Badge
11,371 badges added since 01 January 2025
ISO 27001 Certificate
SOC 1 Type I Certificate
SOC 2 Type II Certificate
PCI DSS
HIPAA
RGPD
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions
ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

At Fifth Third Bank, everything we do is rooted in our purpose: to improve the lives of our customers and the well-being of our communities. Since our founding in 1858, we’ve been committed to creating a better financial experience by empowering our customers and clients to achieve what matters most. Our unified strength is grounded in the individual passion and diversity of more than 20,000 employees who work collaboratively to deliver a better tomorrow to everyone we serve. We offer a strong culture, opportunities for growth 401k match, wellness options, comprehensive insurance plans and additional resources you need to build a lasting and rewarding career path here. Headquartered in Cincinnati, Ohio, we are among the largest money managers in the Midwest. We operate four main businesses—Commercial Banking, Branch Banking, Consumer Lending, and Wealth & Asset Management—and a network of financial centers in Ohio, Kentucky, Indiana, Michigan, Illinois, Florida, Tennessee, West Virginia, Georgia, North Carolina and South Carolina. Consumers also have access to approximately 54,000 Fifth Third fee-free ATMs across the United States. Fifth Third Bancorp is a diversified financial services company and is the indirect parent company of Fifth Third Bank, National Association, a federally chartered institution. Explore Fifth Third career opportunities at: https://www.53.com/content/fifth-third/en/careers.html Fifth Third Bank, N.A., Member FDIC. Fifth Third Bank is proud to be an affirmative action/equal opportunity employer. M/F/D/V

Fifth Third Bank A.I CyberSecurity Scoring

FTB

Company Details

Linkedin ID:

fifth-third-bank

Employees number:

24,630

Number of followers:

206,571

NAICS:

52

Industry Type:

Financial Services

Homepage:

53.com

IP Addresses:

283

Company ID:

FIF_3171297

Scan Status:

Completed

AI scoreFTB Risk Score (AI oriented)

Between 750 and 799

https://images.rankiteo.com/companyimages/fifth-third-bank.jpeg
FTB Financial Services
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscoreFTB Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/fifth-third-bank.jpeg
FTB Financial Services
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

FTB Company CyberSecurity News & History

Past Incidents
1
Attack Types
1
EntityTypeSeverityImpactSeenBlog DetailsSupply Chain SourceIncident DetailsView
Fifth Third BankBreach60302/2020NA
Rankiteo Explanation :
Attack with significant impact with internal employee data leaks

Description: Fifth Third Bank fell for a data breach by some of the former employees of the bank. It warned some customers about their personal information being misused by former bank employees. The information included name, Social Security number, driver's license information, mother's maiden name, address, phone number, date of birth, and account numbers. Bank employees involved in wrongdoing were fired.

Fifth Third Bank
Breach
Severity: 60
Impact: 3
Seen: 02/2020
Blog:
Supply Chain Source: NA
Rankiteo Explanation
Attack with significant impact with internal employee data leaks

Description: Fifth Third Bank fell for a data breach by some of the former employees of the bank. It warned some customers about their personal information being misused by former bank employees. The information included name, Social Security number, driver's license information, mother's maiden name, address, phone number, date of birth, and account numbers. Bank employees involved in wrongdoing were fired.

Ailogo

FTB Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for FTB

Incidents vs Financial Services Industry Average (This Year)

No incidents recorded for Fifth Third Bank in 2026.

Incidents vs All-Companies Average (This Year)

No incidents recorded for Fifth Third Bank in 2026.

Incident Types FTB vs Financial Services Industry Avg (This Year)

No incidents recorded for Fifth Third Bank in 2026.

Incident History — FTB (X = Date, Y = Severity)

