Published

U.S. Marshals investigate son's alleged $40M seized-crypto theft

3 min read
Marina Sokolova
U.S. Marshals investigate son's alleged $40M seized-crypto theft

Key Takeaways

  • 1 U.S. Marshals Service is investigating claims that John 'Lick' Daghita took more than $40 million in cryptocurrency seized by law enforcement.
  • 2 Blockchain investigator ZachXBT traced a wallet holding 12,540 ETH, worth roughly $36.3 million, to Daghita and captured a February 2025 video showing $2.3 million in an Exodus wallet.
  • 3 ZachXBT reported at least $23 million tied to government-seized crypto and said CMDSS — the company led by Daghita's father — holds an active federal IT contract that involves managing seized crypto.

U.S. Marshals Service is probing allegations that John 'Lick' Daghita stole more than $40 million in government-seized cryptocurrency. ZachXBT flagged 12,540 ETH (about $36.3M) and a $2.3M Telegram video as evidence.

The U.S. Marshals Service (USMS) is investigating allegations that John "Lick" Daghita, the son of a services provider to federal agencies, stole more than $40 million in cryptocurrency seized by law enforcement. Blockchain investigator ZachXBT has publicly linked a wallet holding 12,540 ETH—worth roughly $36.3 million—to Daghita and said he reported the matter to authorities. The case centers on wallets reportedly managed by CMDSS, the company whose president is Daghita's father and which holds an active federal IT contract related to seized crypto.

U.S. Marshals Investigate Alleged $40M Crypto Theft by Government Contractor's Son

According to public reporting and ZachXBT's disclosures, the USMS is looking into claims that more than $40 million in confiscated digital assets were taken from wallets tied to a company contracted to assist federal agencies. ZachXBT identified a specific wallet balance in ETH and said he notified authorities after tracing funds. USMS declined to comment further on the ongoing investigation.

Key Evidence: Telegram Video and Blockchain Analysis

ZachXBT published a video recording from a Telegram group chat in which John Daghita allegedly screenshared an Exodus wallet showing about $2.3 million. The investigator also reported tracing a separate address that held 12,540 ETH—valued at roughly $36.3 million—and said at least $23 million was linked to government-seized crypto. In his public posts, ZachXBT noted he received 0.6767 ETH from Daghita and said he would forward it to a U.S. government seizure address.

CMDSS's Role in Government Crypto Operations

Citing public records and the investigator's reporting, ZachXBT wrote that CMDSS currently holds an active federal IT contract in Virginia to assist with managing and disposing of seized crypto assets. The company's connection to the alleged wallet access is a central element of the inquiry, though public reporting does not establish how access was obtained. Neither CMDSS nor related federal departments had provided comments in initial reporting.

ZachXBT's Investigation and Public Disclosures

ZachXBT has shared blockchain traces and recordings publicly and stated he alerted authorities about the addresses he linked to Daghita. In the Telegram recording the investigator posted, another participant mocked Daghita while funds moved between addresses, and ZachXBT said the recording shows control of both wallets. The investigator emphasized that the traced funds included amounts tied to seizures the government reported in 2024 and 2025.

Why this matters

For individual miners and small operators, this case highlights how custody and access to wallets can become central in legal investigations when seized assets are involved. Even if you mine in Russia and do not hold government-seized assets, the story underlines that weak access controls and unclear custody arrangements can create legal and operational risks. At the sector level, cases like this push attention on how third parties and contractors manage private keys and asset custody, which can affect trust in service providers.

What to do?

If you run from one to a thousand mining devices, prioritize clear, tested procedures for securing any crypto you control and for interacting with third-party services. Use hardware wallets or well-audited custodial solutions for long-term holdings, keep private keys offline when possible, and restrict access to wallet management to named, authenticated individuals. Regularly monitor on-chain activity for addresses you control and keep records of custody arrangements and communications with service providers to simplify any future inquiries.

For further reading on related cases and arrests that involved traced crypto, see reporting on an arrest in $6M case and a separate piece detailing a Coinbase theft that may help illustrate investigative methods used in tracing stolen funds.

Frequently Asked Questions

Who is under investigation?

Public reporting says the U.S. Marshals Service is investigating John "Lick" Daghita over allegations he took more than $40 million in cryptocurrency seized by law enforcement.

What evidence has been reported publicly?

Blockchain investigator ZachXBT published blockchain traces identifying a wallet with 12,540 ETH (roughly $36.3 million), captured a Telegram video showing about $2.3 million in an Exodus wallet, and reported at least $23 million tied to government-seized crypto.

What is CMDSS's role in this story?

CMDSS, whose president is Dean Daghita, is reported to hold an active federal IT contract to assist with managing seized crypto, and public reporting links wallets managed by CMDSS to the investigation.

Related Articles