I honestly do not believe Dragoneer is telling the full story. Yes, it is true that someone got the source code and loaded it on a USB, but I think there is more to this story.
One thing he isn't telling you was that the damage was mostly done when the original imagemagick exploit was discovered and I guarantee that it WAS not patched right away. Quite simply, the admins SCREWED up. The reason I say that is cause how issues were handled in the past. The admins have done a terrible job.
Now why do I say that.
Well here is how the exploit works.
http://www.openwall.com/lists/oss-security/2016/05/03/18
ImageMagick Security Issue - ImageMagick
So what does this mean? I don't understand all this you say.
Well with this exploit, anyone can run a shell command into the server.
What's a shell command?
For those not familiar with Linux, it basically allows direct commands on the server. Commands that would let you delete files, rename files, move files, download the source code. I don't believe the database would be compromised as that requires the knowledge of the mysql password (or a root account). Something that this exploit alone would not provide.
So basically Dragoneer is saying someone with the ability to do a ton of file deletions only took the source code. Yeah, uh huh, and I am the daughter of Zeus.
Dragoneer also says the source code was leaked and then another vulnerability was found and hacked.
I am not saying that this is not possible, but I find it HIGHLY unlikely, unless FA has more holes than swiss cheese. If that is the case, we all should be pointing the fingers at the admins themselves for such poor code. I have some faith that they are not complete imbeciles, but then again what do I know.