Company Details
fifth-third-bank
24,367
200,311
52
53.com
283
FIF_3171297
Completed

Fifth Third Bank Company CyberSecurity Posture
53.comAt Fifth Third Bank, everything we do is rooted in our purpose: to improve the lives of our customers and the well-being of our communities. Since our founding in 1858, we’ve been committed to creating a better financial experience by empowering our customers and clients to achieve what matters most. Our unified strength is grounded in the individual passion and diversity of more than 20,000 employees who work collaboratively to deliver a better tomorrow to everyone we serve. We offer a strong culture, opportunities for growth 401k match, wellness options, comprehensive insurance plans and additional resources you need to build a lasting and rewarding career path here. Headquartered in Cincinnati, Ohio, we are among the largest money managers in the Midwest. We operate four main businesses—Commercial Banking, Branch Banking, Consumer Lending, and Wealth & Asset Management—and a network of financial centers in Ohio, Kentucky, Indiana, Michigan, Illinois, Florida, Tennessee, West Virginia, Georgia, North Carolina and South Carolina. Consumers also have access to approximately 54,000 Fifth Third fee-free ATMs across the United States. Fifth Third Bancorp is a diversified financial services company and is the indirect parent company of Fifth Third Bank, National Association, a federally chartered institution. Explore Fifth Third career opportunities at: https://www.53.com/content/fifth-third/en/careers.html Fifth Third Bank, N.A., Member FDIC. Fifth Third Bank is proud to be an affirmative action/equal opportunity employer. M/F/D/V
Company Details
fifth-third-bank
24,367
200,311
52
53.com
283
FIF_3171297
Completed
Between 750 and 799

FTB Global Score (TPRM)XXXX

Description: Fifth Third Bank fell for a data breach by some of the former employees of the bank. It warned some customers about their personal information being misused by former bank employees. The information included name, Social Security number, driver's license information, mother's maiden name, address, phone number, date of birth, and account numbers. Bank employees involved in wrongdoing were fired.


No incidents recorded for Fifth Third Bank in 2025.
No incidents recorded for Fifth Third Bank in 2025.
No incidents recorded for Fifth Third Bank in 2025.
FTB cyber incidents detection timeline including parent company and subsidiaries

At Fifth Third Bank, everything we do is rooted in our purpose: to improve the lives of our customers and the well-being of our communities. Since our founding in 1858, we’ve been committed to creating a better financial experience by empowering our customers and clients to achieve what matters most. Our unified strength is grounded in the individual passion and diversity of more than 20,000 employees who work collaboratively to deliver a better tomorrow to everyone we serve. We offer a strong culture, opportunities for growth 401k match, wellness options, comprehensive insurance plans and additional resources you need to build a lasting and rewarding career path here. Headquartered in Cincinnati, Ohio, we are among the largest money managers in the Midwest. We operate four main businesses—Commercial Banking, Branch Banking, Consumer Lending, and Wealth & Asset Management—and a network of financial centers in Ohio, Kentucky, Indiana, Michigan, Illinois, Florida, Tennessee, West Virginia, Georgia, North Carolina and South Carolina. Consumers also have access to approximately 54,000 Fifth Third fee-free ATMs across the United States. Fifth Third Bancorp is a diversified financial services company and is the indirect parent company of Fifth Third Bank, National Association, a federally chartered institution. Explore Fifth Third career opportunities at: https://www.53.com/content/fifth-third/en/careers.html Fifth Third Bank, N.A., Member FDIC. Fifth Third Bank is proud to be an affirmative action/equal opportunity employer. M/F/D/V

BlackRock is a global asset manager and technology provider dedicated to helping more and more people experience financial well-being. We help millions of people invest to build savings that serve them throughout their lives. We always start with our clients’ needs and look to offer them more qua

Barclays is a British universal bank. Our vision is to be the UK-centred leader in global finance. We are a diversified bank with comprehensive UK consumer, corporate and wealth and private banking franchises, a leading investment bank and a strong, specialist US consumer bank. Through these five di

Bloomberg is a global leader in business and financial information, delivering trusted data, news, and insights that bring transparency, efficiency, and fairness to markets. The company helps connect influential communities across the global financial ecosystem via reliable technology solutions that

