Importing the mnemonic in the 'correct' order leads to the phishing scam wallet associated with Facebook.
Using the mnemonic in the order 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12 results in that scam/phishing wallet.
What's the purpose to have your whole post in bold face? (Removed for sanity)
I don't care about Facebook and won't look or search there. Are the recovery words of what you label as phishing scam wallet public?
If yes, then you can disclose them here. It's just that I don't believe you. You know the drill: don't trust, verify!
However, using the mnemonic in the order 1, 7, 2, 8, 3, 9, 4, 10, 5, 11, 6, 12, I tested and found a third-party Bitcoin wallet with actual transaction records.
This is your claim and so far we can't prove your claim. I say, I don't believe you, because first, it's, as you said, highly unlikely that the different word order produces a valid BIP39 word sequence with proper checksum. Second, why would someone else have funded addresses even partially equal to such an invalid BIP39 wallet?
I can confirm what nc50lc said, Electrum clearly warns about an invalid checksum when you change the order of a given valid BIP39 recovery word sequence but still lets you derive a wallet from the invalid sequence.
In other words, it was an extremely, extremely low-probability, accidental discovery.
Yadda, yadda, ... show proof or it didn't happen!