\/2026\/02\/06\/substack-confirms-data-breach-exposing-user-email-addresses-and-phone-numbers\/#_Final_Thought\" >\u00a0Final Thought<\/a><\/li><\/ul><\/li><\/ul><\/nav><\/div>\n<h2><span class=\"ez-toc-section\" id=\"_What_Happened\"><\/span>\u00a0What Happened<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><strong>Substack<\/strong>, the popular newsletter and publishing platform used by millions of writers and readers, has confirmed that it suffered a <strong>data breach<\/strong>. The company disclosed that:<\/p>\n<ul>\n<li>An <strong>unauthorized third party<\/strong> accessed parts of its systems in <strong>October 2025<\/strong>.<\/li>\n<li>The breach was <strong>only discovered in early February 2026<\/strong> when Substack identified evidence of the security incident.<\/li>\n<li>The company then emailed users about the incident to notify them. (<a title=\"Substack confirms data breach affects users' email addresses and phone numbers | TechCrunch\" href=\"https:\/\/techcrunch.com\/2026\/02\/05\/substack-confirms-data-breach-affecting-email-addresses-and-phone-numbers\/?utm_source=chatgpt.com\">TechCrunch<\/a>)<\/li>\n<\/ul>\n<p>Substack\u2019s CEO <strong>Chris Best<\/strong> personally apologised to users in the notification, saying the company is conducting a full investigation and has patched the vulnerability that allowed the access. (<a title=\"Substack CEO informs users of a data breach - Yahoo News UK\" href=\"https:\/\/uk.news.yahoo.com\/substack-ceo-informs-users-data-151113124.html?utm_source=chatgpt.com\">Yahoo News UK<\/a>)<\/p>\n<hr \/>\n<h2><span class=\"ez-toc-section\" id=\"_What_Data_Was_Exposed\"><\/span>\u00a0What Data Was Exposed<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>According to Substack\u2019s official communication and independent reports:<\/p>\n<p><strong>Compromised:<\/strong><\/p>\n<ul>\n<li><strong>User email addresses<\/strong><\/li>\n<li><strong>Phone numbers<\/strong><\/li>\n<li><strong>Internal metadata associated with accounts<\/strong> \u2014 details not fully explained but likely linked to user profiles and platform activity (<a title=\"Substack data breach confirmed: user phone numbers email addresses all stolen in attack, here's what we know | TechRadar\" href=\"https:\/\/www.techradar.com\/pro\/security\/substack-data-breach-confirmed-user-phone-numbers-email-addresses-all-stolen-in-attack-heres-what-we-know?utm_source=chatgpt.com\">TechRadar<\/a>)<\/li>\n<\/ul>\n<p><strong>Not compromised:<\/strong><\/p>\n<ul>\n<li><strong>Passwords<\/strong><\/li>\n<li><strong>Credit card numbers<\/strong> or other financial details.<br \/>\nSubstack states there\u2019s <em>no evidence<\/em> that this more sensitive data was accessed. (<a title=\"Substack data breach confirmed: user phone numbers email addresses all stolen in attack, here's what we know | TechRadar\" href=\"https:\/\/www.techradar.com\/pro\/security\/substack-data-breach-confirmed-user-phone-numbers-email-addresses-all-stolen-in-attack-heres-what-we-know?utm_source=chatgpt.com\">TechRadar<\/a>)<\/li>\n<\/ul>\n<p>Security researchers also report that a database of potentially <strong>about 700,000 user records<\/strong> allegedly appeared on a hacking forum, though Substack has not confirmed the exact number of accounts affected. (<a title=\"Substack data breach leaks users\u2019 email addresses and phone numbers\" href=\"https:\/\/www.csoonline.com\/article\/4128287\/substack-data-breach-leaks-users-email-addresses-and-phone-numbers.html?utm_source=chatgpt.com\">CSO Online<\/a>)<\/p>\n<hr \/>\n<h2><span class=\"ez-toc-section\" id=\"_Timeline_Detection\"><\/span>\u00a0Timeline &amp; Detection<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<ul>\n<li><strong>October 2025:<\/strong> The breach originally occurred.