I'm sure they are trying. But equally a smart hacker will cover their tracks, delete logs etc
Certainly appears that the hacker has grabbed a large database file.
But it's also a question as to how accessible it is to any hacker - eg. Were DOBs and passwords cryptographically protected, which...