
NIO Is About to Report Q1 Earnings Tomorrow. Here Is What to Expect
Confident Investing Starts Here:
Ahead of the Q1 print, Morgan Stanley analyst Tim Hsiao maintained a Buy rating on Nio stock with a price target of $5.90 per share. Hsiao believes that Nio's recent rollout of the facelifted ET5 and ET5 Touring models, along with the updated versions of the ES6 and EC6 SUVs introduced on May 16, could enhance the company's competitive standing in China's electric vehicle market.
On June 1, Nio delivered 23,231 vehicles in May 2025, marking a 13.1% increase year over year. This figure includes premium smart electric vehicles under the NIO brand, family-oriented vehicles from the ONVO brand, and smart high-end electric vehicles from FIREFLY. Year-to-date, NIO delivered 89,225 vehicles, achieving a 34.7% increase from 2024. As of May 31, the company's cumulative deliveries reached 760,789 units.
Main Street Data, NIO delivered a record 72,689 vehicles, marking a 45.2% year-over-year increase. This achievement was driven by strong performance across its brands.
Options Traders Anticipate a Large Move
Using TipRanks' Options tool, we can see what options traders are expecting from the stock immediately after its earnings report. The expected earnings move is determined by calculating the at-the-money straddle of the options closest to expiration after the earnings announcement. If this sounds complicated, don't worry, the Options tool does this for you.
Indeed, it currently says that options traders are expecting a 9.89% move in either direction.
Is Nio a Buy, Sell, or Hold?
Overall, Wall Street has a Hold consensus rating on NIO stock based two Buys, seven Holds, and one Sell assigned in the last three months. The average NIO stock price target of $5.07 implies 43.22% upside potential from current levels.

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


CNBC
19 minutes ago
- CNBC
Amazon closes Shanghai AI research lab in latest cost-cutting move
Amazon is shuttering its research lab in Shanghai focused on artificial intelligence development, the latest belt-tightening move by the e-commerce and cloud computing giant. Wang Minjie, an applied scientist at the lab, wrote in a WeChat post earlier this week that Amazon disbanded the team due to "strategic adjustments amid U.S.-China tensions." Amazon spokesperson Brad Glasser said in a statement that the company "made the difficult business decision to eliminate some roles across particular teams" in its Amazon Web Services unit. The Financial Times was first to report on the lab closure. Amazon announced layoffs at AWS last week, with U.S. teams focused on marketing and training and certification among those that were impacted. Geopolitical tensions between the world's two largest economies have pushed a growing number of American corporations to reduce or discontinue their operations in China. President Donald Trump's aggressive tariff policies have accelerated that shift, while the Chinese government has called for self-sufficiency in AI and technology development. The U.S. has also placed restrictions on China, limiting its ability to buy chips and chip-making equipment, including from companies like Nvidia and Advanced Micro Devices, that can be used to train AI models. Some of those restrictions have since eased. AWS established the Shanghai lab in 2018 with a focus on areas like natural language processing and machine learning. The company has retreated from China over the past several years. In 2022, Amazon discontinued its Kindle e-book store in the region, after shuttering its e-commerce marketplace in China in 2019.
Yahoo
25 minutes ago
- Yahoo
Fully Chinese-made drone found in Ukraine for first time
A new Russian decoy drone used to spoof Ukrainian air defences is made up entirely of Chinese parts, it has been revealed. The discovery, by Ukrainian intelligence, marks the first time that Russia has deployed weapons made only with Chinese components. It shows the latest sign of cooperation between Beijing and Moscow, despite Xi Jinping insisting that China does not supply lethal aid to either side of the war in Ukraine. While Chinese technology has been found in other Russian weapons, it had always been combined with components from other countries. Ukrainian intelligence said it was able to recover two of the new unmanned aerial vehicles (UAVs) and take them apart. The UAV CBTS.611000 drone is primarily used for reconnaissance and as a decoy, but it can also carry a warhead weighing up to 15kg. Nearly half the components of one of the drones were manufactured by CUAV Technology, a company based in Guangdong province that advertises itself as an 'open source drone solution supplier.' These parts included a flight controller with autopilot, navigation modules and antennas, airspeed sensor and a pitot tube. In 2022, the company announced that it would implement restrictions on the export of its products to Russia and Ukraine to prevent military use. However, the recently discovered drones are not the first time that products from CUAV Technology have been found in Russia. In 2023, Moscow used a vertical take-off UAV, which it alleged was its own design, that included a CUAV Technology product available on AliExpress, a popular online Chinese retailer. In addition to CUAV Technology, Ukrainian intelligence also said the Chinese drones contained an engine and electronic ignition module from Mile Haoxiang Technology, a first person view camera from Foxeer Technology and a Chinese-made copy of the Australian RFD900X data transmission module from RFDesign, which can transmit data up to 40km (25 miles). 'This system enables the creation of a data transmission channel from the UAV to its ground station or between UAVs, thereby enhancing its reconnaissance capabilities,' said Ukraine's intelligence service. The agency had previously estimated that 80 per cent of the electronics used in Russian drones originated in China, which was backed up by the US state department. China has repeatedly denied that it is supplying any lethal weapons 'to any party in the conflict' and claimed that it 'strictly controls dual-use items'. In a post on its Telegram, Ukraine's intelligence agency said the drones have a delta-wing fuselage, which is similar to the Shahed-136 drones, but is smaller in size. Shahed drones, known in Russia as Geran-2, are a type of exploding kamikaze UAV, which Moscow has used extensively in its war against Ukraine. Earlier this month, images of a damaged Geran-2 revealed that parts of the drone had also been manufactured by a machining company in Suzhou province in China. Broaden your horizons with award-winning British journalism. Try The Telegraph free for 1 month with unlimited access to our award-winning website, exclusive app, money-saving offers and more. Solve the daily Crossword


