Possibly.
Step 1. Notice the enemy's comms in twitter and instagram is making references to a certain online game.
Step 2. Sign up for the game and get the software installed on your PC
Step 3. Begin analyzing the code using Ghidra to see if there are backdoors or secret commands
Step 4. Install Wireshark and monitor the network traffic on your PC while you play the game. Capture the whole stream because you might want to write some code to analyze it.
Oh, did I forget Step 0?
Learn how to reverse engineer. In other words, do a LOT of reading.
But think critically. If they know that people are watching they are likely to install some code on the game server end, which means that the traces on the game client will be very small and subtle and hard to find.
Analyzing the traffic can help identify when encryption was suddenly turned on which might help narrow down your analysis.