OTKRITIE Financial Corporation is one of the most dynamic and fastest growing investment banks in Russia. The company has been operating on the stock market as a broker, asset manager, financial advisor and investment bank since 1995. OTKRITIE FC has become a trusted partner for many Russian and int

Barclays Investment Bank deploys financial solutions to help our clients with their funding, financing, strategic and risk management needs across sectors, markets and economies. The Investment Bank is comprised of the Investment Banking, International Corporate Banking, Global Markets and Researc

For over 175 years, we've been helping people put love into action. As a mutual company we hold ourselves to the highest standards of transparency, objectivity, and integrity. We’re committed to improving local communities through a culture of giving and volunteerism, supported by our own New York L

KPMG is one of the world’s leading professional services firms and the fastest growing Big Four accounting firm in the United States. With 75+ offices and more than 40,000 employees and partners throughout the US, we’re leading the industry in new and exciting ways. Our size and strength make us muc

A formidable global conglomerate, LOLC Holdings has strategically diversified into key economic growth sectors across financial services, leisure, agriculture and plantations, construction and real estate, manufacturing and trading, technology, research and innovation and strategic investments. The

Morgan Stanley (NYSE: MS) is a leading global financial services firm providing a wide range of investment banking, securities, wealth management and investment management services. With offices in 42 countries, our firm's employees serve clients worldwide including corporations, governments, instit
.png)
Debbie Wheeler, the global chief information security officer at Delta Air Lines, entered the field of cybersecurity almost by accident.
The 4th annual CDO Magazine Global Cybersecurity Leadership Summit rallied 150+ attendees and 35+ speakers at The Westin Cincinnati on...
U.S. regional bank Fifth Third Bancorp reported a 14% jump in third-quarter profit on Friday on the back of robust fee income,...
Whether it's romance scams or job scams, impersonators are looking for ways to trick you into giving them money or sharing your personal...
Fifth Third CEO Tim Spence said discussions to buy regional bank Comerica started a few weeks ago when the latter company's CEO Curtis...
Fifth Third Bancorp (Nasdaq: FITB) and Comerica Incorporated (NYSE: CMA) today announced that they have entered into a definitive merger...
Fifth Third on Monday agreed to buy regional lender Comerica in an all-stock deal valued at $10.9 billion, striking the biggest U.S. bank...
Fifth Third Bancorp has struck a $10.9 billion all‑stock deal to acquire Comerica, creating the ninth‑largest U.S. bank.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Fifth Third Bank is http://www.53.com.
According to Rankiteo, Fifth Third Bank’s AI-generated cybersecurity score is 789, reflecting their Fair security posture.
According to Rankiteo, Fifth Third Bank currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Fifth Third Bank is not certified under SOC 2 Type 1.
According to Rankiteo, Fifth Third Bank does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Fifth Third Bank is not listed as GDPR compliant.
According to Rankiteo, Fifth Third Bank does not currently maintain PCI DSS compliance.
According to Rankiteo, Fifth Third Bank is not compliant with HIPAA regulations.
According to Rankiteo,Fifth Third Bank is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Fifth Third Bank operates primarily in the Financial Services industry.
Fifth Third Bank employs approximately 24,367 people worldwide.
Fifth Third Bank presently has no subsidiaries across any sectors.
Fifth Third Bank’s official LinkedIn profile has approximately 200,311 followers.
Fifth Third Bank is classified under the NAICS code 52, which corresponds to Finance and Insurance.
No, Fifth Third Bank does not have a profile on Crunchbase.
Yes, Fifth Third Bank maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/fifth-third-bank.
As of November 27, 2025, Rankiteo reports that Fifth Third Bank has experienced 1 cybersecurity incidents.
Fifth Third Bank has an estimated 29,517 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Breach.
Detection and Response: The company detects and responds to cybersecurity incidents through an remediation measures with firing of employees involved, and communication strategy with warning customers about the misuse of their personal information..
Title: Fifth Third Bank Data Breach
Description: Fifth Third Bank experienced a data breach where former employees misused customer personal information. The information included names, Social Security numbers, driver's license information, mother's maiden names, addresses, phone numbers, dates of birth, and account numbers. Employees involved were fired.
Type: Data Breach
Attack Vector: Insider Threat
Vulnerability Exploited: Human Error/Insider Threat
Threat Actor: Former Employees
Motivation: Unauthorized Access/Misuse of Information
Common Attack Types: The most common types of attacks the company has faced is Breach.

