FBI arrests suspect linked to $46M crypto theft from US Marshals
嗯,用户让我用中文总结一篇文章,控制在100字以内,而且不需要特定的开头。首先,我需要通读整篇文章,抓住主要信息。 文章讲的是一个美国政府承包商的儿子约翰·达吉塔被指控窃取了超过4600万美元的加密货币,并被逮捕。逮捕行动是FBI和法国宪兵突击队合作的结果。达吉塔的父亲是Command Services & Support公司的CEO,这家公司负责管理美国法警局没收的数字资产。文中还提到区块链调查员ZachXBT揭露了这个案件,并且达吉塔在被捕前多次嘲讽他。 接下来,我需要把这些关键点浓缩到100字以内。要确保包括人物、事件、金额、合作机构以及相关背景信息。同时,语言要简洁明了,不使用复杂的结构。 可能会遗漏一些细节,比如Bitfinex黑客事件和“dust attack”战术,但这些可能不是最关键的信息。重点在于逮捕行动、金额和涉及的公司。 最后,检查字数是否符合要求,并确保没有使用任何开头词。 </think> 美国政府承包商之子约翰·达吉塔涉嫌窃取4600万美元加密货币被捕。FBI与法国宪兵突击队联合行动,在圣马丁岛将其抓获。达吉塔的父亲经营一家为法警局管理数字资产的公司,案件涉及2016年Bitfinex黑客事件资金。区块链调查员ZachXBT揭露其行为后,达吉塔多次嘲讽并对其实施“小额攻击”。 2026-3-5 18:47:28 Author: www.bleepingcomputer.com(查看原文) 阅读量:1 收藏

FBI

​A U.S. government contractor's son, accused of stealing more than $46 million in cryptocurrency from the U.S. Marshals Service, was arrested Wednesday on the island of Saint Martin.

The arrest was the result of a joint operation between the FBI and France's elite Groupe d'Intervention de la Gendarmerie Nationale, FBI Director Kash Patel announced on Thursday.

"Last night, John Daghita – a U.S. government contractor who allegedly stole more than $46 million in cryptocurrency from the U.S Marshals Service – was arrested on the island of Saint Martin by the French Gendarmerie's premier elite tactical unit in a joint operation with the @FBI," Patel said.

"Thanks to the International Cooperation Team Serious Crime Unit of the French Gendarmerie National in Saint Martin, and the Groupe d'intervention de la Gendarmerie nationale of Guadeloupe for the outstanding coordination."

According to photos taken during Daghita's arrest, law enforcement officers also seized an undisclosed amount of U.S. dollars in $100 bank notes, as well as multiple hard drives and security keys.

Daghita's arrest and seized assets
Daghita's arrest and seized assets (FBI)

​John Daghita (who uses the "Lick" online handle) is the son of Dean Daghita, president and CEO of Command Services & Support (CMDSS). This Virginia-based firm has been helping the U.S. Marshals Service manage and dispose of seized digital assets since October 2024.

Those holdings reportedly also include funds tied to the 2016 Bitfinex hack, one of the largest cryptocurrency heists on record, which led to the theft of 120,000 bitcoins from the Hong Kong-based Bitfinex crypto-exchange.

Blockchain investigator ZachXBT broke the case publicly in late January when he published an analysis that ​​​​​​traced $23 million in USMS-linked wallet movements to addresses he linked to Daghita, who is also a U.S. government contractor, according to Patel.

ZachXBT found that Daghita inadvertently exposed himself during a dispute with another threat actor (known as Dritan Kapplani Jr.) in a recorded private Telegram chat, where he demonstrated the ability to move large sums between two cryptowallets in real time.

Further on-chain analysis subsequently enabled ZachXBT to link those wallets to government-seized assets from the Bitfinex hack seizure. After the investigator reported his findings to authorities, Daghita reportedly taunted him repeatedly on Telegram by sending small amounts of the allegedly stolen funds (a tactic known as a "dust attack") to ZachXBT's public wallet address.

"In late January 2026, I exposed how John stole $ 46M+ in seized crypto assets from the US government by abusing access at CMDSS, his father's company, which held a USMS contract," ZachXBT said after Daghita's arrest.

"John then taunted me multiple times via his Telegram channel and dust attacked my public wallet address with stolen funds. Thanks for the last laugh, John."

tines

Red Report 2026: Why Ransomware Encryption Dropped 38%

Malware is getting smarter. The Red Report 2026 reveals how new threats use math to detect sandboxes and hide in plain sight.

Download our analysis of 1.1 million malicious samples to uncover the top 10 techniques and see if your security stack is blinded.


文章来源: https://www.bleepingcomputer.com/news/security/fbi-arrests-suspect-linked-to-46m-crypto-theft-from-us-marshals/
如有侵权请联系:admin#unsafe.sh