FTB cyber incidents detection timeline including parent company and subsidiaries

FTB Company Subsidiaries

SubsidiaryImage

At Fifth Third Bank, everything we do is rooted in our purpose: to improve the lives of our customers and the well-being of our communities. Since our founding in 1858, we’ve been committed to creating a better financial experience by empowering our customers and clients to achieve what matters most. Our unified strength is grounded in the individual passion and diversity of more than 20,000 employees who work collaboratively to deliver a better tomorrow to everyone we serve. We offer a strong culture, opportunities for growth 401k match, wellness options, comprehensive insurance plans and additional resources you need to build a lasting and rewarding career path here. Headquartered in Cincinnati, Ohio, we are among the largest money managers in the Midwest. We operate four main businesses—Commercial Banking, Branch Banking, Consumer Lending, and Wealth & Asset Management—and a network of financial centers in Ohio, Kentucky, Indiana, Michigan, Illinois, Florida, Tennessee, West Virginia, Georgia, North Carolina and South Carolina. Consumers also have access to approximately 54,000 Fifth Third fee-free ATMs across the United States. Fifth Third Bancorp is a diversified financial services company and is the indirect parent company of Fifth Third Bank, National Association, a federally chartered institution. Explore Fifth Third career opportunities at: https://www.53.com/content/fifth-third/en/careers.html Fifth Third Bank, N.A., Member FDIC. Fifth Third Bank is proud to be an affirmative action/equal opportunity employer. M/F/D/V

Loading...
similarCompanies

FTB Similar Companies

IIFL (India Infoline Group)

IIFL group is one of India's largest diversified financial services conglomerates with three listed entities - IIFL Finance, IIFL Securities and 360 ONE Wealth & Asset Management. Founded in 1995 by Nirmal Jain as a small research house, today IIFL Group employs over 40000 people and caters to over

Bank of America Merrill Lynch

From local communities to global markets, we are dedicated to shaping the future responsibly and helping clients thrive in a changing world. “Bank of America Merrill Lynch” is the marketing name for the global banking and global markets businesses of Bank of America Corporation. Bank of America is

Marsh McLennan

Marsh McLennan (NYSE: MMC) is a global leader in risk, strategy and people, advising clients in 130 countries across four businesses: Marsh, Guy Carpenter, Mercer and Oliver Wyman. With annual revenue of $23 billion and more than 85,000 colleagues,

Ally Financial Inc. (NYSE: ALLY) is a leading digital financial services company and a top 25 U.S. financial holding company offering financial products for consumers, businesses, automotive dealers and corporate clients. NMLS #3015 | #181005 | https://www.nmlsconsumeraccess.org/ Ally's legacy da

Principal Financial Group

Principal Financial Group® is dedicated to improving the wealth and well-being of people and businesses around the world—helping more than 62M customers plan, protect, invest, and retire as of December 31, 2023. Along the way, we commit to supporting the communities where we do business. Improving o

CIMB Group is a leading ASEAN universal bank, one of the largest Asian investment banks and one of the world's largest Islamic banks. We are headquartered in Kuala Lumpur, Malaysia and offer consumer banking, commercial banking, wholesale banking, Islamic banking, and asset management products and

Global Payments Inc.

Global Payments (NYSE: GPN) is a leading payment technology and software company that powers commerce for businesses of all sizes worldwide. We help businesses grow with confidence by delivering innovative solutions that enable seamless payment acceptance, smarter operations and exceptional client e

Shriram Finance Limited

Shriram Finance is the country’s biggest retail NBFC offering credit solutions for commercial vehicles, two-wheeler loans, car loans, home loans, gold loans, personal and small business loans. We are part of the 50-year-old Shriram Group, a financial conglomerate that has emerged as a trusted partne

Bloomberg

Bloomberg is a global leader in business and financial information, delivering trusted data, news, and insights that bring transparency and efficiency, and fairness to markets. We help connect influential communities across the global financial ecosystem via reliable technology solutions that enable

newsone

FTB CyberSecurity News

January 06, 2026 06:32 PM
Fifth Third Shareholders and Comerica Stockholders Vote to Approve Combination

Today, shareholders of Fifth Third Bancorp (Nasdaq: FITB) and stockholders of Comerica Incorporated (NYSE: CMA) voted separately to approve...

December 11, 2025 08:00 AM
Fifth Third partners with Brex to power its commercial card offering

Fifth Third Bank has inked a deal with US fintech Brex to power its new corporate card offering. The deal will enable Fifth Third's...

December 03, 2025 08:00 AM
Tricolor Creditors Seek Probe Into JPMorgan, Fifth Third

A group of bondholders wants to know whether the subprime auto lender's bank lenders had advantaged information about the now bankrupt...

November 14, 2025 08:00 AM
Delta Air Lines CISO Debbie Wheeler receives GeorgiaCISO ORBIE Leadership Award

Debbie Wheeler, the global chief information security officer at Delta Air Lines, entered the field of cybersecurity almost by accident.

November 13, 2025 08:00 AM
RaceTrac hires Ameet Shetty as chief information officer

Former Pilot Flying J executive brings 29 years of finance and technology experience to convenience-store chain's newly created CIO role.

