
U.S. law enforcement is quietly trying to sort through a messy and uncomfortable situation involving seized cryptocurrency, a government contractor, and allegations that tens of millions of dollars were improperly siphoned from wallets controlled by federal authorities.
At the center of the case is a claim that more than $40 million in seized crypto was moved out of government-linked wallets without authorization. The U.S. Marshals Service has confirmed it is reviewing the allegations, though no charges have been announced and the investigation remains in its early stages.
The claims surfaced publicly after blockchain investigators began flagging unusual on-chain movements tied to wallets believed to be associated with assets seized by the U.S. government in prior criminal cases.
Much of the attention comes from independent blockchain investigators who traced large transfers from wallets associated with seized funds to addresses allegedly controlled by a single individual. According to multiple blockchain intelligence reports, the individual at the center of this incident is identified as John Daghita, known in crypto circles by the alias “Lick”. Analysts such as ZachXBT, an independent blockchain investigator, publicly tied on-chain movements from government-controlled cryptocurrency addresses to wallets controlled by Daghita.
ZachXBT’s investigation reportedly traced back transactions involving tens of millions of dollars to wallet addresses that received $24.9 million from a U.S. government account in March 2024. This particular government account is linked to assets seized after the 2016 Bitfinex hack, one of the largest cryptocurrency thefts in history, where authorities later seized funds connected to that case.
“Meet the threat actor John (Lick), who was caught flexing $23M in a wallet address directly tied to $90M+ in suspected thefts from the US Government in 2024 and multiple other unidentified victims from Nov 2025 to Dec 2025”, ZachXBT wrote on X.
According to on-chain analysis shared publicly, one wallet received roughly $25 million from a government-controlled address in March 2024. Investigators say the source wallet appears to be tied to cryptocurrency seized in connection with the 2016 Bitfinex hack, a case that has continued to ripple through the crypto industry nearly a decade later.
The situation escalated after a dispute in a Telegram group, where the individual allegedly disclosed wallet details that appeared to confirm control over large balances of ether and other digital assets. Once those wallet addresses were public, blockchain analysts quickly began connecting dots.
While blockchain data can show where funds move, it cannot on its own establish intent or legality. That distinction has become especially important as the story gains traction.
What has made the case particularly sensitive is a reported family link to a government contractor.
John Daghita is said to be the son of Dean Daghita, president of Command Services and Support, a Virginia-based firm that holds a federal contract connected to the handling of seized cryptocurrency for the U.S. Marshals Service. The company was awarded that contract in late 2024, following a competitive procurement process that drew objections from rival bidders.
The contract reportedly covers the management and liquidation of certain seized digital assets, particularly smaller or less liquid tokens that are not typically handled by large exchanges.
There is no public evidence that the contractor itself is under investigation or that the alleged misconduct occurred as part of official company operations. Still, the overlap between government custody, private contractors, and family relationships has raised uncomfortable questions about access controls and oversight.
The allegations land at a time when the U.S. Marshals Service is already under scrutiny for how it manages digital assets. The agency plays a central role in handling property seized in criminal cases, including cryptocurrency tied to fraud, ransomware, darknet markets, and hacking incidents.
Over the years, the Marshals Service has accumulated billions of dollars worth of crypto, including large bitcoin holdings seized in high-profile cases. But audits and reporting have repeatedly shown that tracking, accounting, and securing these assets is far from simple.
Internal systems were not originally designed for blockchain-based assets, and oversight bodies have previously flagged weaknesses in inventory tracking and custody procedures. In some cases, the agency has struggled to provide a clear accounting of exactly how much crypto it holds at a given time.
Those challenges have become more visible as the value of seized crypto has soared and as debates continue in Washington over whether the government should hold, sell, or strategically manage these assets.
For now, the U.S. Marshals Service is keeping its comments limited. Officials have acknowledged the allegations and confirmed that they are being reviewed, but they have not said whether criminal charges are expected or whether any funds have been recovered.
Key questions remain unanswered. Investigators will need to determine whether the alleged transfers involved unauthorized access, compromised credentials, or insider misuse of systems tied to crypto custody. Another open issue is whether the case points to individual misconduct or deeper structural weaknesses in how seized digital assets are handled.
Until law enforcement provides more clarity, much of the public narrative will continue to be shaped by blockchain analysts and online investigators. As with many crypto-related cases, the transparency of the blockchain offers clues, but not conclusions.
