Hacker Flaunts $23M Stolen Crypto, Exposed by Investigator
- Investigator links hacker’s $23M wallet to US seizures.
- US government contracts involved in crypto management.
- Public flaunting assists in hacker identification.
On-chain investigator ZachXBT exposed hacker John Daghita, who flaunted $23 million in stolen crypto, linking it to over $90 million in thefts from US government wallets.
The exposure highlights vulnerabilities in US government crypto security and emphasizes the role of blockchain analytics in cybercrime investigations, potentially influencing future regulatory practices.
A hacker’s display of power through control of $23 million in stolen cryptocurrency was publicly exposed. The event followed a “band-for-band” dispute with another cybercriminal, revealing significant links to government-seized crypto funds.
The individual responsible is identified as John Daghita, known online as “John” or “Lick.” He publicly showcased control of a wallet containing these assets, traced back to US government seizure addresses by investigator ZachXBT.
The exposure links these funds to over $90 million in suspected thefts, notably from government seizures related to the 2024 Bitfinex hack. This revelation highlights a potential connection exploited through an IT firm with government contracts.
Financially, the stolen assets include ETH and Tron, with an associated broader figure exceeding $40 million. Public exposure of stolen crypto fosters further investigative actions, potentially leading to governmental responses.
The US Marshals Service‘s ongoing involvement in managing seized assets is under scrutiny. The exposure underscores vulnerabilities in asset management, catalyzing inquiries into procedural security at firms handling government contracts.
Historically, public flaunting of illicitly acquired crypto enhances traceability efforts, aiding law enforcement actions. ZachXBT’s ongoing analysis emphasizes transparency advantages inherent in blockchain, supporting identification and evidence gathering.
ZachXBT, On-Chain Investigator, “In case you are curious how John Daghita (Lick) was able to steal $40M+ from US government seizure addresses. John’s dad owns CMDSS, which currently has an active IT government contract in Virginia. CMDSS was awarded a contract to assist the USMS in managing/disposing of seized/forfeited crypto assets.”