October 30, 2025 07:00 AM
October 2025: Top five fintech M&A stories of the month

FinTech Futures takes a look back at five of the top fintech M&A stories in October, featuring HSBC, S&P Global, Goldman Sachs, Ripple,...

October 17, 2025 07:00 AM
Leaders Shift Into Overdrive at CDO Magazine’s Global Cybersecurity Summit

The 4th annual CDO Magazine Global Cybersecurity Leadership Summit rallied 150+ attendees and 35+ speakers at The Westin Cincinnati on...

October 10, 2025 07:00 AM
Top fintech news stories of the week: 10 October 2025

Our pick of the top fintech news stories this week includes Santander, Coinbase, HSBC, Fifth Third, Feedzai, and more.

October 06, 2025 07:00 AM
Fifth Third agrees $10.9bn deal to acquire Comerica Bank

Fifth Third has agreed to acquire Comerica Bank in a transaction valued at $10.9 billion, creating the ninth-largest bank in the US.

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

FTB CyberSecurity History Information

Official Website of Fifth Third Bank

The official website of Fifth Third Bank is http://www.53.com.

Fifth Third Bank’s AI-Generated Cybersecurity Score

According to Rankiteo, Fifth Third Bank’s AI-generated cybersecurity score is 792, reflecting their Fair security posture.

How many security badges does Fifth Third Bank’ have ?

According to Rankiteo, Fifth Third Bank currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Has Fifth Third Bank been affected by any supply chain cyber incidents ?

According to Rankiteo, Fifth Third Bank has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.

Does Fifth Third Bank have SOC 2 Type 1 certification ?

According to Rankiteo, Fifth Third Bank is not certified under SOC 2 Type 1.

Does Fifth Third Bank have SOC 2 Type 2 certification ?

According to Rankiteo, Fifth Third Bank does not hold a SOC 2 Type 2 certification.

Does Fifth Third Bank comply with GDPR ?

According to Rankiteo, Fifth Third Bank is not listed as GDPR compliant.

Does Fifth Third Bank have PCI DSS certification ?

According to Rankiteo, Fifth Third Bank does not currently maintain PCI DSS compliance.

Does Fifth Third Bank comply with HIPAA ?

According to Rankiteo, Fifth Third Bank is not compliant with HIPAA regulations.

Does Fifth Third Bank have ISO 27001 certification ?

According to Rankiteo,Fifth Third Bank is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of Fifth Third Bank

Fifth Third Bank operates primarily in the Financial Services industry.

Number of Employees at Fifth Third Bank

Fifth Third Bank employs approximately 24,630 people worldwide.

Subsidiaries Owned by Fifth Third Bank

Fifth Third Bank presently has no subsidiaries across any sectors.

Fifth Third Bank’s LinkedIn Followers

Fifth Third Bank’s official LinkedIn profile has approximately 206,571 followers.

NAICS Classification of Fifth Third Bank

Fifth Third Bank is classified under the NAICS code 52, which corresponds to Finance and Insurance.

Fifth Third Bank’s Presence on Crunchbase

No, Fifth Third Bank does not have a profile on Crunchbase.

Fifth Third Bank’s Presence on LinkedIn

Yes, Fifth Third Bank maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/fifth-third-bank.

Cybersecurity Incidents Involving Fifth Third Bank

As of January 21, 2026, Rankiteo reports that Fifth Third Bank has experienced 1 cybersecurity incidents.

Number of Peer and Competitor Companies

Fifth Third Bank has an estimated 30,812 peer or competitor companies worldwide.

What types of cybersecurity incidents have occurred at Fifth Third Bank ?

Incident Types: The types of cybersecurity incidents that have occurred include Breach.

How does Fifth Third Bank detect and respond to cybersecurity incidents ?

Detection and Response: The company detects and responds to cybersecurity incidents through an remediation measures with firing of employees involved, and communication strategy with warning customers about the misuse of their personal information..

Incident Details

Can you provide details on each incident ?

Incident : Data Breach

Title: Fifth Third Bank Data Breach

Description: Fifth Third Bank experienced a data breach where former employees misused customer personal information. The information included names, Social Security numbers, driver's license information, mother's maiden names, addresses, phone numbers, dates of birth, and account numbers. Employees involved were fired.

Type: Data Breach

Attack Vector: Insider Threat

Vulnerability Exploited: Human Error/Insider Threat

Threat Actor: Former Employees

Motivation: Unauthorized Access/Misuse of Information

What are the most common types of attacks the company has faced ?