<\/li>\n<li><strong>February 3, 2026:<\/strong> Substack identified evidence of the issue.<\/li>\n<li><strong>Early February 2026:<\/strong> Affected users received notification emails. (<a title=\"Substack CEO informs users of a data breach - Yahoo News UK\" href=\"https:\/\/uk.news.yahoo.com\/substack-ceo-informs-users-data-151113124.html?utm_source=chatgpt.com\">Yahoo News UK<\/a>)<\/li>\n<\/ul>\n<p>Security experts have pointed out the long detection gap \u2014 several months between the attack and discovery \u2014 which can be concerning because it gives attackers a longer window to exploit stolen data. (<a title=\"Substack breach goes undetected for four months | Cybernews\" href=\"https:\/\/cybernews.com\/cybercrime\/substack-breach-undetected-four-months\/?utm_source=chatgpt.com\">Cybernews<\/a>)<\/p>\n<hr \/>\n<h2><span class=\"ez-toc-section\" id=\"_Risks_for_Users\"><\/span>\u00a0Risks for Users<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Even though financial and credential data were not accessed:<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Phishing_Scam_Attempts\"><\/span><strong>Phishing &amp; Scam Attempts<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>With email addresses and phone numbers in hand, attackers could:<\/p>\n<ul>\n<li>Send targeted phishing emails or SMS pretending to be Substack or other trusted services<\/li>\n<li>Attempt <strong>SIM\u2011swap attacks<\/strong> or social engineering to access other accounts tied to those contacts<br \/>\nSecurity experts recommend users be vigilant about unexpected messages. (<a title=\"Security experts warn Substack users to brace for phishing attacks after breach\" href=\"https:\/\/www.itpro.com\/security\/data-breaches\/security-experts-warn-substack-users-to-brace-for-phishing-attacks-after-breach?utm_source=chatgpt.com\">IT Pro<\/a>)<\/li>\n<\/ul>\n<h3><span class=\"ez-toc-section\" id=\"Personal_Contact_Information_Exposure\"><\/span><strong>Personal Contact Information Exposure<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Contact details like email addresses and phone numbers are still valuable to cybercriminals, especially when paired with other publicly known information. (<a title=\"Substack Hacked \u2014 What 50 Million Users Need To Know\" href=\"https:\/\/www.forbes.com\/sites\/daveywinder\/2026\/02\/06\/substack-hacked---what-50-million-users-need-to-know\/?utm_source=chatgpt.com\">Forbes<\/a>)<\/p>\n<hr \/>\n<h2><span class=\"ez-toc-section\" id=\"_What_Substack_Is_Doing\"><\/span>\u00a0What Substack Is Doing<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>The company says it has:<\/p>\n<ul>\n<li>Patched the vulnerability that led to the breach<\/li>\n<li>Launched a <strong>full investigation<\/strong><\/li>\n<li>Promised to <strong>improve systems and processes<\/strong> to help prevent future incidents<\/li>\n<li>Sent <strong>direct notification emails<\/strong> to affected users with guidance on caution and security best practices (<a title=\"Substack CEO informs users of a data breach - Yahoo News UK\" href=\"https:\/\/uk.news.yahoo.com\/substack-ceo-informs-users-data-151113124.html?utm_source=chatgpt.com\">Yahoo News UK<\/a>)<\/li>\n<\/ul>\n<p>Substack has not yet publicly disclosed:<\/p>\n<ul>\n<li>The exact number of affected accounts<\/li>\n<li>The precise technical flaw that was exploited<\/li>\n<\/ul>\n<hr \/>\n<h2><span class=\"ez-toc-section\" id=\"_Expert_Commentary_Broader_Context\"><\/span>\u00a0Expert Commentary &amp; Broader Context<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<h3><span class=\"ez-toc-section\" id=\"_Detection_Delay_Is_a_Concern\"><\/span>\u00a0Detection Delay Is a Concern<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Security professionals note that the delay between when the breach occurred and when it