Data Compromised: Names, Social security numbers, Driver's license information, Mother's maiden names, Addresses, Phone numbers, Dates of birth, Account numbers
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Personal Information and .

Entity Name: Fifth Third Bank
Entity Type: Financial Institution
Industry: Banking

Remediation Measures: Firing of employees involved
Communication Strategy: Warning customers about the misuse of their personal information

Type of Data Compromised: Personal information
Sensitivity of Data: High
Personally Identifiable Information: NamesSocial Security NumbersDriver's License InformationMother's Maiden NamesAddressesPhone NumbersDates of BirthAccount Numbers
Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Firing of employees involved.
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Warning customers about the misuse of their personal information.

Customer Advisories: Warning customers about the misuse of their personal information
Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: was Warning customers about the misuse of their personal information.

Root Causes: Insider Threat
Corrective Actions: Firing of employees involved
Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Firing of employees involved.
Last Attacking Group: The attacking group in the last incident was an Former Employees.
Most Significant Data Compromised: The most significant data compromised in an incident were Names, Social Security Numbers, Driver's License Information, Mother's Maiden Names, Addresses, Phone Numbers, Dates of Birth, Account Numbers and .
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Names, Social Security Numbers, Phone Numbers, Mother's Maiden Names, Driver's License Information, Addresses, Account Numbers and Dates of Birth.
Most Recent Customer Advisory: The most recent customer advisory issued was an Warning customers about the misuse of their personal information.
.png)
Angular is a development platform for building mobile and desktop web applications using TypeScript/JavaScript and other languages. Prior to versions 19.2.16, 20.3.14, and 21.0.1, there is a XSRF token leakage via protocol-relative URLs in angular HTTP clients. The vulnerability is a Credential Leak by App Logic that leads to the unauthorized disclosure of the Cross-Site Request Forgery (XSRF) token to an attacker-controlled domain. Angular's HttpClient has a built-in XSRF protection mechanism that works by checking if a request URL starts with a protocol (http:// or https://) to determine if it is cross-origin. If the URL starts with protocol-relative URL (//), it is incorrectly treated as a same-origin request, and the XSRF token is automatically added to the X-XSRF-TOKEN header. This issue has been patched in versions 19.2.16, 20.3.14, and 21.0.1. A workaround for this issue involves avoiding using protocol-relative URLs (URLs starting with //) in HttpClient requests. All backend communication URLs should be hardcoded as relative paths (starting with a single /) or fully qualified, trusted absolute URLs.
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Uncontrolled Recursion vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft deep ASN.1 structures that trigger unbounded recursive parsing. This leads to a Denial-of-Service (DoS) via stack exhaustion when parsing untrusted DER inputs. This issue has been patched in version 1.3.2.
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Integer Overflow vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft ASN.1 structures containing OIDs with oversized arcs. These arcs may be decoded as smaller, trusted OIDs due to 32-bit bitwise truncation, enabling the bypass of downstream OID-based security decisions. This issue has been patched in version 1.3.2.
Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. Prior to versions 7.0.13 and 8.0.2, working with large buffers in Lua scripts can lead to a stack overflow. Users of Lua rules and output scripts may be affected when working with large buffers. This includes a rule passing a large buffer to a Lua script. This issue has been patched in versions 7.0.13 and 8.0.2. A workaround for this issue involves disabling Lua rules and output scripts, or making sure limits, such as stream.depth.reassembly and HTTP response body limits (response-body-limit), are set to less than half the stack size.
Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. In versions from 8.0.0 to before 8.0.2, a NULL dereference can occur when the entropy keyword is used in conjunction with base64_data. This issue has been patched in version 8.0.2. A workaround involves disabling rules that use entropy in conjunction with base64_data.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.