$40 Million Crypto Heist: Inside the Government Seizure Address Scandal
Federal Investigation Unfolds as IT Contractor’s Son Accused of Massive Cryptocurrency Theft
In a shocking development that has rocked both the cryptocurrency sector and federal law enforcement circles, a major crypto scandal has emerged involving the alleged theft of over $40 million from government seizure addresses. At the center of the controversy is John Daghita, known in online communities as “Lick,” who allegedly leveraged family connections to gain unauthorized access to sensitive cryptocurrency wallets managed on behalf of U.S. government agencies.
The case highlights critical vulnerabilities in the government’s approach to securing seized digital assets and raises serious questions about oversight in federal contracting. With millions in stolen funds and potential national security implications, this developing story represents one of the most significant breaches of government-managed cryptocurrency in recent history.
The Inside Job: How Government Seizure Addresses Were Compromised
The alleged theft’s sophistication lies in its simplicity – family connections that provided unprecedented access to highly sensitive digital assets. According to investigators, Daghita exploited his father’s position as the head of CMDSS, a Virginia-based IT firm that had been awarded a lucrative contract in October 2024 to assist the U.S. Marshals Service (USMS) with the management and disposition of seized and forfeited cryptocurrency assets.
Renowned blockchain investigator ZachXBT has meticulously traced at least $23 million to a single wallet directly linked to Daghita. This digital wallet connects to suspected thefts totaling more than $90 million, with illicit activities spanning throughout 2024 and extending into late 2025. “Meet the threat actor John (Lick), who was caught flexing $23M in a wallet address directly tied to $90M+ in suspected thefts from the U.S. Government in 2024 and multiple other unidentified victims from November 2025 to December 2025,” ZachXBT posted on social media platform X.
The investigation has revealed particularly brazen behavior by Daghita, who reportedly remained active on Telegram even as investigations intensified, flaunting assets connected to the theft and interacting with public addresses that were under active investigation. In what appears to be an attempt to cover his tracks after public exposure, Daghita quickly removed NFT usernames from his Telegram account and changed his screen name, complicating efforts to trace the stolen funds through social media footprints.
Corporate Damage Control as Federal Contracts Face Scrutiny
The fallout from the scandal was swift and dramatic for CMDSS. As news of the investigation spread, the company deleted its social media presence on X (formerly Twitter) and LinkedIn, while simultaneously scrubbing its website of all employee and team information. “Update: The CMDSS company X account, website, & LinkedIn were all just deactivated,” noted ZachXBT in a follow-up post, documenting the company’s apparent attempt to distance itself from the growing controversy.
This digital vanishing act comes as particularly concerning given CMDSS’s extensive government contracting history. The firm has maintained active contracts not only with the USMS but also with the Department of Defense and the Department of Justice over the years. The broad access potentially granted to the company raises alarming questions about how much sensitive information or digital assets may have been compromised before the scandal came to light.
Cybersecurity experts specializing in government contracting have expressed concern about the vetting process for contractors handling sensitive digital assets. “This case exposes a critical gap in the government’s approach to cryptocurrency management,” said Dr. Eleanor Castillo, Director of the Digital Asset Security Institute. “When we entrust private entities with keys to seized assets worth millions, the verification process must be absolutely airtight – not just for the company, but for anyone who might have proximity to those keys.”
National Security Implications and Cryptocurrency Custody Vulnerabilities
The Daghita case transcends ordinary financial crime, highlighting fundamental vulnerabilities in cryptocurrency custody arrangements, even within government-sanctioned frameworks. Cryptocurrency seizures have become increasingly common as law enforcement agencies target illicit activities ranging from ransomware operations to darknet marketplaces. These seized assets must be securely stored until cases are resolved or assets are auctioned – creating a complex custody challenge for government agencies often unfamiliar with digital asset security best practices.
“Even with sophisticated oversight protocols in place, human connections and insider access can pose significant risks that technical safeguards cannot fully mitigate,” explained Marcus Hernandez, former advisor to the Treasury Department on digital asset security. “What makes this case particularly troubling is that it appears to exploit a trust relationship between the government and a contractor that had passed initial security screening.”
The incident has prompted calls from congressional lawmakers for an immediate review of all government contracts involving cryptocurrency custody or management. Senator Catherine Blakely of the Senate Banking Committee has announced plans for hearings on the matter, stating: “When taxpayers entrust government agencies with securing billions in seized digital assets, we need absolute certainty that proper controls are in place. This apparent breach suggests a systemic failure requiring immediate attention.”
Investigation Widens as Authorities Track Missing Millions
Federal investigators are now pursuing multiple angles in the case, examining both the technical and organizational aspects of the alleged theft. Law enforcement agencies, including the FBI’s Cyber Division and specialists from the Financial Crimes Enforcement Network (FinCEN), are reportedly coordinating efforts to track the movement of funds across various blockchain networks and exchange platforms.
Blockchain analytics firms have been engaged to assist in following the complex web of transactions that appear designed to obscure the destination of the stolen cryptocurrency. Early analysis suggests sophisticated laundering techniques, including the use of mixing services, cross-chain bridges, and potentially privacy-focused cryptocurrencies to complicate tracing efforts. Despite these obstacles, investigators have expressed cautious optimism about eventual asset recovery, noting that blockchain’s permanent record provides advantages not present in traditional financial crimes.
“While cryptocurrency theft presents unique challenges, the immutable nature of blockchain transactions means evidence of the crime is permanently preserved,” noted Special Agent Ramona Curtis in a press briefing. “Even with sophisticated obfuscation techniques, these digital breadcrumbs often lead back to identifiable exit points where assets are converted to fiat currency or used for purchases.”
Implications for Future Government Handling of Digital Assets
This scandal emerges at a critical juncture for government management of digital assets. As federal agencies increasingly seize cryptocurrency in enforcement actions, the systems for secure custody remain underdeveloped compared to the sophisticated protocols established for traditional assets. The Daghita case serves as a stark reminder of the unique security challenges presented by digital assets, where a single compromised private key can result in immediate, irreversible losses of millions.
Cryptocurrency industry leaders have responded by calling for improved public-private partnerships in managing seized digital assets. “The government needs specialized expertise in this area, but must implement rigorous security protocols and oversight mechanisms when engaging private contractors,” said Jennifer Martinez, Executive Director of the Digital Asset Policy Coalition. “Multi-signature arrangements, tiered access controls, and regular third-party audits should be mandatory minimums for any entity handling government-seized cryptocurrency.”
As the investigation continues to unfold, this case will likely reshape federal approaches to digital asset management. John Daghita’s alleged exploitation of insider access represents one of the most significant breaches of government-managed cryptocurrency to date – a sobering reminder that in the rapidly evolving world of digital assets, security vulnerabilities often lie not in the technology itself, but in the human systems built around it.
With millions still unrecovered and the potential for additional victims yet to be identified, this developing story stands as a watershed moment in the ongoing challenge of securing digital assets in the public sector. For government agencies and cryptocurrency stakeholders alike, the lessons from this breach will likely influence security protocols and oversight mechanisms for years to come.