was found \u2014 <strong>several months<\/strong> \u2014 raises questions about monitoring and incident detection capabilities. (<a title=\"Substack breach goes undetected for four months | Cybernews\" href=\"https:\/\/cybernews.com\/cybercrime\/substack-breach-undetected-four-months\/?utm_source=chatgpt.com\">Cybernews<\/a>)<\/p>\n<h3><span class=\"ez-toc-section\" id=\"_Even_%E2%80%9CLimited%E2%80%9D_Data_Is_Valuable\"><\/span>\u00a0Even \u201cLimited\u201d Data Is Valuable<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>While email addresses and phone numbers may seem less sensitive than passwords or credit card numbers, they <strong>still pose risk<\/strong> for targeted scams and identity attacks. Experts warn users not to ignore suspicious communication. (<a title=\"Substack breach goes undetected for four months | Cybernews\" href=\"https:\/\/cybernews.com\/cybercrime\/substack-breach-undetected-four-months\/?utm_source=chatgpt.com\">Cybernews<\/a>)<\/p>\n<h3><span class=\"ez-toc-section\" id=\"_Creator_Platforms_Are_Attractive_Targets\"><\/span>\u00a0Creator Platforms Are Attractive Targets<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Services like Substack host large volumes of engaged, professional users \u2014 making them appealing to attackers. As more business and revenue activity moves online, <strong>data protection becomes increasingly critical<\/strong> for digital publishers. (<a title=\"Substack data breach leaks users\u2019 email addresses and phone numbers\" href=\"https:\/\/www.csoonline.com\/article\/4128287\/substack-data-breach-leaks-users-email-addresses-and-phone-numbers.html?utm_source=chatgpt.com\">CSO Online<\/a>)<\/p>\n<hr \/>\n<h2><span class=\"ez-toc-section\" id=\"_What_Users_Should_Do_Next\"><\/span>\u00a0What Users Should Do Next<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>If you have a Substack account:<\/p>\n<p><strong>Be cautious of unsolicited emails and texts<\/strong> asking for login info or offering help.<br \/>\n<strong>Do not click links<\/strong> or provide information unless you\u2019re certain the message is legitimate.<br \/>\n<strong>Change passwords on other services<\/strong> if you reused the same email on sensitive accounts.<br \/>\nConsider enabling <strong>two\u2011factor authentication (2FA)<\/strong> on other accounts where possible.<\/p>\n<hr \/>\n<h3><span class=\"ez-toc-section\" id=\"_Bottom_Line\"><\/span>\u00a0Bottom Line<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Substack has acknowledged a serious <strong>data breach that exposed email addresses, phone numbers, and internal metadata<\/strong>. While it says no financial information or login credentials were taken, the exposure of contact data still poses a security risk, especially for phishing and scam attempts. The incident highlights the importance of vigilanc<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Substack_Confirms_Data_Breach_Exposing_User_Email_Addresses_and_Phone_Numbers_%E2%80%94_Case_Studies_Expert_Commentary\"><\/span><strong>Substack Confirms Data Breach Exposing User Email Addresses and Phone Numbers \u2014 Case Studies &amp; Expert Commentary<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>In early <strong>February 2026<\/strong>, Substack \u2014 the newsletter and publishing platform \u2014 confirmed a <strong>data breach<\/strong> that exposed users\u2019 <strong>email addresses, phone numbers, and some internal metadata<\/strong>. Passwords and financial data were not exposed, but the leak still has serious implications for users and email security.<\/p>\n<p>Below are <strong>illustrative case studies<\/strong> showing how this kind of breach can play out for individuals and organisations, followed by <strong>strategic commentary<\/strong> on the broader impact.