Common Attack Types: The most common types of attacks the company has faced is Breach.

Impact of the Incidents

What was the impact of each incident ?

Incident : Data Breach FIF212201222

Data Compromised: Names, Social security numbers, Driver's license information, Mother's maiden names, Addresses, Phone numbers, Dates of birth, Account numbers

What types of data are most commonly compromised in incidents ?

Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Personal Information and .

Which entities were affected by each incident ?

Incident : Data Breach FIF212201222

Entity Name: Fifth Third Bank

Entity Type: Financial Institution

Industry: Banking

Response to the Incidents

What measures were taken in response to each incident ?

Incident : Data Breach FIF212201222

Remediation Measures: Firing of employees involved

Communication Strategy: Warning customers about the misuse of their personal information

Data Breach Information

What type of data was compromised in each breach ?

Incident : Data Breach FIF212201222

Type of Data Compromised: Personal information

Sensitivity of Data: High

Personally Identifiable Information: NamesSocial Security NumbersDriver's License InformationMother's Maiden NamesAddressesPhone NumbersDates of BirthAccount Numbers

What measures does the company take to prevent data exfiltration ?

Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Firing of employees involved.

Investigation Status

How does the company communicate the status of incident investigations to stakeholders ?

Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Warning customers about the misuse of their personal information.

Stakeholder and Customer Advisories

Were there any advisories issued to stakeholders or customers for each incident ?

Incident : Data Breach FIF212201222

Customer Advisories: Warning customers about the misuse of their personal information

What advisories does the company provide to stakeholders and customers following an incident ?

Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: was Warning customers about the misuse of their personal information.

Post-Incident Analysis

What were the root causes and corrective actions taken for each incident ?

Incident : Data Breach FIF212201222

Root Causes: Insider Threat

Corrective Actions: Firing of employees involved

What corrective actions has the company taken based on post-incident analysis ?

Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Firing of employees involved.

Additional Questions

General Information

Who was the attacking group in the last incident ?

Last Attacking Group: The attacking group in the last incident was an Former Employees.

Impact of the Incidents

What was the most significant data compromised in an incident ?

Most Significant Data Compromised: The most significant data compromised in an incident were Names, Social Security Numbers, Driver's License Information, Mother's Maiden Names, Addresses, Phone Numbers, Dates of Birth, Account Numbers and .

Data Breach Information

What was the most sensitive data compromised in a breach ?

Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Addresses, Social Security Numbers, Names, Dates of Birth, Account Numbers, Phone Numbers, Driver's License Information and Mother's Maiden Names.

Stakeholder and Customer Advisories

What was the most recent customer advisory issued ?

Most Recent Customer Advisory: The most recent customer advisory issued was an Warning customers about the misuse of their personal information.

cve

Latest Global CVEs (Not Company-Specific)

Description

SummaryA command injection vulnerability (CWE-78) has been found to exist in the `wrangler pages deploy` command. The issue occurs because the `--commit-hash` parameter is passed directly to a shell command without proper validation or sanitization, allowing an attacker with control of `--commit-hash` to execute arbitrary commands on the system running Wrangler. Root causeThe commitHash variable, derived from user input via the --commit-hash CLI argument, is interpolated directly into a shell command using template literals (e.g.,  execSync(`git show -s --format=%B ${commitHash}`)). Shell metacharacters are interpreted by the shell, enabling command execution. ImpactThis vulnerability is generally hard to exploit, as it requires --commit-hash to be attacker controlled. The vulnerability primarily affects CI/CD environments where `wrangler pages deploy` is used in automated pipelines and the --commit-hash parameter is populated from external, potentially untrusted sources. An attacker could exploit this to: * Run any shell command. * Exfiltrate environment variables. * Compromise the CI runner to install backdoors or modify build artifacts. Credits Disclosed responsibly by kny4hacker. Mitigation * Wrangler v4 users are requested to upgrade to Wrangler v4.59.1 or higher. * Wrangler v3 users are requested to upgrade to Wrangler v3.114.17 or higher. * Users on Wrangler v2 (EOL) should upgrade to a supported major version.

Risk Information
cvss4
Base: 7.7
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).

Risk Information
cvss3
Base: 8.2
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
Description

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle VM VirtualBox accessible data as well as unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:L).

Risk Information
cvss3
Base: 8.1
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:L
Description

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).

Risk Information
cvss3
Base: 8.2
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
Description

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).

Risk Information
cvss3
Base: 8.2
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=fifth-third-bank' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge