Lights OFF… Cybersecurity ON

How cybersecurity helps save electricity

We are used to the negligible cost of computing, at least when it comes to personal computers or phones. Yet everything comes at a price: humanity is processing vast volumes of data and consuming an immense amount of electricity in the process, including “dirty energy”.


Bill Gates

In 1994, Bill Gates vividly demonstrated that the amount of data stored on a CD would take up 25,000 sheets of paper.
As estimated by the World Economic Forum, humanity will be generating around 463 exabytes of data every day globally by 2025 – the equivalent of about 630 trillion CDs. If we wanted to illustrate such a volume of data, we would need a pile of paper a thousand times as big as the distance from the Earth to the Sun.

Could we process data more sustainably? Most certainly yes. Does malware aggravate the situation? Definitely, because it increases the load on computing capacity. Could this load be decreased by using cybersecurity solutions? Let's take a closer look.

Flashback to 2016

Four years ago, we wanted to find out whether we could measure USB data transfer energy consumption. We were eager to understand how much energy could be saved by eliminating data transfer at the moment a connection is established (known as “the handshake”) with the help of Pure.Charger.

Pure.Charger is a device prototype for secure USB charging that is inserted between the power source and a phone, for example. It blocks the transfer of any data through the cable and eliminates the risk of compromising the device and its owner during charging.

Pure Charger

As it turned out, the proposition was feasible. We learned how to measure the power consumption of test systems and the “handshake” power losses when a phone is connected to a computer, a laptop, or a car. Compared to the power consumption of the phone itself, this may seem negligible. However, if every person in Europe went for just one “handshake”, the energy saved would provide enough power for an average city resident for an entire month.



covers the monthly electricity needs of one person


the population of Europe


the consumption of the average ‘handshake’

If every resident conducts one ‘handshake’, the overall consumption will be 2,483 kWh, which is enough energy to supply one person for 3 years and 9 months

Two years later...

Cryptocurrency mining has become a global trend. Naturally, Kaspersky's experts have been trained to closely follow the hidden miners used by cybercriminals and not their legitimate counterparts.


Mining is the process of “procuring” cryptocurrency with the use of processing power by searching for a specific number in a vast data array with system-specific parameters. Mining requires complex computing operations that result in a 100% load on the CPU and the video card.

After simulating a crypto-jacking attack on a test system, we attempted to measure the resulting increase in power consumption. Cryptocurrency mining is an energy-hungry business. According to some estimates, Bitcoin miners consume as much energy as the Czech Republic, a country with a population of 10 million people.

Considering the distribution of CPUs and the aggregate number of crypto-jacking attacks, we managed to assess the global impact of miners being blocked. The annual amount of energy that Kaspersky products had helped our clients save turned out to be twice as large as the power consumption of all Bitcoin miners in the world put together. In terms of carbon dioxide emissions, this means we prevented the discharge of between 115 and up to 800 tons of carbon dioxide.

Hidden mining uses other people's resources by launching specialized malware on victims' devices (computers, servers, or phones).

Man with a pickaxe mines cryptocurrency

Back to the present.
And future

It is safe to assume that cybersecurity has had a positive impact in cases other than malicious mining. How can this be assessed though?

Kaspersky launched a research project to understand the impact of cybersecurity on energy consumption and carbon dioxide emissions into the atmosphere. During the research, we gathered data on mining-related attacks from the Kaspersky Security Network (KSN), analyzed the impact of web miners on an infected system, and identified the priority target: CPUs. The experiment on power consumption measurement encompassed 22 different systems based on the most widespread CPU types. The COVID-19 lockdown prevented us from completing the empirical part of the project this year, but we hope to complete the development of the parametric model, which takes into account the types and the frequency of blocked attacks.

Man behind the monitors

One of Kaspersky’s main cloud systems, The Kaspersky Security Network (KSN) was created to maximize the effectiveness of discovering new and unknown cyberthreats, and thereby ensuring the quickest and most effective protection for users. KSN automatically processes cyberthreat-related data received from millions of devices owned by Kaspersky users, who have voluntarily opted to use this system. This cloud-based system approach is now the industry standard, applied by many global IT security vendors.

We are currently faced with the task of extrapolating the data obtained on all types of threats that we prevent, including malicious code, phishing URLs, spam, and DDoS attacks. The COVID-19 pandemic has stopped us from completing this process in the first half of 2020, but you can be assured that we will not leave this task unfinished.

To be continued...