<\/p>\n<hr \/>\n<h1><span class=\"ez-toc-section\" id=\"_Case_Study_1_%E2%80%94_Phishing_Targeting_Creators\"><\/span>\u00a0Case Study 1 \u2014 Phishing Targeting Creators<span class=\"ez-toc-section-end\"><\/span><\/h1>\n<p><strong>Scenario:<\/strong><br \/>\nA Substack creator with tens of thousands of subscribers routinely receives many legitimate newsletters and reader emails. Shortly after the breach notification, they begin seeing targeted emails that appear to reference the exact topics they write about, even though they haven\u2019t interacted with those senders before.<\/p>\n<p><strong>What Happened:<\/strong><\/p>\n<ul>\n<li>Attackers used exposed email addresses to craft believable messages.<\/li>\n<li>Emails referenced real\u2011sounding details to gain trust.<\/li>\n<li>Some pretended to be from Substack support asking for \u201cverification.\u201d<\/li>\n<\/ul>\n<p><strong>Risks Illustrated:<\/strong><\/p>\n<ul>\n<li>Sophisticated phishing attempts can look very convincing.<\/li>\n<li>Creators with public profiles are especially attractive targets.<\/li>\n<\/ul>\n<p><strong>Takeaway:<\/strong><br \/>\nUsers should be cautious with messages referencing platform names, services, or account details. Legitimate providers never ask for passwords or sensitive information by email.<\/p>\n<hr \/>\n<h1><span class=\"ez-toc-section\" id=\"_Case_Study_2_%E2%80%94_SMS_Scams_After_Phone_Data_Exposure\"><\/span>\u00a0Case Study 2 \u2014 SMS Scams After Phone Data Exposure<span class=\"ez-toc-section-end\"><\/span><\/h1>\n<p><strong>Scenario:<\/strong><br \/>\nA reader who subscribes to multiple Substack writers receives text messages claiming to be from \u201cSubstack\u201d about \u201csecurity alerts\u201d or \u201crecovery codes.\u201d<\/p>\n<p><strong>What Happened:<\/strong><\/p>\n<ul>\n<li>Exposed phone numbers were leveraged to send SMS phishing (<em>smishing<\/em>).<\/li>\n<li>Messages tried to lure users to fake login pages.<\/li>\n<\/ul>\n<p><strong>Risks Illustrated:<\/strong><\/p>\n<ul>\n<li>Compromised phone numbers increase the risk of <strong>SIM\u2011swap attacks<\/strong> and account recovery scams on other platforms.<\/li>\n<\/ul>\n<p><strong>Takeaway:<\/strong><br \/>\nUsers should <strong>never follow links in unexpected SMS messages<\/strong> and should enable multi\u2011factor authentication (2FA) on accounts that support it.<\/p>\n<hr \/>\n<h1><span class=\"ez-toc-section\" id=\"_Case_Study_3_%E2%80%94_Credential_Reuse_Exploited_Elsewhere\"><\/span>\u00a0Case Study 3 \u2014 Credential Reuse Exploited Elsewhere<span class=\"ez-toc-section-end\"><\/span><\/h1>\n<p><strong>Scenario:<\/strong><br \/>\nA user reused the same email address (from Substack) and password on another service. After the breach, attackers attempted logins on several unrelated accounts.<\/p>\n<p><strong>What Happened:<\/strong><\/p>\n<ul>\n<li>The breach didn\u2019t include passwords, but shared email addresses can be used in <strong>credential\u2011stuffing attacks<\/strong> where attackers try common passwords repeatedly against multiple services.<\/li>\n<\/ul>\n<p><strong>Risks Illustrated:<\/strong><\/p>\n<ul>\n<li>Even when passwords weren\u2019t leaked, <strong>credential reuse magnifies risk<\/strong>.<\/li>\n<\/ul>\n<p><strong>Takeaway:<\/strong><br \/>\nAlways use <strong>unique passwords<\/strong> for each site and a <strong>password manager<\/strong> to reduce reuse.<\/p>\n<hr \/>\n<h1><span class=\"ez-toc-section\" id=\"_Strategic_Commentary\"><\/span>\u00a0Strategic Commentary<span class=\"ez-toc-section-end\"><\/span><\/h1>\n<h2><span class=\"ez-toc-section\" id=\"_1_Contact_Data_Is_Valuable_%E2%80%94_Even_Without_Passwords\"><\/span>\u00a01. <strong>Contact Data Is Valuable \u2014 Even Without Passwords<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>While financial details and passwords weren\u2019t exposed according to Substack, <strong>email addresses and phone numbers alone are still highly valuable<\/strong> to malicious actors.