While attacks using the Log4j exploit vulnerability can be effective for state actors focused on specific politically targeted websites, the most dangerous use of the exploit is when botnets perform large scale scanning for vulnerable sites to create crypto mining and DDoS platforms, he adds.