Depends on the encryption algorithm. If it's something outdated like MD5, sure. If they used something like AES-256 with a proper-sized (>1024b) key, it wouldn't be worth the effort.
Depends on the salt they used and the number of rounds of AES they used.
If they didn't salt their hashes then it's easy to make a rainbow table of well known passwords and match them to users, regardless of hashing algorithm.
Should just call the bluff.
The 'hackers' only have encrypted passwords, which are useless. If they had the actual passwords, they would have threatened to release those.
DMs are mostly worthless, and I bet a lot of them are fabricated.
They are probably hashed passwords, 95% of which could be very easily cracked. Most people use the same password for multiple sites, too.
Depends on the encryption algorithm. If it's something outdated like MD5, sure. If they used something like AES-256 with a proper-sized (>1024b) key, it wouldn't be worth the effort.
Depends on the salt they used and the number of rounds of AES they used.
If they didn't salt their hashes then it's easy to make a rainbow table of well known passwords and match them to users, regardless of hashing algorithm.