<\/p>\n<ul>\n<li>Email addresses can be used for <strong>targeted phishing<\/strong>, impersonation attacks, and spam.<\/li>\n<li>Phone numbers enable <strong>SMS scams<\/strong> and social\u2011engineering attacks against other services that rely on phone\u2011based recovery.<\/li>\n<\/ul>\n<p><strong>Comment:<\/strong><br \/>\nBreaches of contact data often fuel the next wave of attacks \u2014 not immediately, but over time as attackers refine their targeting.<\/p>\n<hr \/>\n<h2><span class=\"ez-toc-section\" id=\"_2_Detection_Delays_Raise_Security_Questions\"><\/span>\u00a02. <strong>Detection Delays Raise Security Questions<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>The breach occurred in <strong>October 2025<\/strong> but was only discovered in early 2026 \u2014 a gap of months.<\/p>\n<p><strong>Expert view:<\/strong><br \/>\nLong detection windows often indicate that the attacker had time to explore the system quietly. Organisations need better <strong>monitoring, logging, and incident detection<\/strong> to minimise this window.<\/p>\n<p><strong>Comment:<\/strong><br \/>\nUsers shouldn\u2019t assume that just because a company says sensitive data wasn\u2019t accessed, that the breach is \u201cminor.\u201d Early notification and transparency are crucial.<\/p>\n<hr \/>\n<h2><span class=\"ez-toc-section\" id=\"_3_Phishing_and_Social_Engineering_Risk_Is_High_After_Exposure\"><\/span>\u00a03. <strong>Phishing and Social Engineering Risk Is High After Exposure<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Security professionals warn that the breach will lead to <strong>spikes in phishing and smishing attempts<\/strong>.<\/p>\n<ul>\n<li>Attackers use exposed contact information to craft believable messages.<\/li>\n<li>These can reference Substack, familiar newsletters, or community interests.<\/li>\n<\/ul>\n<p><strong>Comment:<\/strong><br \/>\nUsers should treat any unexpected communication with healthy scepticism and verify through official channels before acting.<\/p>\n<hr \/>\n<h2><span class=\"ez-toc-section\" id=\"_4_Shared_Data_Across_Platforms_Increases_Exposure\"><\/span>\u00a04. <strong>Shared Data Across Platforms Increases Exposure<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Many users reuse their email on other accounts and platforms. Exposed contact data can therefore serve as a <em>building block<\/em> for more advanced attacks.<\/p>\n<p><strong>Comment:<\/strong><br \/>\nGood digital hygiene \u2014 including unique passwords, 2FA, and being cautious about phishing \u2014 matters even if a breach doesn\u2019t directly leak financial or login data.<\/p>\n<hr \/>\n<h2><span class=\"ez-toc-section\" id=\"_5_Platforms_with_Large_Active_Communities_Are_Attractive_Targets\"><\/span>\u00a05. <strong>Platforms with Large Active Communities Are Attractive Targets<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Platforms like Substack, which host millions of newsletters and engaged audiences, are attractive to attackers because:<\/p>\n<ul>\n<li>They collect large volumes of user contact data<\/li>\n<li>They power direct communication channels<\/li>\n<li>Community trust increases credibility of phishing lures<\/li>\n<\/ul>\n<p><strong>Comment:<\/strong><br \/>\nThis breach reinforces the need for <strong>industry\u2011wide best practices<\/strong> in platform security and transparency when incidents occur.<\/p>\n<hr \/>\n<h1><span class=\"ez-toc-section\" id=\"_What_Users_Should_Do_Now\"><\/span>\u00a0What Users Should Do Now<span class=\"ez-toc-section-end\"><\/span><\/h1>\n<p><strong>For Individuals<\/strong><br \/>\nBe vigilant for unexpected emails or texts.