1/ Meet the threat actor John (Lick), who was caught flexing $23M in a wallet address directly tied to $90M+ in suspected thefts from the US Government in 2024 and multiple other unidentified victims from Nov 2025 to Dec 2025.
2/ Earlier today John got into a heated argument with another threat actor known as Dritan Kapplani Jr. in a group chat to see who had more funds in crypto wallets.
In 'The Com' this is known as a band for band (b4b).
However the entire interaction was fully recorded.
3/ In part 1 of the recording Dritan mocks John however John screenshares Exodus Wallet which shows the Tron address below with $2.3M:
TMrWCLMS3ibDbKLcnNYhLggohRuLUSoHJg
4/ In part 2 of the recording Dritan continues to mock John while another $6.7M worth of ETH is moved into the wallet address below:
0xd8bc7ea538c2e9f178a18cc148892ae914a55d08
5/ After the B4B was done John had moved ~$23M total to 0xd8bc.
The recording captures that John clearly controls both addresses.
Additional addresses can likely be found in the recordings.
I then began tracing backwards to verify the source of funds.
6/ 0xd8bc receives from 0x8924 which in the recording John confirms owning.
0x8924 received 1066 WETH from 0xc7a2 on Nov 20, 2025 in the following txn.
7/ 0xc7a2 received $24.9M from a US Government address in March 2024 related to the Bitfinex hack seizure which is a theft from the USG I previously reported about in Oct 2024.
$18.5M currently sits at
0xc7A253fD3C61CF69d043e6184c107dF4E29475B5
8/ 0xd8bc is tied to $63M+ inflows from suspected victims and government seizure addresses in Q4 2025.
Dec 2025
$13.5M
0x77a722bf33787c3512d0f4fc36412140057f4223
$15.4M
0xf51b044f998277b17467cd713d72b403e16fad48
Nov 2025
$3M
TACZPnbg2Fi2ppC3cGxQxZb95SqwAZVAw9
$1M
6tMdWb3w3UaVq4JRSm1qa2s8mVwj2MYFAveJEL6S93Ua
9/ Another 4.17K ETH ($12.4M) was received from MEXC earlier today flowing to 0xd8bc
0xe0f7a45a491d53f9361d35b4ef9908986d3b37b7
John has an extensive message history on Telegram flaunting his networth and calling others broke.
TG ID: 8269661864
10/ Rumors circulating from cybercrime Telegram channels indicate John could be John Daghitia who was previously arrested in Sep 2025.
Though more research is needed to fully confirm.
11/ Threat actors only continue to showing off stolen funds in leaked recordings rather than simply just staying quiet after an alleged theft from the US Government.
In this case John was ragebaited by Dritan into going band for band and the proof of ownership for these wallets makes it an easy future case for law enforcement.
Update: John quickly removed all of the NFT usernames from his Telegram account and change his screenname after my post.
Update: John dusted my public address zachxbt.eth from one of the theft addresses.
$420M+ in alleged compliance failures since 2022, including fifteen cases of the US-regulated stablecoin issuer taking minimal action against illicit funds.
2/ Circle operates USDC, a centralized stablecoin pegged 1:1 to USD, marketed as a regulated company with a robust compliance program.
Its token contract includes a freeze/blacklist function, and its terms of service explicitly state it reserves the right to restrict access for suspected illicit actors "in its sole discretion".
The company is incorporated in the US, currently headquartered in New York City, and subject to US federal / state financial regulations.
3/ On April 1, 2026, Drift Protocol was exploited for $280M.
The exploiter used CCTP to bridge 232M+ USDC from Solana to Ethereum across 100+ transactions over six consecutive hours. 10+ additional DeFi protocols across the Solana ecosystem were indirectly impacted.
Despite the attacker laundering funds over six consecutive hours across Circle's own native bridge, no USDC was frozen.
1/ I uncovered a coordinated network of 10+ accounts manufacturing viral panic about war and politics to drive traffic to crypto scams.
Strategy:
>Purchase accounts with followers
>Doompost multiple times per day
>Repost content from alt accounts
>Promote fake giveaway or scam
>Change username
2/ Example: @wanglaurentceo
They started by purchasing an account with followers and use AI to create a fake Asian version of Mario Nawfal.
(User ID 1804235884826333184)
3/ Here’s related accounts reposting to boost the reach of posts about exaggerated or fake news.
This causes them to go viral each day with millions of views and thousands of likes / replies.
1/ Meet @WheresBroox (Broox Bauer), one of the multiple @AxiomExchange employees allegedly abusing the lack of access controls for internal tools to lookup sensitive user details to insider trade by tracking private wallet activity since early 2025.
2/ Axiom is a crypto trading platform founded by Mist & Cal in 2024. After going through Y-Combinator's Winter 2025 batch, it quickly became one of the most profitable companies in the space, generating $390M+ in revenue to date.
I was retained to investigate allegations of misconduct at Axiom after receiving reports.
3/ Broox is a current Axiom senior BD employee based in New York.
In the clip Broox states he can track any Axiom user via ref code, wallet, or UID and claims he can "find out anything to do with that person".
He also describe researching 10-20 wallets initially and slowly increasing over time "so it does not look that suspicious"
In a separate clip from the same recording, Broox sets ground rules for how to request lookups from him and then says he'll send the full list of wallets.
The full recording is a private call of the group members strategizing.
1/ Meet Haby (Havard), a Canadian threat actor who has stolen $2M+ via Coinbase support impersonation social engineering scams in the past year blowing the funds on rare social media usernames, bottle service, & gambling.
2/ On Dec 30, 2024 Haby posted a screenshot in a group chat showing off a 21K XRP ($44K) theft from a Coinbase user.
rN7ddvk4DrGHZUrBfNARJEEAbPkky9Mwcz
3/ On Jan 3, 2025 Haby posted a screenshot from his Exodus wallet showing his Telegram & IG accounts.
I matched up the historical balances to the screenshot and found the XRP address linked to two other Coinbase user thefts for ~$500K total.