Once an attacker successfully logs into an account from a combolist, the account is usually handled in one of three ways:
Hackers know that people often reuse the same password across multiple platforms. SPOTIFY COMBOLIST.txt
The hijacker simply uses the Premium features for free. 4. Risks and Red Flags Once an attacker successfully logs into an account
Your music suddenly stops because "Your account is being used on another device." SPOTIFY COMBOLIST.txt