<br \/>\nAvoid clicking suspicious links or sharing sensitive information.<br \/>\nEnable 2FA wherever possible.<br \/>\nUse unique passwords and consider a password manager.<\/p>\n<p><strong>For Creators and Organisations<\/strong><br \/>\nEducate your audience about phishing and scam tactics.\u00a0Audit your own workflows for password reuse or SMS\u2011based recovery risks.<br \/>\nUpdate contact management practices to segment and protect sensitive lists.<\/p>\n<hr \/>\n<h2><span class=\"ez-toc-section\" id=\"_Final_Thought\"><\/span>\u00a0Final Thought<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>While the Substack breach did <em>not<\/em> expose passwords or financial data, the loss of email addresses and phone numbers still carries <strong>real security risks<\/strong>. Bad actors often use exposed contact data as a launching point for <strong>phishing, impersonation, and broader attacks<\/strong>.<\/p>\n<p>The situation highlights that <strong>data breaches are rarely benign<\/strong> \u2014 and even \u201climited\u201d exposures require vigilance, robust security habits, and proactive communication with users.<\/p>\n<hr \/>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u00a0What Happened Substack, the popular newsletter and publishing platform used by millions of writers and readers, has confirmed that it suffered a data breach. The&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[270,90],"tags":[],"class_list":["post-19023","post","type-post","status-publish","format-standard","hentry","category-digital-marketing","category-news-update"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Substack Confirms Data Breach Exposing User Email Addresses and Phone Numbers - Lite14 Tools &amp; Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/lite14.net\/blog\/2026\/02\/06\/substack-confirms-data-breach-exposing-user-email-addresses-and-phone-numbers\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Substack Confirms Data Breach Exposing User Email Addresses and Phone Numbers - Lite14 Tools &amp; Blog\" \/>\n<meta property=\"og:description\" content=\"\u00a0What Happened Substack, the popular newsletter and publishing platform used by millions of writers and readers, has confirmed that it suffered a data breach. The...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/lite14.net\/blog\/2026\/02\/06\/substack-confirms-data-breach-exposing-user-email-addresses-and-phone-numbers\/\" \/>\n<meta property=\"og:site_name\" content=\"Lite14 Tools &amp; Blog\" \/>\n<meta property=\"article:published_time\" content=\"2026-02-06T16:00:38+00:00\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/lite14.net\/blog\/2026\/02\/06\/substack-confirms-data-breach-exposing-user-email-addresses-and-phone-numbers\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/lite14.net\/blog\/2026\/02\/06\/substack-confirms-data-breach-exposing-user-email-addresses-and-phone-numbers\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/lite14.net\/blog\/#\/schema\/person\/551c62581e407fcec8cf1f76df97b5d2\"},\"headline\":\"Substack Confirms Data Breach Exposing User Email Addresses and Phone Numbers\",\"datePublished\":\"2026-02-06T16:00:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/lite14.net\/blog\/2026\/02\/06\/substack-confirms-data-breach-exposing-user-email-addresses-and-phone-numbers\/\"},\"wordCount\":1515,\"publisher\":{\"@id\":\"https:\/\/lite14.net\/blog\/#organization\"},\"articleSection\":[\"Digital Marketing\",\"News\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/lite14.net\/blog\/2026\/02\/06\/substack-confirms-data-breach-exposing-user-email-addresses-and-phone-numbers\/\",\"url\":\"https:\/\/lite14.net\/blog\/2026\/02\/06\/substack-confirms-data-breach-exposing-user-email-addresses-and-phone-numbers\/\",\"name\":\"Substack