US Crypto Theft: $90M Stolen from Seized Wallets Linked to Contractor’s Son

by Rachel Kim – Technology Editor

Crypto Bragging Leads to Allegations of $90 Million Government Theft: The Case of John Daghita and CMDSS

A seemingly innocuous online argument over cryptocurrency wealth has spiraled into a major examination involving allegations of a $90 million theft from U.S. government-controlled cryptocurrency wallets. The unfolding saga centers around John Daghita, the son of Dean Daghita, owner of Command Services & Support (CMDSS), a company contracted by the U.S. Marshals Service to manage seized digital assets. The case highlights the vulnerabilities inherent in securing government cryptocurrency holdings and the power of blockchain analysis in uncovering illicit activity.

The Online Dispute and the Initial Revelation

The controversy began with a public dispute on Telegram between cryptocurrency users, one known as “Lick,” who attempted to demonstrate financial superiority by transferring cryptocurrency between wallets. During this display, Lick inadvertently revealed a wallet address that quickly caught the attention of Zachxbt, a prominent crypto detective known for tracing illicit funds on the blockchain [https://zachxbt.com/]. Zachxbt swiftly linked the exposed address to the theft of approximately $90 million in cryptocurrency from wallets held by the U.S.government, containing assets seized from criminal activity. This included a previously reported $20 million theft flagged in October 2024 [https://www.web3isgoinggreat.com/?id=possible-us-government-theft].

The U.S. Department of Justice confirmed in January 2024 that approximately $41 million in bitcoin had been stolen from a government wallet, stemming from the seizure of funds related to the Silk Road marketplace shutdown in 2015 [https://www.justice.gov/usao-sdny/press-release/file/1472991]. While the initial reports focused on $41 million, Zachxbt’s investigation suggests the total stolen amount is significantly higher, reaching around $90 million when factoring in other compromised wallets.

Identifying “Lick” and the Response

Zachxbt publicly alleged that “Lick” is John Daghita, son of Dean Daghita, the owner of CMDSS.Following this report, Lick reportedly attempted to remove his Telegram account, a common tactic used by individuals attempting to conceal their online footprint. however, the damage was already done. In a move perceived as intimidation, Lick then “dusted” Zachxbt’s public crypto wallet with a small amount of cryptocurrency originating from one of the theft addresses. “Dusting” is a technique used to track wallet activity and possibly identify the owner [http://www.web3isgoinggreat.com/glossary#dusting].

CMDSS and it’s Government Contracts

CMDSS, a company that describes itself as “a proven provider of mission-critical services to the Department of Defense and Department of Justice” [https://www.cmdss.us/], secured a contract with the U.S. Marshals Service in October 2024 to manage seized cryptocurrency assets. This contract remains active. The timing of the contract award, coupled with Zachxbt’s allegations linking John Daghita to the theft, raised immediate concerns about potential conflicts of interest and security protocols.

Following the public connection between Daghita and the alleged theft, CMDSS swiftly removed its online presence, further fueling speculation and scrutiny. The company’s website is currently unavailable, and its social media accounts have been deactivated. This action has been widely criticized as an attempt to obstruct the investigation and conceal information.

The Vulnerabilities of Government Crypto Custody

This incident underscores the important challenges governments face in securely storing and managing cryptocurrency assets. Unlike customary financial systems, cryptocurrency wallets are vulnerable to hacking and theft if not properly secured. The U.S. government has been increasingly utilizing cryptocurrency seizures as part of its efforts to combat illicit activity, making the secure custody of these funds paramount.

Experts suggest several potential vulnerabilities that could have been exploited. These include:

* Insufficient Cold Storage: “Cold storage” refers to keeping cryptocurrency offline, significantly reducing the risk of hacking. If a substantial portion of the seized funds was held in hot wallets (connected to the internet), they would have been more vulnerable.
* Weak Key Management: The private keys controlling access to the wallets must be meticulously protected.Compromised keys would allow unauthorized access to the funds.
* Insider Threat: The allegations against John Daghita raise the possibility of an insider threat, where someone with authorized access intentionally or unintentionally facilitated the theft.
* Lack of Multi-Signature Authorization: Implementing multi-signature wallets, requiring multiple approvals for transactions, could have mitigated the risk of a single point of failure.

The Ongoing Investigation and Potential ramifications

The Department of Justice is currently investigating the theft, and the case has drawn attention from lawmakers and cybersecurity experts. The investigation is focusing on how the theft occurred, who was responsible, and weather there were any systemic failures in the government’s cryptocurrency custody procedures.

The ramifications of this incident could be far-reaching. Beyond the financial loss,the theft erodes public trust in the government’s ability to safeguard seized assets. It also raises questions

You may also like

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.