Most security systems have several layers of defense. To assess how much a break of one line influences the other lines you have to know what new attack vectors are open.
Lets say you have two systems A and B. System A has very important data, and it is important not only that the data is protected from access, it is also important that if it is accessed unauthorizedly, to know at least, if any data was sent to the outside. System B is less important and in a DMZ. If system B is compromised, you just power it off and reinstall it from a known good backup, but normally you don't do a thorough forensic analysis, you might not even have the right monitoring in place as there is no important data on system B (maybe it's just a web server serving static content like pictures for your corporate website, data that is known to the world anyway).
With this attack you can tunnel data from System A to the outside without the attacked being aware. Even if the victim does a thorough analysis of system A and all paths from and to system A known to the victim, it will be not aware of the actual data leak.