Step 1: Define the Cybercrime:
The scenario outlines a cybercrime leveraging social engineering. The scammer cultivates trust over time to induce the victim to invest in a fraudulent scheme.
Step 2: Analyze the Options:
(A) Wormhole: Irrelevant; a concept from theoretical physics, not cybercrime.
(B) Pig Slaughter Scam: Correct. This scam involves building a relationship, often romantic, over weeks or months to gain trust. The scammer then presents a deceptive investment opportunity (typically cryptocurrency), persuading the victim to invest before absconding with the funds. Success hinges on the victim's trust in the offender.
(C) Website Attack: A general term; it doesn't necessarily involve personal trust-building.
(D) Virus Attack: A technical attack involving malicious software. It doesn't rely on victim trust in the described way.
Step 3: Conclusion:
The 'Pig Slaughter scam' is a cybercrime characterized by prolonged trust-building before manipulating the victim into financial loss.