Confirms Data Breach Exposing User Email Addresses and Phone Numbers - Lite14 Tools &amp; Blog\",\"isPartOf\":{\"@id\":\"https:\/\/lite14.net\/blog\/#website\"},\"datePublished\":\"2026-02-06T16:00:38+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/lite14.net\/blog\/2026\/02\/06\/substack-confirms-data-breach-exposing-user-email-addresses-and-phone-numbers\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/lite14.net\/blog\/2026\/02\/06\/substack-confirms-data-breach-exposing-user-email-addresses-and-phone-numbers\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/lite14.net\/blog\/2026\/02\/06\/substack-confirms-data-breach-exposing-user-email-addresses-and-phone-numbers\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/lite14.net\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Substack Confirms Data Breach Exposing User Email Addresses and Phone Numbers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/lite14.net\/blog\/#website\",\"url\":\"https:\/\/lite14.net\/blog\/\",\"name\":\"Lite14 Tools &amp; Blog\",\"description\":\"Email Marketing Tools &amp; Digital Marketing Updates\",\"publisher\":{\"@id\":\"https:\/\/lite14.net\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/lite14.net\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/lite14.net\/blog\/#organization\",\"name\":\"Lite14 Tools &amp; Blog\",\"url\":\"https:\/\/lite14.net\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/lite14.net\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/lite14.net\/blog\/wp-content\/uploads\/2025\/09\/cropped-lite-logo.png\",\"contentUrl\":\"https:\/\/lite14.net\/blog\/wp-content\/uploads\/2025\/09\/cropped-lite-logo.png\",\"width\":191,\"height\":178,\"caption\":\"Lite14 Tools &amp; Blog\"},\"image\":{\"@id\":\"https:\/\/lite14.net\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/lite14.net\/blog\/#\/schema\/person\/551c62581e407fcec8cf1f76df97b5d2\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/lite14.net\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/37de671670ea9023731c3f3ef83c84b6d7d6faeffecd87fb98e3ec10aecc15bd?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/37de671670ea9023731c3f3ef83c84b6d7d6faeffecd87fb98e3ec10aecc15bd?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"http:\/\/lite14.net\/blog\"],\"url\":\"https:\/\/lite14.net\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Substack Confirms Data Breach Exposing User Email Addresses and Phone Numbers - Lite14 Tools &amp; Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/lite14.net\/blog\/2026\/02\/06\/substack-confirms-data-breach-exposing-user-email-addresses-and-phone-numbers\/","og_locale":"en_US","og_type":"article","og_title":"Substack Confirms Data Breach Exposing User Email Addresses and Phone Numbers - Lite14 Tools &amp; Blog","og_description":"\u00a0What Happened Substack, the popular newsletter and publishing platform used by millions of writers and readers, has confirmed that it suffered a data breach. The...","og_url":"https:\/\/lite14.net\/blog\/2026\/02\/06\/substack-confirms-data-breach-exposing-user-email-addresses-and-phone-numbers\/","og_site_name":"Lite14 Tools &amp; Blog","article_published_time":"2026-02-06T16:00:38+00:00","author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/lite14.net\/blog\/2026\/02\/06\/substack-confirms-data-breach-exposing-user-email-addresses-and-phone-numbers\/#article","isPartOf":{"@id":"https:\/\/lite14.net\/blog\/2026\/02\/06\/substack-confirms-data-breach-exposing-user-email-addresses-and-phone-numbers\/"},"author":{"name":"admin","@id":"https:\/\/lite14.net\/blog\/#\/schema\/person\/551c62581e407fcec8cf1f76df97b5d2"},"headline":"Substack Confirms Data Breach Exposing User Email Addresses and Phone