Considering that "industry standards for security" would have prevented any theft... 1) dont run programs as root, 2) dont allow non-vpn to access database, 3) dont run untrusted 3rd party software on the same server that holds $13M...
It's either complete incompetence, or an inside job...
The database leak is particularly suspicious... Who leaves a database port open to the internet? How is that even possible to hack?
On one side of Paul Vernon's mouth we hear him say that Cryptsy is 100% secure and abide by all US laws, while on the other side of Paul's mouth we here Oopsie!, an event occurred and we didn't know who to contact, all the while we see the likes of Jim Slockney's et al. dick in Paul's mouth with Lorie Nettles on the sideline cheering on saying that there's still room for more dicks while Ginny Slockney is begging Lorie to sit on her face.
I'm in the process of penning another Blockcain Forensics post depicting Cryptsy's event.
FWIW:
Here's an interesting tidbit of Block 313009 - https://blockchain.info/block-height/313009 - where Cryptsy's infamous Proof of Reduction (PoR) of the Event resides: The transaction was the VERY FIRST position - Pos 1:
https://www.walletexplorer.com/txid/c7b46a79fd8887038bd3a8e884b04820038415a60e0b9d2c2f5bcff68a2687bf