This isn’t practically important because in real life, “the worm cannot communicate with other attacker-controlled machines after going onto a victim’s machine” is an unrealistic assumption
I don’t know if it’s relevant to what you were looking into, but it’s a very realistic assumption. In air-gapped environments it’s common for infiltration to be easier than exfiltration, and it’s common for highly sensitive environments to be air-gapped.
This isn’t practically important because in real life, “the worm cannot communicate with other attacker-controlled machines after going onto a victim’s machine” is an unrealistic assumption
I don’t know if it’s relevant to what you were looking into, but it’s a very realistic assumption. In air-gapped environments it’s common for infiltration to be easier than exfiltration, and it’s common for highly sensitive environments to be air-gapped.