Numbers","datePublished":"2026-02-06T16:00:38+00:00","mainEntityOfPage":{"@id":"https:\/\/lite14.net\/blog\/2026\/02\/06\/substack-confirms-data-breach-exposing-user-email-addresses-and-phone-numbers\/"},"wordCount":1515,"publisher":{"@id":"https:\/\/lite14.net\/blog\/#organization"},"articleSection":["Digital Marketing","News"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/lite14.net\/blog\/2026\/02\/06\/substack-confirms-data-breach-exposing-user-email-addresses-and-phone-numbers\/","url":"https:\/\/lite14.net\/blog\/2026\/02\/06\/substack-confirms-data-breach-exposing-user-email-addresses-and-phone-numbers\/","name":"Substack Confirms Data Breach Exposing User Email Addresses and Phone Numbers - Lite14 Tools &amp; Blog","isPartOf":{"@id":"https:\/\/lite14.net\/blog\/#website"},"datePublished":"2026-02-06T16:00:38+00:00","breadcrumb":{"@id":"https:\/\/lite14.net\/blog\/2026\/02\/06\/substack-confirms-data-breach-exposing-user-email-addresses-and-phone-numbers\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/lite14.net\/blog\/2026\/02\/06\/substack-confirms-data-breach-exposing-user-email-addresses-and-phone-numbers\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/lite14.net\/blog\/2026\/02\/06\/substack-confirms-data-breach-exposing-user-email-addresses-and-phone-numbers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/lite14.net\/blog\/"},{"@type":"ListItem","position":2,"name":"Substack Confirms Data Breach Exposing User Email Addresses and Phone Numbers"}]},{"@type":"WebSite","@id":"https:\/\/lite14.net\/blog\/#website","url":"https:\/\/lite14.net\/blog\/","name":"Lite14 Tools &amp; Blog","description":"Email Marketing Tools &amp; Digital Marketing Updates","publisher":{"@id":"https:\/\/lite14.net\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/lite14.net\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/lite14.net\/blog\/#organization","name":"Lite14 Tools &amp; Blog","url":"https:\/\/lite14.net\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/lite14.net\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/lite14.net\/blog\/wp-content\/uploads\/2025\/09\/cropped-lite-logo.png","contentUrl":"https:\/\/lite14.net\/blog\/wp-content\/uploads\/2025\/09\/cropped-lite-logo.png","width":191,"height":178,"caption":"Lite14 Tools &amp; Blog"},"image":{"@id":"https:\/\/lite14.net\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/lite14.net\/blog\/#\/schema\/person\/551c62581e407fcec8cf1f76df97b5d2","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/lite14.net\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/37de671670ea9023731c3f3ef83c84b6d7d6faeffecd87fb98e3ec10aecc15bd?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/37de671670ea9023731c3f3ef83c84b6d7d6faeffecd87fb98e3ec10aecc15bd?s=96&d=mm&r=g","caption":"admin"},"sameAs":["http:\/\/lite14.net\/blog"],"url":"https:\/\/lite14.net\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/lite14.net\/blog\/wp-json\/wp\/v2\/posts\/19023","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lite14.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lite14.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lite14.net\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/lite14.net\/blog\/wp-json\/wp\/v2\/comments?post=19023"}],"version-history":[{"count":1,"href":"https:\/\/lite14.net\/blog\/wp-json\/wp\/v2\/posts\/19023\/revisions"}],"predecessor-version":[{"id":19024,"href":"https:\/\/lite14.net\/blog\/wp-json\/wp\/v2\/posts\/19023\/revisions\/19024"}],"wp:attachment":[{"href":"https:\/\/lite14.net\/blog\/wp-json\/wp\/v2\/media?parent=19023"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lite14.net\/blog\/wp-json\/wp\/v2\/categories?post=19023"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lite14.net\/blog\/wp-json\/wp\/v2\/tags?post=19023"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}