Hello Blair,
Please take a look at the following Joomla! forum thread: http://forum.joomla.org/viewtopic.php?f=714&t=866985#p3243888
As the JoomlaDonation's staff disclosed, their server was indeed compromised. The attacker (JoomLeaks) was able to acquire a copy of their database contents. The attacker has so far published semi-anonymised information from this database, namely full names and email addresses. He's said he's in possession of the hashed passwords and payment information, i.e. information which he could have easily find inside the database of the JoomlaDonation site's database.
Furthermore he has sent the same form email to everyone who has ever created an account at JoomlaDonation EVEN IF THEY ARE NOT USING, AND HAVE NEVER USED, THE JOOMLADONATION EXTENSIONS ON THEIR SITES. The emails have been sent to the email addresses registered with the JoomlaDonation site, NOT any email addresses used by Super Users in the allegedly hacked sites.
Based on the aforementioned information we conclude that there is no compelling evidence that this person has hacked sites using JoomlaDonation's extensions, let alone bypass any security solution (including Admin Tools). If he was actually capable of doing so he would have been contacting only people who actually use JoomlaDonation's extensions instead of everyone who had ever created a user account on that site (even those who never used these extensions). Moreover, had he really infiltrated your sites with a remote shell he would have known the Super User real name, username and email and would be contacting you at these email addresses instead of the contact information he retrieved from JoomlaDonation's database.
As a result we believe that the only site compromised was JoomlaDonation. The attacker got a copy of their database and now he's set into a fear, uncertainty and doubt (FUD) campaign to discredit the JoomlaDonation business and scare Joomla! users. There is no evidence whatsoever that he bypassed any security measure, or that he even knows the URLs of sites using JoomlaDonation extensions – something which is a trivial task for anyone who can use Google.
Regarding Admin Tools, just like any security solution it's not perfect or bullet proof. It is designed to make it harder for attackers to exploit your site within some reasonable limitations. For example, if you are using its .htaccess Maker and have enabled the front-end and back-end protection and have not allowed direct execution of arbitrary PHP files in any directories you would be adequately protected against remote shells of the kind this person alleges he has installed on sites: the remote shell is a PHP file which needs direct web access, something which this feature prevents.
As for the attack vector, there was no information provided and in the lack of evidence corroborating the alleged hacks we doubt that there was an attack vector. We can only talk about theoretical methods to compromise a site. If an extension requires direct access to PHP files they can be an attack vector which Admin Tools cannot protect you from: Admin Tools can only run inside Joomla!, not inside arbitrary files. Moreover, there are some kinds of attack such as extensions being tricked into escalating their privileges or creating privileged (Administrator and Super User) accounts when supplied with valid data which do not resemble an attack. Neither Admin Tools nor any other kind of firewall can protect you against this kind of attack vectors.
TL;DR
There is no compelling evidence that the JoomLeaks actor has compromised any site beyond JoomlaDonation itself. There is no compelling evidence that the JoomLeaks actor is able to bypass any security solution including but not limited to firewalls, malware scanners and Admin Tools. Our opinion based on the evidence presented so far is that the JoomLeaks actor has engaged in a fear, uncertainty and doubt (FUD) campaign to discredit the JoomlaDonation developers and spread disinformation to the Joomla! community. Based on the wording of the email he has sent out we consider it very likely that it's a competitor to JoomlaDonation who employs this kind of scare tactics to damage their competitor's business and divert clients to them.
Nicholas K. Dionysopoulos
Lead Developer and Director
🇬🇷Greek: native 🇬🇧English: excellent 🇫🇷French: basic • 🕐 My time zone is Europe / Athens
Please keep in mind my timezone and cultural differences when reading my replies. Thank you!