Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
FBI Captures Contractor for  Million Cryptocurrency Theft

FBI Captures Contractor for $46 Million Cryptocurrency Theft

Posted on March 6, 2026 By CWS

FBI Arrests Contractor in Major Cryptocurrency Theft

On March 4, 2026, the FBI successfully apprehended John Daghita, a U.S. government contractor, accused of orchestrating a substantial insider theft. Daghita allegedly stole over $46 million in cryptocurrency from the United States Marshals Service (USMS), exposing significant vulnerabilities in the management of seized digital assets by federal agencies.

FBI Director Kash Patel confirmed the arrest on March 5, underscoring the agency’s commitment to holding those accountable who defraud American taxpayers. This case brings to light critical concerns about insider threats within government supply chains, emphasizing the need for stringent access controls to protect seized cryptocurrency.

International Operation Leads to Capture

Daghita was captured on the Caribbean island of Saint Martin through a coordinated effort involving the FBI and elite French tactical units. The operation included the International Co-operation Team Serious Crime Unit of the French Gendarmerie Nationale in Saint Martin and the Groupe d’intervention de la Gendarmerie nationale (GIGN) of Guadeloupe. This international collaboration showcases the global capability of U.S. law enforcement in addressing cybercriminal activities.

Kash Patel highlighted on social media the importance of international partnerships in ensuring that cybercriminals have no safe havens. Rapid coordination between U.S. and French authorities was crucial in preventing further laundering or dispersal of the stolen funds, which are often hidden using sophisticated methods like crypto mixers.

Implications of the Theft

The theft of $46 million from the USMS underscores a significant insider threat challenge. The agency is responsible for the management and liquidation of cryptocurrency seized during criminal investigations. A breach of this scale suggests potential weaknesses in digital asset custody protocols, such as privileged access management and the use of multi-signature wallet controls.

Insider threats are particularly difficult to defend against due to the actor’s legitimate credentials and system knowledge. Contractors with high-level access to sensitive government financial resources necessitate the implementation of strict zero-trust architectures to mitigate risks.

Future Security Measures

This incident is expected to trigger a comprehensive security review of how the USMS and other federal bodies handle digital currencies. Ensuring no single individual has complete access to hardware wallets or private keys is a crucial defense against insider theft. Moving forward, agencies may need to adopt continuous monitoring and behavioral analytics to detect unusual asset transfers in real time.

The arrest of John Daghita serves as a stern warning about the importance of robust internal security policies. It highlights that defending against insider threats is as crucial as countering external cyberattacks.

For more updates on cybersecurity, follow us on Google News, LinkedIn, and X. Contact us to share your stories.

Cyber Security News Tags:Contractor, Cryptocurrency, Cybercrime, Cybersecurity, digital assets, FBI, Fraud, Government, insider threat, international operation, Kash Patel, law enforcement, Saint Martin, Security, USMS

Post navigation

Previous Post: CISA Expands KEV List with iOS Vulnerability Additions
Next Post: James Bishop Appointed Pentagon’s New Cybersecurity Chief

Related Posts

Inside the Leaks that Exposed the Hidden Infrastructure Behind a Ransomware Operation Inside the Leaks that Exposed the Hidden Infrastructure Behind a Ransomware Operation Cyber Security News
Microsoft Details on Fixing Error “Identify Which Process Is Blocking a File in Windows” With Built-in Tools Microsoft Details on Fixing Error “Identify Which Process Is Blocking a File in Windows” With Built-in Tools Cyber Security News
CISA Warns of CitrixBleed 2 Vulnerability Exploited in Attacks CISA Warns of CitrixBleed 2 Vulnerability Exploited in Attacks Cyber Security News
Windows 11 24H2 Update KB5064081 Breaks Video Content Playback Windows 11 24H2 Update KB5064081 Breaks Video Content Playback Cyber Security News
AI Tools Like GPT Direct Users to Phishing Sites Instead of Legitimate Ones AI Tools Like GPT Direct Users to Phishing Sites Instead of Legitimate Ones Cyber Security News
New CrushFTP 0-Day Vulnerability Exploited in the Wild to Gain Access to Servers New CrushFTP 0-Day Vulnerability Exploited in the Wild to Gain Access to Servers Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • OpenAI Unveils Codex Security for Software Vulnerabilities
  • FBI Probes Cyber Incident on Sensitive Surveillance System
  • Advanced Linux Rootkits Exploit eBPF and io_uring
  • AI Model Identifies Significant Firefox Vulnerabilities
  • FBI Probes Breach in Wiretap and Surveillance Systems

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • OpenAI Unveils Codex Security for Software Vulnerabilities
  • FBI Probes Cyber Incident on Sensitive Surveillance System
  • Advanced Linux Rootkits Exploit eBPF and io_uring
  • AI Model Identifies Significant Firefox Vulnerabilities
  • FBI Probes Breach in Wiretap and Surveillance Systems

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News