Just to clear this up a bit, the entry point for all of this was a database that tracks athlete medical records (Keffer Development Services). It is not clear how he got access there. It is suspected that through that site, he had access to student athlete email addresses and passwords, which allowed him to socially engineer additional hacks (e.g. if I know your password to your PSU account, chances are you are lazy and use that same password for something similar, including cloud accounts where you might store racy pictures. Or at a minimum I can use your email/password combo to do a password reset for other accounts, if 2 factor authentification isn't required)
This is actually somewhat separate from the unauthorized film access which is through a company called Catapult. Catapult identified unauthorized access to their system back in Dec 2023
A company that handles film for college programs issued a statement after Alabama players said the team has locked down footage for security concerns.
www.al.com
It is probably likely that he used the same sort of social engineering to hack players' (from various schools) access to their team's catapult accounts, i.e. logging in pretending to them and downloading video (it's also occurred to me that maybe he was trading XXX picture/videos to someone at Catapult in exchange for this information, but according the recently filed charges he wasn't sharing any of his ill gotten collection, so I don't think that's the case).