I have received answer from their manager through email:
Let me update you on this manner.
On 7th of September, we came aware of a malicious code inserted in our roll dice code, from a 3rd party coder we have hired to help us out with the load. Gerry, my partner, did the mistake to make a push of an admin'update' he was helping him with, without testing it thoroughly. The code which went live on 29th of August, was giving him the ability to'skip' winning nonces(in detail, he could put some criteria - for insance, if the user wants to win x amount of btc with odd higher than y, if the roll would be a winner it would skip the nonce and roll it again). That didnt infect everyone nor by default though. He had to chose manually which player to 'cheat'.That was a totally stupid way to implement it though, since if you were doing that, the bets could NOT be verified, since the nonce sequence would be broken. A user of ours found out by accident, on 7th of September. When we confirmed it, we haulted betting for everyone till we roll back the previous admin version, and made sure the rolls are as they have to be: provably fair. In addition, we refunded EVERY PLAYER who lost his coins due to this malicious code, from our own stash of bitcoins(and not sites' or investors). We took full responsibility for the mistake, and we paid for it. Of course, that was ubber gift for competitors especially PRCdice and PrimeDice, which kept throwing oil in the flames creating a near bank-run(investors started pulling out their coins like crazy brcause they thought we are scammers. However, given the fact that we didnt run with 7500 coins(!!)and we never haulted withdrawals/divests, nullifies it. In around 24h from the incident the bankroll shrinked from 7500 coins to ~1700, and we had one user, mateo, which was hitting the bankroll non stop for almost 12h more. Lot of speculation exists as well for that user, however he is a legit user and registered on site start of august(when we didnt have the other guy hired yet). Also, when the incident happened on 7th of September, he also randomized his rolls(and reset nonce) in order to verify if he got affected by the malixious code(he was -33 BTC before 7th of September, and no he wasnt affected). Given that fact plus that he randomized his rolls, there is 0% chance it could be someone that knew the server seed and played against it.
What are we finalizing now is to repay even the acounts that got affected by skipped rolls, EVEN if they ended up with profit. Again, we will pay that from our own stash.
Bottom line, even if you read that link, you will see at the end that the user in question was fully refunded. The'steal over 3m$' is complete bollox, and makes no sense at all. BankRoll was 7500, whixh means we COULD STEAL 3m$, but we didnt. Everything that is missing is from investors who pulled out their own coins. You can double-check that and in that post, and on forums. Not only we never stole one btc, but we did return ~6k btc to date back to whoever requested it. They try very hard to take DB down, but we wont do them the favour!
PS we are preparing also a nice post for thr forum, which will (re)explain exactly what happened, among with every user eho got affected. I repeat, all users with negative balance got refunded to the last BTC, and all the skipped rolls for users who ended up with profit anyways, will be credited as well(despite they ended up with profit). All withdrawals and divestings were honoured, and the roll is working flawesly again after 7th of September(anyone can verify by themself as well).
I`m not trying to protect dicebitcoin brand reputation or anything like that, but lets wait and analyze all the facts from both sides, before we will make any crucial decisions.