Most of the acoustic cryptanalysis attacks https://en.wikipedia.org/wiki/Acoustic_cryptanalysis I've seen involve having a microphone nearby someone's computer. Some of them are severe, and even can read encryption keys off the CPU: https://www.pcworld.com/article/2082200/listen-up-rsa-keys-snatched-by-recording-cpu-sounds-with-a-phone.html
But lots of programs can get access to the microphone relatively easily. It should be easy as a process using a computer's own microphone to do these attacks too, right?