What is clear is that the case highlights the growing pains of government agencies adapting to digital assets. As crypto seizures become more common and more valuable, the systems designed to safeguard them are being tested in very real ways.


Crypto has a way of ruining the calendar. Just when things slow down, markets calm, and people log off for the holidays, something breaks. This time it was Trust Wallet, and for some users, it broke badly.
More than $7 million in cryptocurrency was stolen after a compromised version of Trust Wallet’s Chrome browser extension made its way into circulation late last week. The losses came fast, right around December 24, when many users were updating software, traveling, or simply not paying close attention. By the time some noticed something was wrong, their wallets had already been drained.
The issue centered on a specific update to the Trust Wallet Chrome extension. On the surface, it looked like a normal release. No flashing red flags, no obvious warnings. Users installed it the same way they always do, clicking update and moving on. Somewhere along the line, though, malicious code ended up inside that release. Once active, it gave attackers a way to move funds out of users’ wallets quietly and efficiently.
What followed was a familiar pattern for anyone who has watched crypto hacks play out. Wallets that had been untouched for weeks suddenly sent out large transactions. Bitcoin, ether, BNB, and stablecoins flowed into unfamiliar addresses. Analysts tracking the blockchain could see the money moving, hopping between wallets, splitting up, recombining. It was all very visible and completely irreversible.
Trust Wallet confirmed that the breach was limited to one version of the Chrome extension. According to the company, mobile users were not affected, and neither were users who had not installed the compromised update. The company urged anyone using that version to disable it immediately and install the patched release from the official store.

That response helped contain the damage, but it did not undo what had already happened. In crypto, there is no undo button. Once assets leave your wallet, they are gone unless the attacker decides to give them back, which is not something people tend to count on.
Adding to the response, Changpeng Zhao, the Binance co-founder whose company owns Trust Wallet, said affected users would be reimbursed while an internal investigation continues. That promise brought some relief, especially for users who lost significant sums. Still, reimbursement does not erase the bigger concern. People want to know how a malicious update made it through in the first place.
Security researchers were already digging in by the time official statements came out. Some noticed odd wallet activity tied to recent extension updates. Others began pulling apart the extension code, looking for scripts that could leak private data or trigger unauthorized transactions. Warnings spread quickly across social platforms, security channels, and group chats. In crypto, news like this moves faster than press releases.
The episode once again highlighted a long standing weakness in crypto infrastructure. Browser wallet extensions are incredibly popular because they are easy. They connect seamlessly to decentralized exchanges, NFT platforms, and Web3 apps. For many users, they are the default way to interact with crypto on a daily basis. But that convenience comes with risk. Extensions live inside browsers that were never designed to protect private keys holding real money.
A single compromised update can affect thousands of users at once. Unlike phishing attacks that rely on tricking individuals one by one, an extension issue scales instantly. If the update is trusted, users trust it too.
This is why security experts keep repeating the same advice, even if it sounds boring. Large balances should not live in hot wallets. Browser wallets are tools for interaction, not vaults. Hardware wallets and cold storage are slower and less convenient, but they dramatically reduce the risk of exactly this kind of event.
In the aftermath, users have been urged to take several steps. Disable the affected extension. Review transaction histories carefully. Revoke token approvals that might still be active. In some cases, move remaining funds to an entirely new wallet with a fresh seed phrase that was never exposed to the compromised environment. None of this is fun, but waiting is usually worse.
There is also a broader reputational cost. Trust Wallet is one of the most widely used non-custodial wallets in the world. Incidents like this shake confidence, even if the company responds quickly and makes users whole. For newer users especially, it reinforces the idea that crypto is complicated, risky, and unforgiving.
The investigation into how the compromised extension was approved and distributed is still ongoing. Questions remain about whether this was a supply chain issue, a submission process failure, or something else entirely. Those answers will matter, not just for Trust Wallet, but for the wider ecosystem that relies heavily on browser extensions.
For now, the lesson is an old one, repeated yet again. In crypto, trust is fragile. Convenience is expensive. And even during the quietest week of the year, something can go wrong fast.
You can stay up to date on all News, Events, and Marketing of Rare Network, including Rare Evo: America’s Premier Blockchain Conference, happening July 28th-31st, 2026 at The ARIA Resort & Casino, by following our socials on X, LinkedIn, and YouTube. Tickets are available here.