
ZachXBT has identified John “Lick” Daghita and the son of a CMDSS contractor as the person behind the theft of over $40M in crypto.
Author: Sahil Thakur
26th January 2026 – Blockchain investigator ZachXBT has identified John Daghita, known online as “Lick” and the son of a CMDSS contractor as the person behind the theft of over $40 million in cryptocurrency from U.S. government seizure wallets. ZachXBT shared the findings in a detailed thread, revealing how Daghita’s wallet activity matched addresses linked to stolen funds.
Rewrite this –High Signal Summary For A Quick Glance
wassieloyer
@wassielawyer
@zachxbt Hold up lmao so his dad manages liquidation of stolen assets from the US govt and this kid steals those stolen assets from his dad? And he only got caught bc he just had to flex it to some other anon criminal in a crime dick measuring contest? Jesus Christ.
In case you are curious how John Daghita (Lick) was able to steal $40M+ from US government seizure addresses. John’s dad owns CMDSS, which currently has an active IT government contract in Virginia. CMMDS was awarded a contract to assist the USMS in managing/disposing of https://t.co/PV0IkSuhVy https://t.co/lzR2a1aidA
04:00 PM·Jan 25, 2026
roo
@roobzey
@zachxbt doing my research on what the cmdss is https://t.co/ToH2K3lEik

In case you are curious how John Daghita (Lick) was able to steal $40M+ from US government seizure addresses. John’s dad owns CMDSS, which currently has an active IT government contract in Virginia. CMMDS was awarded a contract to assist the USMS in managing/disposing of https://t.co/PV0IkSuhVy https://t.co/lzR2a1aidA
03:09 PM·Jan 25, 2026
IcoBeast.eth🦇🔊
@icobeast
@zachxbt Imagine getting your dad arrested and put away for decades on federal charges because you couldn’t handle some losers on the internet calling you poor 😂
In case you are curious how John Daghita (Lick) was able to steal $40M+ from US government seizure addresses. John’s dad owns CMDSS, which currently has an active IT government contract in Virginia. CMMDS was awarded a contract to assist the USMS in managing/disposing of https://t.co/PV0IkSuhVy https://t.co/lzR2a1aidA
03:01 PM·Jan 25, 2026
Steady attention without excessive speculation.
The stolen crypto came from government-held wallets connected to past enforcement actions, such as the Silk Road and Bitfinex cases. These wallets, managed by agencies like the U.S. Marshals Service (USMS), were meant to securely hold confiscated assets. However, this breach exposed serious flaws in how federal agencies store and protect digital assets.
ZachXBT’s investigation began after Daghita publicly showed off a wallet holding $23 million. On-chain analysis linked that wallet to over $90 million in suspicious movements, including the $40 million siphoned directly from government wallets. The transactions pointed to insider access, as the seized funds had been stored in secure wallets previously under federal custody.
Daghita’s Telegram account briefly reappeared after the news broke, suggesting he is still active online.
The story took a deeper turn when it was revealed that John Daghita is the son of Dean Daghita, the CEO of CMDSS, a Virginia-based IT firm. CMDSS held an active contract with the USMS to help manage and dispose of seized cryptocurrency assets. That contract may have given the Daghita family direct or indirect access to government wallets.
Although it’s unclear exactly how John accessed the funds, many now suspect that insider knowledge or credentials tied to CMDSS were involved. CMDSS has since taken down its website, social accounts, and LinkedIn page, which raised even more questions about the company’s role.
Once the crypto was stolen, Daghita allegedly used a network of Tether (USDT) wallets to launder the money. He split large amounts into smaller transactions, routed them through intermediary wallets, and eventually consolidated them into a central wallet. This method helped obscure the origin of the funds but couldn’t hide them from experienced blockchain analysts like ZachXBT.

Src: X (ZachXBT)
So far, neither the USMS nor CMDSS has released a public statement. There’s also no word on whether any of the stolen funds have been recovered or if criminal charges have been filed. The silence from officials has frustrated many in the crypto community who want better safeguards for government-held assets.
This incident isn’t the first time government crypto holdings have been targeted. It joins a list of past hacks and insider threats, underscoring how vulnerable even state-managed wallets can be. The fact that this theft may have happened through a government contractor only adds to the urgency for reform.
With the U.S. government holding nearly 200,000 BTC in seized assets, proper custody is essential. The breach connected to CMDSS highlights the need for stronger protocols, better contractor vetting, and transparent audits.
ZachXBT’s investigation has done more than just expose a single theft. It’s sparked an industry-wide discussion about how crypto should be handled, especially by institutions that can’t afford mistakes.
Our Crypto Talk is committed to unbiased, transparent, and true reporting to the best of our knowledge. This news article aims to provide accurate information in a timely manner. However, we advise the readers to verify facts independently and consult a professional before making any decisions based on the content since our sources could be wrong too. Check our Terms and conditions for more info.
ZachXBT Links $40M Crypto Theft to CMDSS Contractor’s Son
TRU Token Crashes 99% Amid Truebit Exploit
Chen Zhi Extradited to China Over $14B Crypto Scam
TwinkBukowski Rug Pull Admission Triggers Backlash
ZachXBT Links $40M Crypto Theft to CMDSS Contractor’s Son
TRU Token Crashes 99% Amid Truebit Exploit
Chen Zhi Extradited to China Over $14B Crypto Scam
TwinkBukowski Rug Pull Admission Triggers Backlash