Eclipse attack is irrelevant to this scenario. The attacker only needs to delay publishing some of his transactions.
I thought we were talking about the standard case of a non-delayed transaction issued by an up-to-date node. If you do delay a transaction then the picture has the same profile as one with an eclipse attack.