68 million accounts dumped: https://www.theguardian.com/technology/2016/aug/31/dropbox-h...
https://www.troyhunt.com/the-dropbox-hack-is-real/
now they first hash the password using SHA512 (with a per-account salt)
then they hash the password with bcrypt (with the default strength)
then they encrypt the password with a key that the application server runs with, but that is not stored in the database.
So yes, hashed and salted.