New York Post
an hour ago
- New York Post
Microsoft says China-backed cybercriminals hacked into US nuclear weapons agency
Microsoft has warned that Chinese state-sponsored hackers have breached its SharePoint software used by the US agency responsible for maintaining and modernizing the nation's stockpile of nuclear weapons, according to a report. The National Nuclear Security Administration, a semi-autonomous agency that operates under the auspices of the Department of Energy, was among the targets of a hack allegedly carried out by Chinese-backed cybercriminals, according to Bloomberg News. A Dutch cybersecurity company estimates that around 400 government agencies in the US, Mauritius, Jordan, South Africa and the Netherlands were impacted by the hack, according to Bloomberg News. Advertisement 4 A US government agency responsible for maintaining the nation's stockpile of nuclear weapons was reportedly targeted in a hack by Chinese-backed cybercriminals. U.S. DepartmentofDefense The Dutch firm, Eye Security, previously estimated that just 60 entities were impacted. A source familiar with the situation told the financial news site on Tuesday that no sensitive or classified information was known to have been stolen in the hack, which was made possible by exploiting a flaw in Microsoft's SharePoint document management software. 'On Friday, July 18th, the exploitation of a Microsoft SharePoint zero-day vulnerability began affecting the Department of Energy,' an agency spokesman told Bloomberg News. Advertisement 'The department was minimally impacted due to its widespread use of the Microsoft M365 cloud and very capable cybersecurity systems. A very small number of systems were impacted. All impacted systems are being restored.' The breaches have been ongoing since at least July 7, according to Adam Meyers, senior vice president at CrowdStrike, the cybersecurity firm that has partnered with Microsoft to ward off potential cyber threats. 'The early exploitation resembled government-sponsored activity, and then spread more widely to include hacking that 'looks like China',' Meyers told Bloomberg News. CrowdStrike's investigation into the campaign remains ongoing. Advertisement 4 In a blog post, Microsoft identified two reputed cybercriminal organizations, Linen Typhoon and Violet Typhoon, in the alleged scheme. Bloomberg via Getty Images The Post has sought comment from the NNSA, Microsoft, CrowdStrike and Eye Security. In a blog post, the tech giant identified two reputed cybercriminal organizations, Linen Typhoon and Violet Typhoon, in the alleged scheme to exploit flaws in Microsoft's software that is used by customers on their own networks rather than in the more secure cloud. These customers are at risk of having their data compromised by the hackers, according to Microsoft, which also fingered a third Chinese-based organization, Storm-2603, as doing the same. Advertisement Every morning, the NY POSTcast offers a deep dive into the headlines with the Post's signature mix of politics, business, pop culture, true crime and everything in between. Subscribe here! Microsoft SharePoint is a platform used to store, organize, share and manage internal web content across an organization — similar to intranets. The NNSA wasn't the only agency that was targeted in the alleged cyberattack. Among the victims are the US Department of Education, Florida's Department of Revenue and the Rhode Island General Assembly, which is the Ocean State's legislative body. Internationally, governments in Europe and the Middle East have also been targeted. Cybersecurity researchers have detected breaches on more than 100 servers, representing at least 60 victims across various sectors, including energy, consulting and academia. 4 The National Nuclear Security Administration is a semi-autonomous agency that operates under the auspices of the Department of Energy. Jarretera – Microsoft has patched the vulnerabilities in recent days, but the company expressed concern that hackers will continue to exploit these flaws in future attacks. 'We have high confidence that threat actors will continue to integrate them into their attacks,' Microsoft stated in its blog post. Advertisement 'China opposes and fights hacking activities in accordance with the law. At the same time, we oppose smears and attacks against China under the excuse of cybersecurity issues,' a spokesperson for the Chinese embassy said in a statement. Cybersecurity experts have expressed grave concerns about the severity of the threat. Michael Sikorski, chief technology officer and head of threat intelligence for Unit 42 at Palo Alto Networks Inc., described the situation as a 'high-severity, high-urgency threat.' Advertisement He emphasized the risks posed by SharePoint's deep integration with Microsoft's ecosystem, which includes services like Office, Teams, OneDrive and Outlook — all of which contain valuable data for attackers. 4 This archive picture shows the first B61-13 HiFi nuclear bomb unit completed at Sandia National Labs in Albuquerque earlier this year. Craig Fritz/Sandia National Labs / SWNS Eye Security reported that the flaws allow hackers to access SharePoint servers and steal authentication keys, enabling them to impersonate users or services even after patches are applied. 'We estimate that the real number might be much higher as there can be many more hidden ways to compromise servers that do not leave traces,' Eye Security's co-owner Vaisha Bernard said in an email to Bloomberg News. Advertisement 'This is still developing, and other opportunistic adversaries continue to exploit vulnerable servers.' Despite Microsoft's efforts to bolster its security measures, including hiring executives from government agencies and holding weekly security meetings, the recent breaches have drawn renewed scrutiny. The US government issued a report last year that was critical of Microsoft's lax security culture.