According to Jack Watling & Nick Reynolds,
Ukrainian officers recalled one incident in which the Russian headquarters gave pre-emptive warning to its units of an artillery strike based on Ukrainian troops calling in a fire mission. The Ukrainian troops were communicating with Motorola radios with 256-bit encryption, but it appeared that the Russians were able to capture and decrypt these transmissions in near real time. The most likely system for such functions is the Torn-MDM.
Source: Jack Watling, Nick Reynolds, Meatgrinder: Russian tactics in the second year of its invasion of Ukraine, Royal United Services Institute, 19 May 2023.
This claim is discussed on Hacker News, where it is claimed that the aforementioned radios are Project 25 (P25) radios using 256-bit AES.
Since I find it hard to believe that anyone can decrypt 256-bit AES in "near real time", I assume that – excluding the possibility that old-fashioned HUMINT is to blame — some design or implementation weaknesses are being exploited. Perhaps some of these weaknesses have been published in academic (rather than military) publications. References would be most welcome.
Related