Hacker Exposed for Stealing Over $40M from U.S. Government Chain Assets

iconKuCoinFlash
Share
Share IconShare IconShare IconShare IconShare IconShare IconCopy
AI summary iconSummary

expand icon
A hacker known as John Daghita (alias Lick) has been exposed for siphoning over $40 million from U.S. government-seized crypto assets. The breach, linked to CMDSS—a Virginia-based firm with government IT contracts—showed risk-on assets were targeted in 2024. ZachXBT tracked a $24.9 million theft in March 2024, tied to Bitfinex seized funds. The hacker flaunted his Exodus wallet in a group chat, prompting CMDSS to remove its social media and website. The incident highlights ongoing concerns as MiCA (EU Markets in Crypto-Assets Regulation) moves forward, pushing global oversight into sharper focus.

BlockBeats News: On January 26, on-chain detective ZachXBT revealed how hacker John Daghita (alias Lick) stole over $40 million from addresses containing assets seized by the U.S. government (with the largest single transaction being $24.9 million). John's father owns CMDSS, a company currently holding a valid IT government contract in Virginia, assisting the U.S. Marshals Service in managing and liquidating law enforcement-seized cryptocurrency assets. ZachXBT speculated that John gained access through his father and stole over $40 million in assets from U.S. government addresses around 2024, with the largest theft occurring in March 2024, when he stole $24.9 million in funds seized by the U.S. government from the Bitfinex hack. Additionally, John's addresses are linked to over $90 million in on-chain stolen funds (including victims other than the U.S. government).


Following the exposure by ZachXBT, CMDSS's X account, website, and LinkedIn were all disabled today.


The exposure of John Daghita's identity originated from a recent display of wealth competition in a group chat with another hacker, Dritan Kapplani Jr. During this exchange, Daghita shared his Exodus wallet and transferred funds to demonstrate his wealth. The entire process was recorded in two videos. The wallet address used in this display is linked to the address that stole assets seized by the U.S. Federal Law Enforcement Bureau on the blockchain in March 2024.

Disclaimer: The information on this page may have been obtained from third parties and does not necessarily reflect the views or opinions of KuCoin. This content is provided for general informational purposes only, without any representation or warranty of any kind, nor shall it be construed as financial or investment advice. KuCoin shall not be liable for any errors or omissions, or for any outcomes resulting from the use of this information. Investments in digital assets can be risky. Please carefully evaluate the risks of a product and your risk tolerance based on your own financial circumstances. For more information, please refer to our Terms of Use and Risk Disclosure.