TheCryptoUpdates
Crypto Scams

Contractor’s son arrested for stealing $46M in seized government crypto

Government Contractor’s Son Accused of Massive Crypto Theft

John Daghita, known online as “Lick,” was arrested by the FBI in the Caribbean today. He’s accused of stealing around $46 million worth of cryptocurrency that had been seized by U.S. authorities. The arrest follows an investigation that began when blockchain investigator ZachXBT connected the dots between various wallet addresses.

What makes this case particularly interesting is how Daghita allegedly gained access. His father, Dean Daghita, headed Command Services & Support, Inc., a company contracted by the Department of Justice and Department of Defense to handle asset disposal. John worked there as an employee, and investigators believe he used that position to transfer confiscated cryptocurrencies to his personal wallets.

The Unraveling of the Scheme

The theft apparently started back in 2024, but Daghita remained anonymous until January 2026. That’s when he made what might have been a critical mistake. He reportedly boasted about his success to another confessed thief named Dritan Kapplani Jr. During their conversation, Daghita revealed his wallet address.

ZachXBT, who previously exposed the Axiom insider trading case, obtained a recording of this interaction. He then traced the wallet address and found connections to several scams. More importantly, he linked it to a U.S. government address from which digital assets had been siphoned in 2024. The trail led directly back to the seized assets Daghita’s father’s company was supposed to be managing.

A Pattern of Security Failures

This case isn’t an isolated incident in the crypto world. It highlights what seems to be a recurring problem with security around digital assets, even when they’re in government hands. Just recently, South Korea’s tax agency accidentally revealed its virtual asset wallet seed phrase online, leading to the loss of $4.8 million in tokens.

Earlier this year, Apple warned iOS users about the “Coruna” exploit, which targeted crypto wallet seed phrases on phones running certain iOS versions. That malware affected at least 42,000 devices. These incidents suggest that security practices around crypto storage and management might need more attention, especially when large sums are involved.

Broader Implications

What strikes me about this case is the insider nature of the alleged theft. When contractors handle sensitive assets, there’s always some risk, but $46 million is a staggering amount. It raises questions about oversight procedures for government-contracted crypto management.

The fact that Daghita felt comfortable enough to brag about his theft suggests he might have thought he was untouchable. Or perhaps he underestimated how traceable blockchain transactions can be when someone knows what they’re looking for.

I think this case will likely prompt some reevaluation of how seized crypto assets are handled. When you consider that similar schemes seem to be “running rampant” according to the original article, there’s clearly room for improvement in security protocols. The balance between accessibility for legitimate purposes and protection against theft is tricky, but incidents like this show why it matters.

As more governments and institutions hold cryptocurrencies, whether seized or otherwise, they’ll need to develop more robust systems. The decentralized nature of blockchain doesn’t eliminate the need for traditional security measures around access and authorization. If anything, it might require even more careful attention to who has access to private keys and seed phrases.

Loading

Related posts

France leads global crypto kidnapping cases with 19 attacks in 2025

Timm

Crypto Scams | Singaporean Investors loose $78,000 through Bitcoin Investment Scams

Kesarwani

North Korean Hackers’ Crypto Laundering Rampage: Inside the $1.4 Billion Bybit Breach and the Fallout on THORChain

Jack
Close No menu locations found.