I'm a student of computer architecture and I just got through a class on Hardware Security.
We spent a considerable amount of time learning about microarchitectural side channels, reading papers on how researchers "stole" cryptographic keys from toy crypto libraries by timing memory accesses, and crafting toy example attacks and defences. Oh and of course spectre and meltdown.
Which makes me wonder about the point of all this. Has there ever been an actual attack that used a microarchitectural side or covert channel, for example stealing a DRM key by monitoring cache access?
Before you close my question for "seeking recommendation for books, software, etc". But I'm doing nothing of the sort. I'm looking for a documented security breach incident that involved a micro-architectral side-channel.