The post Suspect Arrested for Alleged $46M Heist of Seized Crypto Assets appeared first on Coinpedia Fintech News
John Daghita, aka Lick, was arrested today by the Federal Bureau of Investigation (FBI) in the Caribbean for allegedly stealing $46 million worth of seized crypto assets from the US Marshals Service (USMS).
The heist began in 2024, when Command Services & Support, Inc. (CMDSS), a technology company, was awarded a contract to handle asset disposal for the US Department of Justice (DoJ) and the Department of Defense (DoD). Dean Daghita was head of the company while his son John worked as an employee.
Per the ZachXBT (revealer of the Axiom insider trading) expose, John allegedly used his status to withdraw confiscated cryptocurrencies to his personal wallets.
He remained anonymous until January 23, 2026, when he decided to flaunt his success to another confessed thief by the name of Dritan Kapplani Jr.
A recording of this interaction shows how John revealed his wallet address, which ZachXBT then linked to several scams and a US Government address from which digital assets had been siphoned in 2024.
Shortly after ZachXBT publicized the investigation, John made changes to his Telegram account in a failed attempt to mask his identity. He also dusted the investigator’s account by sending him 0.0067 ETH. The CMDSS website, X, and LinkedIn accounts have since been deactivated.
By mid-2025, stolen cryptocurrencies surpassed $2.17 billion (more than all of 2024), according to the Chainalysis 2025 Crypto Crime Report. Of these, $1.5 billion was related to the Bybit exchange hack.
Source: Chainalysis
This year, Apple cautioned iOS users of the “Coruna” exploit, which hunts for crypto wallet seed phrases in phones running iOS 13.0 through 17.2.1, but not later (iOS 18+). The malware is estimated to have affected at least 42,000 devices.
More recently, South Korea’s tax agency mistakenly revealed its virtual asset wallet seed phrase online, leading to the loss of $4.8 million worth of tokens.

