Security researchers have discovered a new attack method dubbed "Platypus" that can extract data from Intel CPUs. Intel has now released microcode updates to prevent malicious actors from exploiting the Intel RAPL mechanism with Platypus.


A team of academics has disclosed today a new attack method that can extract data from Intel CPUs.

Named Platypus, an acronym for "Power Leakage Attacks: Targeting Your Protected User Secrets," the attack targets the RAPL interface of Intel processors.

RAPL, which stands for Running Average Power Limit, is a component that allows firmware or software applications to monitor power consumption in the CPU and DRAM.